H(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0x0, 0x101}], {0x14}}, 0x3c}}, 0x0) 03:49:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="020b0309110000002cbd7000fcdbdf250100140001000000010014"], 0x88}}, 0x0) 03:49:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000", 0x28}, {&(0x7f0000000440)="5c38f9c15a4cfa", 0x7}], 0x2}, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg$kcm(r2, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10, 0x0}, 0x0) 03:49:16 executing program 1: add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 03:49:16 executing program 3: pipe2(&(0x7f0000002840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_setup(0x6, &(0x7f0000000040)=0x0) pipe2(&(0x7f0000002840)={0xffffffffffffffff}, 0x0) io_submit(r1, 0x2, &(0x7f0000000540)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) 03:49:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:49:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:16 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) [ 860.751102][ T2022] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 03:49:16 executing program 1: pipe2(&(0x7f0000002840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_setup(0x6, &(0x7f0000000040)=0x0) pipe2(&(0x7f0000002840)={0xffffffffffffffff}, 0x0) io_submit(r1, 0x2, &(0x7f0000000540)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x5}]) [ 860.799548][ T2022] team0: Device ipvlan1 failed to register rx_handler 03:49:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5012}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:49:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000300)={{0x28}, [@NFT_MSG_NEWFLOWTABLE={0x360, 0x16, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_HOOK={0x88, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'netdevsim0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'rose0\x00'}, {0x14, 0x1, 'vlan0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_HOOK={0x44, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg1\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8, 0x1, 0x1, 0x0, 0x4c00}]}, @NFTA_FLOWTABLE_HOOK={0x200, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xb8, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_to_bridge\x00'}, {0x14, 0x1, 'bond_slave_0\x00'}, {0x14, 0x1, 'bond0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'veth1_to_hsr\x00'}, {0x14, 0x1, 'veth0_macvtap\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'veth0_to_bridge\x00'}, {0x14, 0x1, 'veth0_vlan\x00'}, {0x14, 0x1, 'veth0_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'wg0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_HOOK={0x68, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_to_bridge\x00'}, {0x14, 0x1, 'rose0\x00'}, {0x14}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}]}, @NFT_MSG_DELTABLE={0x14}], {0x14}}, 0x39c}}, 0x0) 03:49:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x44, 0x0, 0x1, 0x101, 0x0, 0x0, {0xa}, [@CTA_TUPLE_ORIG={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x4, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0x14, 0x4, @loopback}}}]}]}, 0x44}}, 0x0) 03:49:16 executing program 1: unshare(0x40400) pipe2(&(0x7f0000002840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$getown(r0, 0x9) [ 861.080674][ T2044] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 03:49:17 executing program 3: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0, 0x0, 0x0) [ 861.221043][ T2057] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 861.481366][ T2026] device macvtap7 entered promiscuous mode 03:49:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000", 0x28}, {&(0x7f0000000440)="5c38f9c15a4cfa", 0x7}], 0x2}, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg$kcm(r2, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10, 0x0}, 0x0) 03:49:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x14, 0x3, 0x1, 0x101}, 0x14}}, 0x0) 03:49:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:49:17 executing program 3: r0 = socket(0x1d, 0x2, 0x2) connect$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}]}, 0x58}}, 0x0) [ 862.174640][ T2076] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 862.217109][ T2076] team0: Device ipvlan1 failed to register rx_handler 03:49:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:18 executing program 2: syz_emit_ethernet(0x12, &(0x7f0000000580)={@multicast, @random="106e4a56183c", @val={@void}, {@generic={0xfbfb}}}, 0x0) 03:49:18 executing program 1: unshare(0x40400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) 03:49:18 executing program 3: add_key(&(0x7f0000000040)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="11", 0x1, 0xfffffffffffffffc) 03:49:18 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:18 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000002880)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x127a, 0xffffffffffffffff) 03:49:18 executing program 3: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/udmabuf\x00', 0x2) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 03:49:18 executing program 1: memfd_create(&(0x7f0000000080), 0x0) [ 862.689409][ T2093] device macvtap7 entered promiscuous mode 03:49:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000", 0x28}, {&(0x7f0000000440)="5c38f9c15a4cfa", 0x7}], 0x2}, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg$kcm(r2, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000700)}, 0x0) 03:49:18 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000002880)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x1277, 0xffffffffffffffff) 03:49:18 executing program 1: r0 = socket(0x2, 0x3, 0xff) ioctl$sock_ifreq(r0, 0x5411, 0x0) 03:49:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000002880)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x127b, 0xffffffffffffffff) [ 863.296211][ T2113] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 863.309544][ T2113] team0: Device ipvlan1 failed to register rx_handler 03:49:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:49:19 executing program 2: r0 = socket(0x2, 0x3, 0xff) ioctl$sock_ifreq(r0, 0x8919, &(0x7f0000000000)={'lo\x00', @ifru_hwaddr=@broadcast}) 03:49:19 executing program 3: syz_open_dev$loop(&(0x7f0000002880)='/dev/loop#\x00', 0x0, 0x410600) 03:49:19 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000", 0x28}, {&(0x7f0000000440)="5c38f9c15a4cfa", 0x7}], 0x2}, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg$kcm(r2, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000700)}, 0x0) 03:49:19 executing program 2: syz_open_dev$loop(&(0x7f0000002880)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x125e, 0xffffffffffffffff) symlinkat(&(0x7f0000000100)='.\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') 03:49:19 executing program 1: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x8, &(0x7f0000000040)={[0x3]}, 0x8) 03:49:19 executing program 3: io_setup(0x1, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}]) [ 863.883045][ T2138] device macvtap7 entered promiscuous mode 03:49:19 executing program 1: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r0, 0x7) keyctl$link(0x8, 0x0, r0) 03:49:19 executing program 2: 03:49:20 executing program 3: [ 864.523560][ T2142] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 864.541210][ T2142] team0: Device ipvlan1 failed to register rx_handler 03:49:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:20 executing program 2: 03:49:20 executing program 1: 03:49:20 executing program 3: 03:49:20 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000", 0x28}, {&(0x7f0000000440)="5c38f9c15a4cfa", 0x7}], 0x2}, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg$kcm(r2, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000700)}, 0x0) 03:49:20 executing program 1: 03:49:20 executing program 3: 03:49:20 executing program 2: [ 865.037023][ T2180] device macvtap7 entered promiscuous mode 03:49:21 executing program 1: 03:49:21 executing program 2: 03:49:21 executing program 3: [ 865.703877][ T2186] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 865.718583][ T2186] team0: Device ipvlan1 failed to register rx_handler 03:49:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:21 executing program 1: 03:49:21 executing program 2: 03:49:21 executing program 3: 03:49:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000", 0x28}, {&(0x7f0000000440)="5c38f9c15a4cfa", 0x7}], 0x2}, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg$kcm(r2, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @empty}}}], 0x20}, 0x0) 03:49:21 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:22 executing program 1: [ 866.206680][ T2239] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 03:49:22 executing program 2: 03:49:22 executing program 3: [ 866.274518][ T2239] team0: Device ipvlan1 failed to register rx_handler 03:49:22 executing program 1: 03:49:22 executing program 2: 03:49:22 executing program 1: [ 866.902155][ T2240] device macvtap7 entered promiscuous mode 03:49:23 executing program 2: 03:49:23 executing program 3: 03:49:23 executing program 1: 03:49:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000", 0x28}, {&(0x7f0000000440)="5c38f9c15a4cfa", 0x7}], 0x2}, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg$kcm(r2, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @empty}}}], 0x20}, 0x0) 03:49:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:23 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:23 executing program 1: 03:49:23 executing program 3: 03:49:23 executing program 2: [ 867.440636][ T2279] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 867.512756][ T2279] team0: Device ipvlan1 failed to register rx_handler 03:49:23 executing program 3: 03:49:23 executing program 2: 03:49:23 executing program 1: 03:49:23 executing program 3: 03:49:23 executing program 2: 03:49:23 executing program 3: [ 868.017105][ T2281] device macvtap7 entered promiscuous mode 03:49:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000", 0x28}, {&(0x7f0000000440)="5c38f9c15a4cfa", 0x7}], 0x2}, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg$kcm(r2, &(0x7f0000001cc0)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @empty}}}], 0x20}, 0x0) [ 868.455988][ T2304] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 868.480159][ T2304] team0: Device ipvlan1 failed to register rx_handler 03:49:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:24 executing program 1: 03:49:24 executing program 2: 03:49:24 executing program 3: 03:49:24 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:24 executing program 4: 03:49:24 executing program 3: 03:49:24 executing program 1: 03:49:24 executing program 2: [ 868.824262][ T2315] device macvtap7 entered promiscuous mode 03:49:24 executing program 4: 03:49:24 executing program 1: 03:49:24 executing program 2: 03:49:25 executing program 4: 03:49:25 executing program 3: 03:49:25 executing program 2: 03:49:25 executing program 1: 03:49:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:25 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:25 executing program 4: 03:49:25 executing program 2: 03:49:25 executing program 3: 03:49:25 executing program 1: 03:49:25 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) [ 869.532701][ T2343] device macvtap7 entered promiscuous mode 03:49:25 executing program 2: 03:49:25 executing program 4: 03:49:25 executing program 1: 03:49:25 executing program 3: 03:49:25 executing program 4: 03:49:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:25 executing program 2: 03:49:25 executing program 3: 03:49:25 executing program 1: 03:49:25 executing program 4: 03:49:25 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:26 executing program 1: 03:49:26 executing program 2: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r0, 0x0) 03:49:26 executing program 3: 03:49:26 executing program 4: 03:49:26 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) [ 870.292832][ T2373] device macvtap7 entered promiscuous mode 03:49:26 executing program 4: 03:49:26 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:26 executing program 1: 03:49:26 executing program 2: 03:49:26 executing program 3: 03:49:26 executing program 4: 03:49:26 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:26 executing program 4: 03:49:26 executing program 1: 03:49:26 executing program 3: 03:49:26 executing program 2: 03:49:26 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) [ 870.947793][ T2398] device macvtap7 entered promiscuous mode 03:49:26 executing program 3: 03:49:27 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:27 executing program 2: 03:49:27 executing program 4: 03:49:27 executing program 3: 03:49:27 executing program 1: 03:49:27 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:27 executing program 4: 03:49:27 executing program 1: 03:49:27 executing program 3: 03:49:27 executing program 2: [ 871.629422][ T2422] device macvtap7 entered promiscuous mode 03:49:27 executing program 3: 03:49:27 executing program 1: 03:49:27 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:27 executing program 4: 03:49:27 executing program 1: 03:49:27 executing program 2: 03:49:27 executing program 3: 03:49:27 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:28 executing program 4: 03:49:28 executing program 3: 03:49:28 executing program 2: 03:49:28 executing program 1: [ 872.270677][ T2444] device macvtap7 entered promiscuous mode 03:49:28 executing program 3: 03:49:28 executing program 2: 03:49:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:28 executing program 1: 03:49:28 executing program 4: 03:49:28 executing program 2: 03:49:28 executing program 3: 03:49:28 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:28 executing program 4: 03:49:28 executing program 3: 03:49:28 executing program 2: 03:49:28 executing program 1: [ 872.963861][ T2467] device macvtap7 entered promiscuous mode 03:49:28 executing program 4: 03:49:28 executing program 1: 03:49:29 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:29 executing program 2: 03:49:29 executing program 4: 03:49:29 executing program 3: 03:49:29 executing program 1: 03:49:29 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:29 executing program 1: 03:49:29 executing program 3: 03:49:29 executing program 2: 03:49:29 executing program 4: [ 873.702216][ T2492] device macvtap7 entered promiscuous mode 03:49:29 executing program 1: 03:49:29 executing program 4: 03:49:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:30 executing program 2: 03:49:30 executing program 1: 03:49:30 executing program 3: 03:49:30 executing program 4: 03:49:30 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:30 executing program 1: 03:49:30 executing program 3: 03:49:30 executing program 4: 03:49:30 executing program 2: [ 874.366267][ T2515] device macvtap7 entered promiscuous mode 03:49:30 executing program 2: 03:49:30 executing program 4: 03:49:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:30 executing program 3: 03:49:30 executing program 1: 03:49:30 executing program 2: 03:49:30 executing program 4: 03:49:30 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:30 executing program 1: 03:49:30 executing program 2: 03:49:30 executing program 4: [ 874.969168][ T2538] device macvtap7 entered promiscuous mode 03:49:30 executing program 3: 03:49:31 executing program 1: 03:49:31 executing program 2: 03:49:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:31 executing program 3: 03:49:31 executing program 2: 03:49:31 executing program 4: 03:49:31 executing program 1: 03:49:31 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:31 executing program 4: 03:49:31 executing program 3: 03:49:31 executing program 1: 03:49:31 executing program 2: [ 875.705586][ T2561] device macvtap7 entered promiscuous mode 03:49:31 executing program 4: 03:49:31 executing program 3: 03:49:32 executing program 2: 03:49:32 executing program 1: 03:49:32 executing program 4: 03:49:32 executing program 3: 03:49:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:32 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:32 executing program 2: 03:49:32 executing program 1: 03:49:32 executing program 4: 03:49:32 executing program 3: [ 876.414546][ T2585] device macvtap7 entered promiscuous mode 03:49:32 executing program 2: 03:49:32 executing program 4: 03:49:32 executing program 1: 03:49:32 executing program 3: 03:49:32 executing program 2: 03:49:32 executing program 4: 03:49:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:32 executing program 1: 03:49:32 executing program 3: 03:49:32 executing program 2: 03:49:32 executing program 4: 03:49:32 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:33 executing program 4: 03:49:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001980)=@raw={'raw\x00', 0x3c1, 0x3, 0x2a8, 0xc8, 0x2b8, 0x0, 0xc8, 0x0, 0x1d8, 0x3a8, 0x3a8, 0x1d8, 0x3a8, 0x7fffffe, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', [0x0, 0xffffffff, 0x0, 0xff000000], [0xffffffff, 0xffffff00, 0xffffff00], 'ip6_vti0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x0, 0xff, 0xc}, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ipv6={@private2={0xfc, 0x2, [], 0x1}, @mcast1, [0x0, 0x0, 0x0, 0xff], [0x7f8000ff, 0x0, 0xffffffff, 0xff], 'batadv0\x00', 'veth0_to_team\x00', {}, {}, 0x2d, 0x3f, 0x5}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x8, 0x7, 0x0, 0x7ff, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x308) socket$l2tp(0x2, 0x2, 0x73) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, &(0x7f0000000980)={{}, "80ee6479d6ce8e413dfd577f80bbf687f6806c4c16baaf7fb520a1c75ab34cbdd6f384e036c925d2951350c7a297d40f792f433ce3ae2ae9ad2d3e1535ff14a16cd77e2da8dbca40fcdd721e43718feb85e144d5305d2f97310638e3fa312dcca8dec1e0af051764b2a12f1d3e6b5f88c635d34f9dee4b0fe89909571dbd22748fcd6fa8245c9b88651d972fefdf41589611b49295d3528da2bb7082077558e7bb97f5fb993e302e9cb3b94d7d14ac03946d06fc9cba281ca23af89a91f31373f46a8b8178c7eb8f4e228730436b6ff0d7107991efbb076d2d27dd9e96ce00b231b3d721f4de1fb7102e3d539c62db4396326706841872f33ea297cd2348691df5b0998b547b7e781fbc5146f46b5919c67807cf86d927567e2f69365060c1dd1ca4a200ab983f2b9fbf6a1602e9d02e642fd02e6f51e0cff87470a4d0bf7b6ae93f3b2d67c92f6c9bc6545639bd742f5a08fc175dcfad8b463b59dd25b047155d2021ce7fb88cee70c6de77e1ea320cfec495bebf9231f03e3e508a7991341b552e76dd5cb9b2b4cf8e277f4cc2136556e0607dcb16d5ab2173bddbb288bff5933710e1721614c4fee4c92e376b605f59ab10cc0787d4ac25e3c4b614baa9d1730fa19d1cbda2d9c70574f16f7a1247c947f3c8c420c442e76c726044bd78bcf68ffcffbbc36f01550d93b7b6b91048277def886a1ce0d946c66d9c09c69a5d8256a444d0772aff82dd38b3d1da478a13f3242472765d33b1548f102ee94498fdd53be3357d47be190dd7da5fd178477f72e369a7c3003f83ac9d344a7f0ad2e63b78cc65702fa06b0e17124959e4b91f500abefefba94b46d09a312c3045f51ebf81d3e5eb10eb899dbada991c383d96c96d38882e37420f128d382b2ea809ff83a5cc87e465c7038e06f3214ea1ae4b986b5a8c86a260e10ea35d7f60647f3cd50e08589656d2899492014d417445d7d80c403ea1ae46cb37c8c45f6537093d1a8cc0d21fec864d5400022173426f06475e3f8b68cd8b73d15d91ae91eea21438f0172460a9295f7e9b613f86160fceab2292d20e5012bdc5909a2d0ea0cbe01d7989c79b4b7c8c0014eab0b6ca2fca895241fff893cc397b78c9a6e44d3bf59f759ceb5d05ab553985d37b9dda1ba977662b9e3deb75e6f7ab6ea96084aafb5793d747c67b116dc0ff399625c2a0054e42fce5d8636d4302db3b5bb277da69b8db5f397d74c80898178e9d854a0c6d258e08ac0c428f1af3d40b3a5af955e238ca19d0c859d7027a299021fc5d0c38d0b2141d67b45d3b7432d6b29db88aed87c6d224bbf23d273664dc1af390bf8839ec6bd705219d0de372b8b29457d165f9a68bf9cb901f0ca9afaaaf927136cdd3d94b53040f2bc49edf7a94568e989e7d24baf83e1c9c199b50a954c1f7458274b5bb2efa0cca9d1d5a4ee9ff7baa46de8d94a8e7d24ff687f3c8058d6ef977f1e980109b47706051b628a55a873e3f6c266efea1d25bd2ad6ce843b82c1683e86839bdafa0ed18c799c991f35ad1aba67622ee0d3e408379ae6127baa9ab27ebdffef4279fc1d8da5c0800318344f6aa9312730fd7e64b7bb5ad15a23d8bce8edc4dd596b0251d98a84578e11e47e1a908c485f4cb5b9cf2ce34ddb3a279c8c5a172dcd107dd849fae740f2cce4347b09d18844d081f6c52877c309757d7dbf845c5cdcd07380ec168910d60e8ae7e0a0dd257e8f0ab3bc8be0bd4ead2ed9bd3312fba300e9f3199e2dad9579b71b972a06030b8cb13bacb9101c83505da3109d7b0419a9efeaabcf8d00ab941331b917d0d5184cc955e301ea78f5d445383531fcc36572e9e86bf4b532d3c96ac1404b1bc9ffd2195c56054d89be8ca8e859eabb1d6cc2d462c2f3f1b7a325a404e73008c9a66d9006bb329d94fa703297dce3849303f1ffc061413dc70c8858ac8a074a69a3fa32cc1edc50dbfcb614ecd49eb920b07dc1161c4445b9262de332a432ac8abdb42065ea26b23e353fdc7bf47d4a701706ab15347607895615d9ed05b9de93858e3749d83d94599d1ccd49189ad82f0e7ba4b21488ee32fa772c090b6577f4241960fd025500517576c56d40c12bade99770b9f0fd3f866ce40b42565ec01f8140810195b2a03d73663d3426b86bdc8e5160687eda1449f80c0f261f7dcfc6c33d8c6350f9913c39a78c96d07fc54137321da79d0e8d13ce62faa4c29df1897c7763b483669fae59f72647fed4f04c1af28e634a5dbe82f2a80680baa59a3eff36846e17dd893dd7177ddb5042f2e87a630761dc50213d8cb5249070a63e130038e1683f9dc1969dec2fd7bb2218542e2b0047e78156b684609a0baf3b7ea34dd63aebfceac8814be79611c927de7774bc85acdf76bfc173e25a86d3569c2b540b1ed2a01a988323e0d8589af5a9110d819bb4ffa8cda761d16c37e249b2091c8cd06c6d6f5a3856d32404e6d042d16f367b3a8786ac9e7359f4effdcd197aea9f514fd6d43b0ac0947087ac7d7c9d3fff18cb0c8cf3930a679ab84df830a0bd00482590f69d2dbf6589beba7bdaac9736be6879da1a773ac48f6d37ad9533d041f5ca237dbbdbc0ed3ca7d7d599949a667a8d42a10425281112cd61f4e80bc8cc2e2b1c6a7a41e3404b172e35a9a3e8ef21303da4ee34c1ea4926f321280b3543c8ea73c6c91701d1ed59d27d699385ea115d5cf4d0a56008ad6012c6fc18264777665d250b15332d58f3e66a58eb6612490defee926ba6ffec8d51d1f174e504c340ef7d1bba41a67a277a57e9901d43cb7013ede1950b8c9d626fd56f5d1b404daa815084ba5d76be30c69b6a6286eda2fca0b32870664a15d847935b00959f9c555139c4e1ce4fd5e96d384d208195b485b5ee6d81209a7176418b01021b6748f0f8a0d680afc7a0b34316174f2c61b26cae7f299794eb7e9524326ffec60833c0bd8a3b8ffe0031c03e634b8edb50fbe6c7630428cfcc3f9306a7f51ad52b68103fe2ee878b55553985ddd1665d2934acf530a4625de2766a94edfc7cd175427239ced127dc5e8129a6b8725f4d52fb55f8f0da978a0c76bff7c3f6e60af99e94b3fc932aac9640ac351313070ab4aac1b40bb7fdcd39be039980a95811fa7060db691c797324db4cc044ba6be7ec769f9100aaa86f6646facda86ae9d90ebbfb1de5747f812b54489478399d781b88253be807092af7826d7c453eb848b1d99fd769447457fc5beef0161adfcd2b3c7bdc10fb38c418d6b94ff953912ba06854a05e61817208f31c7beaac1e83a72c48a9c64848620c0f82fd052f33dc0cce2fdbf8b7807ac8f065657703cf353132bb576a18aee9f2f02f9d47de361e2c90d2cb027dc4cd3043ec1083352519ede6749d2385e8ef260d9321c67e8e66a55ed593925e63d7e7a120d66f9a83a39fddcc5c44461bec6bbbb8c74bfc42a1331d1ec3a4dc9b74b6a45e959168914c8576e145c821cb4bbf53b2911d1edbd328efc72c3e5d9b4e1850dc3943248237333aae05b99dee53cc4bce7de85fefbfa0d6ea566a27bc7a5cc01968373bf0d3ea5c18efee8ad4882e9b671f90805fd4ff71d55a370d3a3673eb78c7c520a4ca81bfb97e79c4eb644479bdb0e18affe4806c2be8f7cb3cdf4e304101299970e4e7108c4281e37d1e0f6b52e1eb37b75ed151ad992e80a5cf104cd62e6777a6217ef96ee2f4791dca90a137f8c077995ec19693e51c5bd6eebfec5d67ea786fcbc2a256b128839e6f3eb685672185409c62deef1573b425b08fd950b94905aae02901fd54cd39f34f467cc553366e508be7509b5697d4342c2e2bfa1c12cac7939d29e481d7dd9c57b459aaf68abc3dbca495b6d4244fbd1090e8d98072837c0517d5e507c090ab8db472e5ca35bff60789b5647ce6d17a3cd4e5f276f0379d32ab06cfeb30f1a1b8f11cb7ed6f1d46ea728f10058319276ac8cad08a22a79b147fb135e11234ca73e48774f9611d429f4af29b129ae348003f9139f26b5d62ec5b200d3c83903aa326390de97c13627f90e22e61b70174a872580fdb1b88afd2e7068d95a037ab9d418dc91b6d1fb067fb0ec0d82768d11a267f914e139044c49b3d62a4e0551fffb5692c46cb7ba410342742a522aa0597524b3260133018f7b8ab88a56dbc2631b002d655d88cd1a7ae48ddf60c4db4cc3fabd23c57059381ce92a8056f36be371c4dc941fa48e8f4347fe4e6ff9c9adcab906a2e2bbfc62b931922ea5a0d2ed32e341a900ef0ea2163ed7987563478832ed5495554b96385d55601b8b302cdd5f89dbd3e7342d8d05fc9da74c7dc76685d4fa25945f059cc6163c4e8374e54e6ce7b6bfd990e7ab3f446ed643ead82d2d4c0c0b81df35485d9e8f854b08947045c0e0f22525b1d13c345866754301a97633f9135256cf75cdba9c21cfc9b899333d967906b7b5daf54bc50c492ea7e2f78ca558e4c01ea4227a48d4aad12dd1583d43082d91374d520c7165a702d345e30067a55e03c509b20b069d498afc80502a53d1da7ca9eea596634a736038b367e86314dcd8eae50911d2bd27f2a18557d77a4a2b3f06455186287c45146256e1369a5a3ba6a14bb968b210d7a9dfbd98321079bb37c4c290a823e96ae8fbdbebc8efd63a5a9e10333514236c15973bf0ff4388fb3a5454ad670ac998cf72eec01e2b9c0094ae675fa344ba25254342ab1f8462d0583ad0e521837f927e46ef5dfa7fbee7115039299e94eae04ea3b3755ba9af67803faee3b4e65ef363ac61bfa5e74ff69ff8db81a9330b768f5f90ba42b2cf0427c5769ebebbf55262406426e04638a37f69fdd508aad63096d5e52a6fdb3c6ab9ea12534b2c7282de5130ca6cdd6abe04bffdff52df3a9fabac05a973deff67952bbf17d5f2220d60d483a5d0280589657ad85e0d70bd4eed190dcc437a19e5d8df6996f61f5534b40443ec51eb5b83308b50f928b1778297145ead73fb0612f6e7a58e2e92053b770255e14b5911acbcc6404d483379c52c4b17dc182d4d5e087419f5c11575e847625b35ad2308f95473713ed8e860bd03b2e4b39db24b418e23f1af5df2b3b4eed20dfbb2c2671ecdbbf402784f291f656c79d39ea37fadf5b4667800360a4e27d6d6a1c9f1fffbfdb99d0344cf728e1f400beb9a78cf84232cfed71e507f893ef5e465b467472f0ac38b8dda0d3e6a37b0ac4cdd9f1fc88b2ba84143dfedc108c30332367b5d1ba00147b1e3d1787a164f97f0ab5f028f70d5fc3157b9547ea0542239a3873056360af87ab4f6c2ecc5fa07c13c492ebd3f3f6f23241ab9ecf5cf1199719c5fd9047c01e4decac92661865d80305a19ecba7dde5c6a8e587955ddf75e15195a0ad7ff9ab195cbdb8f37f85380351d338e56ab6bd7b093a6d9fde0b3003f2c0a2549ed7d2bc77e3d6889ccba32aff74e48ff9ac5f767552e75205a931a4ef8eef2e3dadd59616dc95c94ab6a3f0b2b7d9fe2904c9d2562ba121b405741c274deda4c06e79c8c23a220e563c7d5e452ec3a4f5267050e0e6842010e012917377863328b8ba11cd975a4cc80a104ea1737a069daa9ad10599fbdb0270da6cc9b863119c45446d52ec03b64bc385fdbe6e2de5b4ee5fb9841c4db26780f3cd8fb55a1884b57a5646330e4dd300e65eb728c571bada8b735aa48242d2a20e80774edad263c1578cefa4b4fc1dbfa8075ad0718c417d04d10514da8789251c95d9a191eacb87c303ba52d03255b866b3d1480ef35971770a3b8d93c63ba9e23a83aa799082e0979476e"}) r1 = socket$inet6(0xa, 0x5, 0x0) shutdown(r1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4={[], [], @empty}}, 0x1c) sendmmsg$inet(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000002640)=[{&(0x7f0000000080)="a2", 0x1}], 0x1}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @remote}]}, &(0x7f0000000180)=0x10) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r1, 0xf507, 0x0) 03:49:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 03:49:33 executing program 2: [ 877.249600][ T2613] device macvtap7 entered promiscuous mode 03:49:33 executing program 2: 03:49:33 executing program 4: 03:49:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:33 executing program 1: 03:49:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="4c0000003e04f7"], 0x4c}}, 0x0) 03:49:33 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x6, 0x0, 0x10) 03:49:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 03:49:33 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:33 executing program 2: syz_emit_ethernet(0x2a, &(0x7f00000002c0)=ANY=[@ANYBLOB="ffffffffffff0ddd398dd69508060001080006040001aaaaaaaaaabbac1414bb"], 0x0) 03:49:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001880)={0x0, 0x0, 0x0}, 0x0) 03:49:33 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_timeval(r0, 0x1, 0x43, 0x0, &(0x7f0000000040)) [ 877.908224][ T2642] device macvtap7 entered promiscuous mode 03:49:33 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r0, 0x300, 0x0, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x28}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}]}, 0x68}, 0x1, 0x0, 0x0, 0x8081}, 0x240448d5) unshare(0x44000000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x6, 0x0, 0xfffffffffffffde1) 03:49:33 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f00000002c0)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 03:49:33 executing program 4: pipe(&(0x7f0000000700)={0xffffffffffffffff}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, 0x0, 0x0) [ 878.313736][ T2655] IPVS: ftp: loaded support on port[0] = 21 03:49:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:34 executing program 1: clock_gettime(0x7, &(0x7f0000000200)) 03:49:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x18, r1, 0x70b, 0x0, 0x0, {0x7}, [@ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x18}}, 0x0) socket(0x11, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000200)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x44001) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) 03:49:34 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) [ 878.521641][ T2657] IPVS: ftp: loaded support on port[0] = 21 03:49:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xc44}, 0x40) [ 878.594944][ T2693] device macvtap7 entered promiscuous mode 03:49:34 executing program 1: pipe(&(0x7f0000000340)) syz_genetlink_get_family_id$team(&(0x7f0000001700)='team\x00') 03:49:34 executing program 1: sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)) 03:49:34 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2f) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0xffff}, &(0x7f0000000040)=0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xe6, 0x9f, 0xffffffff}}, 0xe8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$netlink(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8822d55593a2179}, 0xc) write(r0, 0x0, 0x0) 03:49:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 03:49:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:34 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x5, &(0x7f0000000540)=@framed={{}, [@exit, @func]}, &(0x7f00000005c0)='syzkaller\x00', 0x7, 0xea, &(0x7f0000000600)=""/234, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:49:35 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000001700)='team\x00') [ 879.222689][ T2738] device macvtap7 entered promiscuous mode 03:49:35 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x3, &(0x7f0000000540)=@framed, &(0x7f00000005c0)='syzkaller\x00', 0x7, 0xea, &(0x7f0000000600)=""/234, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:49:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0xb, 0x0, &(0x7f0000000480)) 03:49:35 executing program 3: socketpair(0x1d, 0x0, 0x8, &(0x7f0000000300)) 03:49:36 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x3, &(0x7f0000000540)=@framed, &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:49:36 executing program 2: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000280)='NLBL_UNLBL\x00') pipe(0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000b40)='nl80211\x00') syz_genetlink_get_family_id$ethtool(&(0x7f0000000d00)='ethtool\x00') 03:49:36 executing program 3: socketpair(0xa, 0x0, 0x457d7f0c, &(0x7f0000000140)) 03:49:36 executing program 4: sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) pipe(&(0x7f0000000a40)) 03:49:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:37 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket(0x0, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast2, 0x0, 0xfffffe00, 'lblcr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x15000000000000, 0x485, 0x6, 0x0) 03:49:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001880)={&(0x7f00000002c0), 0xc, &(0x7f0000001840)={&(0x7f0000000a00)={0x14, r1, 0x1}, 0x14}}, 0x0) 03:49:37 executing program 4: pipe(0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000b40)='nl80211\x00') 03:49:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x4, &(0x7f0000000540)=@framed={{}, [@ldst={0x0, 0x0, 0x2}]}, &(0x7f00000005c0)='syzkaller\x00', 0x7, 0xea, &(0x7f0000000600)=""/234, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 881.164614][ T2771] device macvtap7 entered promiscuous mode 03:49:37 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x6, &(0x7f0000000540)=@framed={{}, [@ldst={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, @func, @func]}, &(0x7f00000005c0)='syzkaller\x00', 0x7, 0xea, &(0x7f0000000600)=""/234, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0xd}, 0x10}, 0x78) 03:49:37 executing program 4: socketpair(0xa, 0x1, 0x2, &(0x7f0000000000)) 03:49:38 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:38 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x8081}, 0x240448d5) unshare(0x44000000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x6, 0x0, 0xfffffffffffffde1) 03:49:38 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x1100) 03:49:38 executing program 1: syz_genetlink_get_family_id$l2tp(&(0x7f0000000b40)='l2tp\x00') sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, 0x0, 0x0) socketpair(0x28, 0x0, 0x3, &(0x7f0000000f00)) 03:49:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:38 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000c80)='ethtool\x00') syz_genetlink_get_family_id$ethtool(&(0x7f0000000d00)='ethtool\x00') 03:49:39 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x8a, &(0x7f0000000180), 0x4) [ 883.198265][ T2818] device macvtap7 entered promiscuous mode [ 883.218227][ T2821] IPVS: ftp: loaded support on port[0] = 21 03:49:39 executing program 4: 03:49:39 executing program 1: 03:49:39 executing program 4: 03:49:39 executing program 2: 03:49:39 executing program 1: 03:49:39 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) [ 883.823979][ T2826] IPVS: ftp: loaded support on port[0] = 21 03:49:39 executing program 3: 03:49:39 executing program 4: 03:49:39 executing program 2: 03:49:39 executing program 1: 03:49:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:39 executing program 4: [ 884.136636][ T2895] device macvtap7 entered promiscuous mode 03:49:40 executing program 2: 03:49:40 executing program 1: 03:49:40 executing program 3: 03:49:40 executing program 4: 03:49:40 executing program 2: 03:49:41 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:41 executing program 1: 03:49:41 executing program 3: 03:49:41 executing program 4: 03:49:41 executing program 2: 03:49:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:41 executing program 2: 03:49:41 executing program 3: [ 886.081769][ T2920] device macvtap7 entered promiscuous mode 03:49:41 executing program 4: 03:49:41 executing program 1: 03:49:42 executing program 2: 03:49:42 executing program 3: 03:49:43 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:43 executing program 1: 03:49:43 executing program 4: 03:49:43 executing program 2: 03:49:43 executing program 3: 03:49:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:43 executing program 2: 03:49:43 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgid(0x0) fcntl$setown(r0, 0x6, r1) fcntl$setown(r0, 0x6, 0x0) 03:49:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, 0x0, 0x0, 0x403, 0x0, 0x0) 03:49:43 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) [ 888.074722][ T2950] device macvtap7 entered promiscuous mode 03:49:44 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x1, 0x0) 03:49:44 executing program 2: 03:49:44 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:44 executing program 1: 03:49:44 executing program 4: shmget(0x3, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 03:49:44 executing program 2: r0 = socket(0x18, 0x3, 0x0) getsockname$unix(r0, 0x0, &(0x7f0000000040)) 03:49:44 executing program 3: utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) 03:49:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:44 executing program 1: setpgid(0x0, 0x0) r0 = getpgid(0x0) setpgid(r0, 0x0) 03:49:44 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f00000024c0)={0x0, 0x0, 0x0}, 0x0) 03:49:44 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x100, &(0x7f0000001540)=0x3, 0x4) 03:49:44 executing program 4: setitimer(0x0, &(0x7f0000000140)={{0x800}, {0x0, 0x401}}, &(0x7f0000000180)) 03:49:44 executing program 1: setitimer(0x2, 0x0, &(0x7f0000000240)) [ 888.848621][ T2990] device macvtap7 entered promiscuous mode 03:49:44 executing program 3: open(&(0x7f0000000000)='./file0\x00', 0x28320, 0x0) [ 889.003634][ T3003] syz-executor.1 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 03:49:45 executing program 2: utimensat(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)={{}, {0x0, 0xc00000000000000}}, 0x0) 03:49:45 executing program 4: open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) 03:49:45 executing program 1: setrlimit(0x8, &(0x7f0000000000)) 03:49:45 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:45 executing program 3: setrlimit(0x8, &(0x7f0000000140)={0x2, 0x10001}) socket$inet6(0x18, 0x3, 0x0) 03:49:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:45 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x282c9, 0x0) 03:49:45 executing program 3: setitimer(0x0, &(0x7f0000000000)={{}, {0x100000000}}, 0x0) 03:49:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x2) 03:49:45 executing program 1: mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 03:49:45 executing program 4: socketpair(0x2, 0x3, 0x6, 0x0) [ 889.616009][ T3031] device macvtap7 entered promiscuous mode 03:49:45 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x0, 0x0, 0x0) 03:49:45 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1) 03:49:45 executing program 1: nanosleep(&(0x7f0000000100), &(0x7f0000000140)) 03:49:45 executing program 4: mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) 03:49:46 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:46 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x2}, 0x8) 03:49:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x100, &(0x7f0000001540), 0x4) 03:49:46 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)}, 0x0) 03:49:46 executing program 4: setitimer(0x0, &(0x7f0000000000)={{0x7fffffff}, {0x1}}, 0x0) 03:49:46 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgid(0x0) fcntl$setown(r0, 0x6, r1) 03:49:46 executing program 3: mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x1811, 0xffffffffffffffff, 0x0) 03:49:46 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000000800)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x2}, 0x8, 0x0, 0x0, &(0x7f0000000740)}, 0x0) 03:49:46 executing program 1: semget(0x2, 0x1, 0x641) [ 890.402069][ T3071] device macvtap7 entered promiscuous mode 03:49:46 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x8000, 0x0) 03:49:46 executing program 4: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4) 03:49:46 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:46 executing program 3: shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) 03:49:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:46 executing program 1: setitimer(0x0, &(0x7f0000000140)={{0x0, 0x10001}, {0x3}}, 0x0) 03:49:46 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000100)='\x00', 0x0, 0x0) 03:49:46 executing program 4: socketpair(0x0, 0x0, 0x3f, 0x0) 03:49:46 executing program 3: socket$inet6(0x18, 0x3, 0x11) 03:49:46 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockname$inet6(r1, 0x0, &(0x7f0000000040)) 03:49:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000000c0)="670fcdb1b84d1b0607da1e0a69eb11e12d3b5b60e0ee256b51055baf97cd2c0644a003cdd73d0bb986e65a1bf0300deb36bc5a15f4d1da92faf0aacefed6da624638f557bb5be44f0b9b3c3fe46a3bc46622d55516cd0dbf680b6918cab489cf988cdd65ebdd320956203b8ecf90e048c59771a063dbeed7ed6f73310c76e02a11f6033890d0e4e960054fbb64669bcba4", 0x91) 03:49:46 executing program 1: readv(0xffffffffffffffff, &(0x7f0000001780)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) 03:49:46 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_int(r0, 0xffff, 0x10, 0x0, 0x0) [ 891.102925][ T3113] device macvtap7 entered promiscuous mode 03:49:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:47 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:47 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, 0x0, 0x0) 03:49:47 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f0000000000)=@abs, 0x8, 0x0}, 0x0) 03:49:47 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000000), 0x10) 03:49:47 executing program 3: select(0xfffffffffffffdd7, 0x0, 0x0, 0x0, &(0x7f0000000040)) [ 891.382836][ T3128] device macvtap8 entered promiscuous mode 03:49:47 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) close(r0) fchown(r0, 0x0, 0x0) 03:49:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x0) 03:49:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:47 executing program 4: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') unlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) 03:49:47 executing program 3: mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x200000f, 0x5ce6b47f0c99239, 0xffffffffffffffff, 0x0) 03:49:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fd\x00') mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 03:49:47 executing program 1: mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 03:49:47 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:47 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) flock(r0, 0x1) 03:49:47 executing program 4: setrlimit(0x2, &(0x7f0000000080)={0x60000000, 0x60000000}) [ 891.733252][ T3155] device macvtap9 entered promiscuous mode 03:49:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:47 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1008, 0x0, 0x0) 03:49:47 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfef2, 0x0, 0x2c6222cd1a724b1e}, 0x0) 03:49:47 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x2000, 0x20, &(0x7f0000000100)) 03:49:47 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x2000, 0x800, &(0x7f0000000100)) [ 891.996009][ T3173] device macvtap10 entered promiscuous mode 03:49:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x5ce6b47f0c99239, r0, 0x0) 03:49:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:47 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001040)={0x0}, &(0x7f0000001080)=0xc) getpgrp(r1) 03:49:47 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:48 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfef2}, 0x0) 03:49:48 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x1) write$nbd(r0, &(0x7f0000000940)=ANY=[], 0xac) 03:49:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x5ce6b47f0d1921a, r0, 0x0) 03:49:48 executing program 1: mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000007, 0x5ce6b47f0c99239, 0xffffffffffffffff, 0x0) [ 892.277902][ T3188] device macvtap11 entered promiscuous mode 03:49:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:48 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x2000, 0x4, &(0x7f0000000100)) 03:49:48 executing program 3: mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x300000a, 0x5ce6b47f0c99239, 0xffffffffffffffff, 0x0) 03:49:48 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x2000, 0x40, &(0x7f0000000180)) 03:49:48 executing program 1: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000080)='./file1\x00', 0x1400) 03:49:48 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/pid\x00') fstat(r0, &(0x7f0000000240)) 03:49:48 executing program 4: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000340)) [ 892.693815][ T3210] device macvtap12 entered promiscuous mode 03:49:48 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:48 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000dc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f00000000c0)='\x00', 0x1, 0x20000840, 0x0, 0x0) 03:49:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:48 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000080)="9aab13d5f86e1e8a42e47f025b4f289d3a0eae5d5461ace3155364089eb641ca60f6488b174a31d41a01a1c10af7ecd85980b22e48908d0768035f7df5238f7a2846d5678f8fed1b9ed729c42404dcd999c5fb36874c276e615f6e5940295130050e1936c2f0f1386e2285c12bc90000000000000000", 0x0, 0x8001, 0x0, 0x46) 03:49:48 executing program 4: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000080)='./file2\x00', 0x400) 03:49:48 executing program 3: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x400) 03:49:48 executing program 2: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x1400) 03:49:48 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000dc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f00000000c0), 0x0, 0x20000840, 0x0, 0x0) [ 893.050434][ T3234] device macvtap13 entered promiscuous mode 03:49:49 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000dc0)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000009440), 0x400039f, 0x0) 03:49:49 executing program 3: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x5a) 03:49:49 executing program 2: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchownat(r0, &(0x7f0000000080)='./file0\x00', 0xee01, 0xee00, 0x1000) 03:49:49 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000dc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000040)="92ab13d505f712df91ae5469e338d134e21bc247aa3856ec474ee53f7423a9b3b53cceb093a913da89eb6793498bc22da6e08a44eb1ff118490e22fe71d98cc3d8a8e74a1e7ea3db261ace85b9dfe6bfbe6cd8d470abadac58e75cd7752da9dcad5e970865e92200d65d7f3e63392d262785fae302f1ec8662849f8a7f", 0x7d, 0x24000001, 0x0, 0xfffffffffffffef6) 03:49:49 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:49 executing program 4: r0 = socket(0x1, 0x5, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x8040) 03:49:49 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000dc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f00000000c0)="9a", 0x1, 0x800, 0x0, 0x0) 03:49:49 executing program 2: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x400) 03:49:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:49 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000dc0)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000040)='\x00', 0x1, 0xed8e09e46c4c51f, 0x0, 0x20) 03:49:49 executing program 4: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f0000000080)='./file0\x00', 0x1000, 0x40, &(0x7f0000000200)) 03:49:49 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000dc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000040)="692d397231cd0425", 0x0, 0x24040840, 0x0, 0x6a) 03:49:49 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000dc0)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000009440)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd83}}], 0x1, 0x0) [ 893.720162][ T3275] device macvtap13 entered promiscuous mode 03:49:49 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000dc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f00000000c0)="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", 0xffffff6f, 0x4004, 0x0, 0x0) 03:49:49 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000dc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x37) 03:49:49 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000dc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f00000000c0), 0x0, 0x20000840, 0x0, 0x37) 03:49:50 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 03:49:50 executing program 3: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(r0, &(0x7f0000000140)='./file0\x00', 0x100, 0x80, &(0x7f0000000300)) 03:49:50 executing program 1: 03:49:50 executing program 4: 03:49:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:50 executing program 4: 03:49:50 executing program 1: 03:49:50 executing program 3: [ 894.397629][ T3312] device macvtap13 entered promiscuous mode 03:49:50 executing program 4: 03:49:50 executing program 2: 03:49:50 executing program 1: 03:49:50 executing program 3: 03:49:50 executing program 4: 03:49:50 executing program 0: 03:49:50 executing program 1: 03:49:50 executing program 2: 03:49:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:50 executing program 3: 03:49:50 executing program 4: 03:49:50 executing program 1: 03:49:50 executing program 2: 03:49:50 executing program 3: 03:49:50 executing program 0: [ 895.118335][ T3336] device macvtap13 entered promiscuous mode 03:49:51 executing program 4: 03:49:51 executing program 2: 03:49:51 executing program 1: 03:49:51 executing program 3: 03:49:51 executing program 0: 03:49:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:51 executing program 4: 03:49:51 executing program 2: 03:49:51 executing program 1: 03:49:51 executing program 3: 03:49:51 executing program 0: 03:49:51 executing program 3: 03:49:51 executing program 1: 03:49:51 executing program 2: 03:49:51 executing program 4: 03:49:51 executing program 0: [ 895.823735][ T3361] device macvtap13 entered promiscuous mode 03:49:51 executing program 3: 03:49:52 executing program 4: 03:49:52 executing program 1: 03:49:52 executing program 2: 03:49:52 executing program 0: 03:49:52 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:52 executing program 3: 03:49:52 executing program 0: 03:49:52 executing program 2: 03:49:52 executing program 4: 03:49:52 executing program 1: 03:49:52 executing program 3: [ 896.469798][ T3382] device macvtap13 entered promiscuous mode 03:49:52 executing program 0: 03:49:52 executing program 2: 03:49:52 executing program 1: 03:49:52 executing program 4: 03:49:52 executing program 3: 03:49:52 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x0, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:52 executing program 2: 03:49:52 executing program 1: 03:49:52 executing program 0: 03:49:52 executing program 4: 03:49:52 executing program 3: 03:49:53 executing program 0: 03:49:53 executing program 2: 03:49:53 executing program 3: 03:49:53 executing program 4: 03:49:53 executing program 1: [ 897.233760][ T3407] device macvtap13 entered promiscuous mode 03:49:53 executing program 3: 03:49:53 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x0, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:53 executing program 2: 03:49:53 executing program 0: 03:49:53 executing program 4: 03:49:53 executing program 1: 03:49:53 executing program 3: 03:49:53 executing program 1: 03:49:53 executing program 0: 03:49:53 executing program 4: 03:49:53 executing program 2: 03:49:53 executing program 3: [ 897.890817][ T3429] device macvtap13 entered promiscuous mode 03:49:53 executing program 1: 03:49:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x0, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:54 executing program 2: 03:49:54 executing program 0: 03:49:54 executing program 4: 03:49:54 executing program 3: 03:49:54 executing program 1: 03:49:54 executing program 1: 03:49:54 executing program 0: 03:49:54 executing program 4: 03:49:54 executing program 2: 03:49:54 executing program 3: [ 898.554652][ T3449] device macvtap13 entered promiscuous mode 03:49:54 executing program 0: 03:49:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:54 executing program 2: 03:49:54 executing program 1: 03:49:54 executing program 4: 03:49:54 executing program 3: 03:49:54 executing program 0: 03:49:54 executing program 1: 03:49:54 executing program 4: 03:49:55 executing program 0: 03:49:55 executing program 2: 03:49:55 executing program 3: 03:49:55 executing program 4: [ 899.249622][ T3472] device macvtap13 entered promiscuous mode 03:49:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:55 executing program 1: 03:49:55 executing program 2: recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0xa) 03:49:55 executing program 0: 03:49:55 executing program 3: r0 = msgget(0x1, 0x0) msgsnd(r0, &(0x7f0000000040)={0x1, "b65e1fdaa3389198949f3ce99c876a8f3ad28b21e347827cddf93b494ed389bde162d5911e7967df9a84a3ef726e72e910bd25313953053a4d29b2b3098a0f244d6b718ebb682194c7a155488ab3c59ec68f9c0a961f3ec8b8d9329b9e3e8b9e9b7198c9e2294494acf9f68b7167635fba2f43c60bdb8fa685085014c5fb940c07071b6df196a15aa3061b11f2ca909ca7117281997765014d3f42a7631b6d178275fe99f83904fdec12d438835a4604687221444fcd178f238d8ac111a74e7cef1a5ef17dd7854d30761188f8b120fd87bccf8c33c9d5f5f2edf1b3387569"}, 0xe7, 0x0) 03:49:55 executing program 4: r0 = semget(0x1, 0x0, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x800}], 0x1) 03:49:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) accept(r0, 0x0, 0x0) 03:49:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xaf\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x88\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) 03:49:55 executing program 0: r0 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000040), 0x12) r3 = getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000580)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r3, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000300)='selinuxposix_acl_access,keyring\x00'}, 0x30) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000000)='ext4_ext_put_in_cache\x00'}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000035c0), 0x8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)=r4) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x2, 0x5, 0x8e, 0x1, 0x0, 0x5, 0x11000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000003bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003f80)=ANY=[@ANYBLOB="58000000000000000e010000c12347ddd393378b0cd01205c0c7d4bf5e0d46e886d3d81e19a502a73e712a787802874f4f290bd31536e220f30601486b54b7bee2e71fbbbbde9bcbfcf0b018b4fefbd6f647454e2b141f0068000000000000000000000080000000ff5ce2157c85c7bcc7f7da579a4e3f30940f2cb87d42576f019419a3ed496374aeacaf520af1ca6d57ed46e72f90ea4dc6474455e1676a5905ef4c1c0b3152a6cc1e3b491b1727424fb45b3932504c736e528682a1000000c800000000000000ff0000001d63000076d874da349c34af188f26ddb23b74ad6c95fa94b942469a2006a459b774ffc821e48fe0fe4b708c032c4259d70c2c3ec754abdf68019d0b17f611d17cf996393d4a2a8d18722aa27a530e192cd40ecca95f7c1881e2336638bb3a34bb7b40ca62099f9ef1abacfd1921a7c4f9e0648645e7df5cbfba2c23f2b6e0462ea379264c93cdf4d8eecbd21227d9311b82ca368ba55fca5b42b3319ff5b944ccc79cea2afd953ba07201037429b0e087aed65656c59d1c433314006800000000000000190100002f0b0000cb2ee2a83a2ddb285c10264e5ee76df4b86f420fe0071a16a62cb40979261356d6dc5474726869b2dfb0c3e60ea3d7e207dfd89c6201b69c3cc74b2e9023220000000000000004fce7f20cd4edce149f9a284d4000000000c2462e63b85a1c76fd8415a8fc9811893d34499e7dd5b6315b20784094210d5993681b8328486f755998d6c50c2d7b19c718efdcb1ef3e7f8663021c0fc1fb209c3244de83e98a324254ec08804d807b27903c4afb20fc3c96d7ebc4859afc286e25a14957663a5b87f56f08000000000000006a74ac9bc8c0fa256e054b47d12f2b148fe49a0a442fe1093c8339f0a8205bc3de03f00d6d7202358d457500014565878d6be708df0ca5fb8a297f9ecfd7b3f3969ebc27f8bfde0cf1159427ba4eb84770caa4127283e5cbd763262ce39850ecf8d04670100a668916284084b3f7e6eede7105a646"], 0x1f0}, 0x4000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000002c0)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 03:49:55 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x2}, 0xc) 03:49:55 executing program 3: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_UNLOCK(r0, 0x4) [ 899.839350][ T3495] device macvtap13 entered promiscuous mode 03:49:55 executing program 1: semget(0x1, 0x3, 0x686) [ 900.353506][ T3505] device syzkaller1 entered promiscuous mode 03:49:56 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000840)={0xffffffffffffffff}) close(r0) recvmsg(r0, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) 03:49:56 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/99, 0x63}, 0x441) 03:49:56 executing program 0: r0 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000040), 0x12) r3 = getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000580)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r3, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000300)='selinuxposix_acl_access,keyring\x00'}, 0x30) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000000)='ext4_ext_put_in_cache\x00'}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000035c0), 0x8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)=r4) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x2, 0x5, 0x8e, 0x1, 0x0, 0x5, 0x11000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000003bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003f80)=ANY=[@ANYBLOB="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"], 0x1f0}, 0x4000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000002c0)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 03:49:56 executing program 1: r0 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000040), 0x12) r3 = getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000580)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r3, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000300)='selinuxposix_acl_access,keyring\x00'}, 0x30) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000000)='ext4_ext_put_in_cache\x00'}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000035c0), 0x8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000280)=r4) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x2, 0x5, 0x8e, 0x1, 0x0, 0x5, 0x11000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000003bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003f80)=ANY=[@ANYBLOB="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"], 0x1f0}, 0x4000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000002c0)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 03:49:56 executing program 4: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x1014, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 03:49:56 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x77d6f7c96b972ed2, 0x0) 03:49:56 executing program 3: madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 900.930655][ T3545] device macvtap13 entered promiscuous mode 03:49:56 executing program 0: bind$inet6(0xffffffffffffffff, 0x0, 0x0) 03:49:56 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fchown(r0, 0xffffffffffffffff, 0x0) 03:49:56 executing program 4: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0x0, 0x0, 0xffffffffffffffff}}) getrlimit(0x0, &(0x7f0000000040)) 03:49:56 executing program 0: clock_settime(0xffffffffffffffff, &(0x7f0000004740)) 03:49:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0x62, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e6"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(r0, 0xffff, 0x80, 0x0, 0x0) 03:49:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, 0x0, 0x0) 03:49:57 executing program 1: socketpair(0x0, 0x0, 0x4, 0x0) 03:49:57 executing program 4: shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x2000)=nil, 0x0) 03:49:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) 03:49:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, 0x0, &(0x7f00000000c0)) 03:49:57 executing program 4: 03:49:57 executing program 3: msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x7) 03:49:57 executing program 2: r0 = msgget(0x1, 0x0) msgsnd(r0, &(0x7f0000000040), 0x8, 0x0) 03:49:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000840)={0xffffffffffffffff}) close(r0) close(r0) [ 901.693035][ T3582] device macvtap13 entered promiscuous mode 03:49:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) 03:49:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0x62, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e6"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000fe9000/0x14000)=nil, 0x14000, 0x0, 0x10, r0, 0x0) 03:49:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x200, &(0x7f0000000200)=0x1, 0x4) 03:49:58 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x41, 0x0) 03:49:58 executing program 2: mmap(&(0x7f0000ff1000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 03:49:58 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x200, &(0x7f0000000200), 0x4) 03:49:58 executing program 3: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6) mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) 03:49:58 executing program 1: semctl$GETALL(0xffffffffffffffff, 0x0, 0x6, 0x0) 03:49:58 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 03:49:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) [ 902.379073][ T3618] device macvtap13 entered promiscuous mode 03:49:58 executing program 4: mmap(&(0x7f0000ffd000/0x1000)=nil, 0xfffff, 0x0, 0x1015, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 03:49:58 executing program 3: setitimer(0x0, &(0x7f0000001080)={{}, {0xfffffffffffff801}}, 0x0) 03:49:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0x62, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e6"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:58 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) connect$inet(r0, &(0x7f0000000100), 0xc) 03:49:58 executing program 2: setrlimit(0x0, &(0x7f0000000000)={0x80000001}) 03:49:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000840)={0xffffffffffffffff}) fcntl$dupfd(r0, 0xa, r1) 03:49:58 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x2}, 0xc) 03:49:58 executing program 3: r0 = socket$inet6(0x18, 0x3, 0x0) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) 03:49:58 executing program 3: accept(0xffffffffffffff9c, 0x0, 0x0) 03:49:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x801, 0x0, 0x0) 03:49:58 executing program 0: setrlimit(0x2, &(0x7f0000000040)={0x60000000, 0x60000000}) [ 903.026945][ T3656] device macvtap13 entered promiscuous mode 03:49:59 executing program 4: 03:49:59 executing program 2: 03:49:59 executing program 1: 03:49:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0x93, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c2"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:49:59 executing program 0: nanosleep(&(0x7f0000001080), 0x0) 03:49:59 executing program 3: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6) munmap(&(0x7f0000400000/0xc00000)=nil, 0xc00000) 03:49:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt(r0, 0x0, 0x0, 0x0, 0x0) 03:49:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002340)={0xffffffffffffffff}) connect(r0, &(0x7f0000000580)=@in6={0x18}, 0xc) 03:49:59 executing program 1: 03:49:59 executing program 0: 03:49:59 executing program 3: 03:49:59 executing program 4: 03:49:59 executing program 1: 03:49:59 executing program 2: [ 903.740565][ T3693] device macvtap13 entered promiscuous mode 03:49:59 executing program 0: 03:50:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0x93, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c2"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:00 executing program 3: 03:50:00 executing program 2: 03:50:00 executing program 4: 03:50:00 executing program 1: 03:50:00 executing program 0: 03:50:00 executing program 4: 03:50:00 executing program 1: 03:50:00 executing program 3: 03:50:00 executing program 2: 03:50:00 executing program 0: [ 904.387596][ T3714] device macvtap13 entered promiscuous mode 03:50:00 executing program 1: 03:50:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0x93, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c2"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:00 executing program 0: 03:50:00 executing program 3: 03:50:00 executing program 4: 03:50:00 executing program 2: 03:50:00 executing program 1: 03:50:00 executing program 1: 03:50:00 executing program 0: 03:50:00 executing program 3: 03:50:00 executing program 4: 03:50:00 executing program 2: [ 905.016925][ T3734] device macvtap13 entered promiscuous mode 03:50:00 executing program 0: 03:50:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xac, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:01 executing program 1: 03:50:01 executing program 3: 03:50:01 executing program 2: 03:50:01 executing program 4: 03:50:01 executing program 0: 03:50:01 executing program 2: 03:50:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$netlink(r0, 0x0, 0x0) 03:50:01 executing program 0: clock_gettime(0xb16bf156e850dd13, 0x0) 03:50:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000c00)=[{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000d80)="b96ae535d419ad857012e8b4cafac28dd6dafa020f634b0abb77ff62dadcac04d33ad5a1c39cf9abf51bd9fd783eec1b487b43f03a13f1bfd711fa04c9a618667b1b7cf4aed363a1a019c1fd0bbc28ddaa0f9a553c5af28bf1ab112acea588a45afa52c949d1713d5fa23d3f8d83e91b35401502856f008289f50b037c876e50dbd5820deb2a61d17a1d6c628e9ac247b940c5d383a2bbb55fdd817af7e56ff620eab312be2ac42b91028c9beefc25e36acb5f82ba9264e4f9a2f913a6d6", 0xbe}, {&(0x7f0000000080)="609c23ad49098e51c3758a5bc02d9480402ade9d44ca773c3becb8c0a76caf407800cfb215446bb91c041081149ab5b5918fdaf69c2fa7745aefe6a417cbc86d172554b89e981d3bcc2df642d5c3a3dccaa6ce674ea156fb47e325c26618", 0x5e}, {&(0x7f0000000c40)="65a2664ee1953a64a7427e309098789e4c50903d1024cbc5d547b4938a18de8b8482ab3f276ddb776c38ece27a7647f63b4cb3da836c826c8ef69d17851d4f3c547ab71950afdcb153e3caa44622a6ddcd2e807864f589e03059d7d6b4ab13a8", 0x60}], 0x46, &(0x7f0000000400)=[@op={0x10}], 0x10}, {0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000b00)="95aef515c3a226df4b631e75816c1b9196de70ab9ca3accd00fe2a4eb993d71bbb5a211acd96667cd6bca93e67b757f6964be85481c2c82cb8e6646e81b6049579764e5302737c0088a3f4966cb6ae92895a824f442973b323885aa7dd18b59ab44f34c08fb916885495cb0b56a6ba0d912e0d278258eb6fa8d245457f0a6e0be7f7693b0b4be5bc9b0cbfbdd8116d24b6d746b0a9d8bef3404add9a8884590e79a9db21f685ea0ba2f1183c56ee4e3df193b0dc5caf05ac4a8945b075744f2ae054ebdef026a1", 0xc7}, {&(0x7f0000000880)="56e0776e1959eec54acd9eb65e3f795f4bcaa3a01f0ebbb083b96b", 0x1b}, {&(0x7f00000008c0)="bbaa0d41afcf4121497a4328837b80a6574e50bb6507d8202743e9b496b80e18b4e906eecfd7f4c6248dc3560dbb501a45d9fa5c907841e23d5b12e227b907e2646bfc922b0892dc540a12d14df80adaa30ed40335c5da01dbe0dcd0133b6cd80848fa9329a7705cbb692d26e91094a5c2eb1bd84879b95a4d6774c9a828c2922166bd76db55971b2443e0b6f9d8f90a1358573bcbefbea43642976ddaec81cff66e42e343e572456f6af9a9206993914f5aa8", 0xb3}, {&(0x7f0000000980)="1087a18fc77b814f61bc209daeb22470fdb777001c87058742b40f52a154f8639dc9de0d7b2fe6417ee07d3812fedd4a96f3bc8495c5b94a1a57e30e047215b8831cde5ec6cc5794c161bb00ce0220de4b0a6fe36ccdc3f92491284506cd6e4450814b271788f2fbb7bc920f0ef72714475120f7f5fef902712a1cc56b1a88858c8556ff836086b52faa092c7e122858e558089114", 0x95}, {&(0x7f0000000cc0)="f5d40f5badd156cfe55c8223716173a4f451bdc8d03a1b70563b677d472bb1a975d17f4ac62b23c2200ea90cf96b370ddc597bf2a0af63605744ded012b3f015033afe595389a2de7a4ba0cd2216e4f5a90abcd262ffd22ba4188c4b808449f8b07e1c9c5da197f02ed6c54bf5dcf34a4ca00e843642f4907d7e5031dee3c0c12aba863996021788459c6c6207278727223375663027a44395a0f1b3396df8f768a5faec7ea8832ef19869", 0xab}], 0x5, &(0x7f0000000e40)=ANY=[@ANYBLOB="6800000017010000020000005600000070f6bb39665b66990af56fc1e93efaf8b1f9b0be89c83223d939e629668b50129eea720e16f374c1a8317e2bfda8b876ea6aeaa889e2985ad0a14abd47b6179b8a7c14412cf0b1525c000010000000170100000400000006000000100000001701000003000000010000003000000017010000020000001f0000003fac1ffff29b0705330eebb8f807e92206000800005548da4e7afeba01000000100000001701000004200000050000000000000000005a865b2de4faea"], 0xc8, 0x10}], 0x2, 0x0) 03:50:01 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @gre={{0x7, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@timestamp_addr={0x44, 0x4, 0xec}, @timestamp={0x44, 0x4}]}}}}}}, 0x0) [ 905.629490][ T3755] device macvtap13 entered promiscuous mode 03:50:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002280)=[{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="b8f4c02b590b422bab7b0e4624f7b0147437", 0x12}], 0x5a}], 0x1, 0x840) 03:50:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xac, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:01 executing program 1: open$dir(&(0x7f0000000000)='.\x00', 0x412081, 0x0) 03:50:01 executing program 2: 03:50:01 executing program 0: syz_emit_ethernet(0x14e, &(0x7f0000000080)={@local, @local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "5272ab", 0x118, 0x2c, 0x0, @remote, @local, {[@dstopts={0x33, 0x16, [], [@jumbo, @pad1, @jumbo, @enc_lim, @generic={0x0, 0xa3, "b89dad2757c2c6171f8c30e02c40cc8c1d434cbb14c42914814c810807f8ce8c9a407dbf9f24e37f08376d7b4378a9f632e371b8558a2c7cfb680c2cdbd17dac8ed4d1842b6d9c339e50c87335c0219df1aa81703659cde903e7ea28aacfc2b9e21a8c936fb19c3625d4676c6173a47472fdfc83bd37b909fcb68d5673c6379cf933a1f5307525818cc2b8afc45fea94088b0ff646bbf84e233554a0fc2a61c72371ba"}]}, @hopopts={0x1d3, 0x8, [], [@hao={0xc9, 0x10, @mcast2}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0xbd}, @calipso={0x7, 0x8, {0x0, 0x0, 0x2, 0x1}}, @generic={0x0, 0xc, "d73c3228924f6f6fbc4efe27"}]}], "0387938eb19756d9"}}}}}, 0x0) 03:50:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000034c0)=[{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@iv={0xfffffffffffffe5c}], 0x10}], 0x3, 0x0) 03:50:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqsrc(r0, 0x0, 0xf, 0x0, &(0x7f0000000040)) 03:50:02 executing program 2: clock_getres(0xafe17a9d5fd41ce4, 0x0) 03:50:02 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "5272ab", 0x0, 0x3a, 0x0, @local, @remote}}}}, 0x0) 03:50:02 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "5272ab", 0x8, 0x2c, 0x0, @empty, @local, {[], "0387938eb19756d9"}}}}}, 0x0) 03:50:02 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0008060001080006040002"], 0x0) 03:50:02 executing program 0: socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x6a, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @gre={{0x6, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @private=0xa010101, {[@ssrr={0x89, 0x3}]}}}}}}, 0x0) [ 906.333187][ T3788] device macvtap13 entered promiscuous mode 03:50:02 executing program 1: syz_emit_ethernet(0x3f, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd605272ab00092c0000000000000000000000000000000000fe8000000000000000000000000000aa03873dab"], 0x0) 03:50:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xac, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:02 executing program 2: syz_emit_ethernet(0x6a, &(0x7f00000002c0)={@local, @remote, @void, {@ipv4={0x800, @gre={{0x6, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr=0x64010100, @private=0xa010101, {[@timestamp_prespec={0x44, 0x4, 0x7c}]}}}}}}, 0x0) 03:50:02 executing program 3: syz_emit_ethernet(0x6a, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @gre={{0x6, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @private=0xa010102, @private=0xa010101, {[@timestamp_addr={0x44, 0x4, 0xec, 0x1, 0xf}]}}}}}}, 0x0) 03:50:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000015c0)=[{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)="486bc513f22a548e3f948246c2d0e26ebe7157919cb0268b808c1ff4ce995c37d41272ed622472fdd960e50623fbf60bb52f87b52761364be624db4edbd00dfa66a1af5c0d70a7537ccb1c135da6f1dfd284e692883efee7e734d7ae8911f579db3248550af72f1e6c3845b09a3d6ef9b6c2ba653e0abde1d4f2a6d0238d51a444e581f02659578c3dc068455da840c96879442c532b28351a"}, {&(0x7f0000000180)="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"}, {&(0x7f0000000280)="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"}, {&(0x7f00000000c0)="e65f90883f25a1608ca080236271e9554ebcfb57436c992819a680a2"}, {&(0x7f0000001600)="9c9f9a081fba36fa0304f6b40bfd7f"}, {&(0x7f00000012c0)="8c751df8ab690dfad08dd6d8cd97a11c094d45555e00a2e8cc4319fc57937c65e812ab5c9593d3c4a3092a39a022b88b2e4c968e703f30e994c38b06397f4ad032980267bbd887f15a988be7235abfbf9c07647d74fdb66932ef96a27a3ebc4d977628b5c5f221d737d7a1212b99d2d4aa38c6451629e1458a31a4167f7aff1c21968ecd31197aed973654a9604d6945b32ceef5c6d28ff6664e1009a9047b4a0f4b134631aa4396fc552c7e7ad56a7f4a68ded2fadfdf57158ac30650d97c906d641b8f7dca894b7a34fdec97803308b751cb216e8059562f9a76219ea604dbf31be1b50434325734cef1c1c8fdb835"}, {&(0x7f00000013c0)="f9c35e9510ceca5b481c9d2a05b922ce0137352601a81c400e111542e90a99bc89d29b425515fb73d361f6efee2d14937189f68ff43b2f702668117173aff6c5b1639602e4a8ee6d972f65d42c741903a34d001123573b45a075"}], 0x0, &(0x7f0000001480)=[@iv={0x0, 0x117, 0x2, 0x0, "4d8d0d4e2d6021a8a779592c36c082700a6b4b447527bcc469b717a795388d7409b585497b04dec988655b47f3b9a3fe9bd83d2654c30127c09fd6c5fc0f5c34f630cda7ba9494805c94517482e1f4205c6440ccd49c0a985045b36bca3b58e096bf19bcee5c043d35ffe23538b90f509aca8db82e6c52fcbcd00f4fdd8bd624d4ce47a17afa0ace4c4d66d63c78e7b48f5c6ecb2bc8df06314dcdcc2cbc936228616e218b564a840dbc9d6751bb543302131e73f166c8ddd052d7208d805d4248f0396e53b2270e4a268f02cf25e9901df59c6a0c9f3a6fb2f7e9027268191fb058e886183461d0d0b2099294d620e01aff20915928158896"}, @op], 0x0, 0x880}], 0x9249616, 0x4001) 03:50:02 executing program 4: syz_emit_ethernet(0x32a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6084bcec02f40600fe8000000000000004"], 0x0) 03:50:02 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @remote, @void, {@ipv4={0x800, @igmp={{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @private=0xa010100, {[@generic={0x86, 0xffffffffffffff01, '\\D\b\x00\x00\x00'}]}}, {0x0, 0x0, 0x0, @local}}}}}, 0x0) 03:50:02 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "5272ab", 0x8, 0x2c, 0x0, @empty, @local, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}]}}}}}, 0x0) 03:50:02 executing program 2: syz_emit_ethernet(0x72, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @gre={{0x8, 0x4, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @private=0xa010101, {[@lsrr={0x83, 0x7, 0x62, [@multicast1]}, @ssrr={0x89, 0x3}]}}}}}}, 0x0) 03:50:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002280)=[{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="b8f4", 0x2}], 0x1}], 0x1, 0x0) 03:50:02 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000300)={@local, @local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "5272ab", 0x8, 0x3a, 0x0, @local, @empty, {[@hopopts={0x84}]}}}}}, 0x0) 03:50:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) [ 906.987913][ T3821] device macvtap13 entered promiscuous mode 03:50:03 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000100)={@local, @local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "5272ab", 0x4, 0x2c, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1, {[], "a6d9690d"}}}}}, 0x0) 03:50:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xb8, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa1"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) r1 = getpid() sendmsg$unix(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=[@cred={{0x18, 0x1, 0x2, {r1}}}], 0x18}, 0x0) 03:50:03 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd605272ab00082cfffc000000000000000000000000000000fe8000000000000000000000000000aa0faad43892b15ced"], 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(0x0) 03:50:03 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "5272ab", 0x8, 0x3c, 0x0, @private0, @local, {[@dstopts]}}}}}, 0x0) 03:50:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="81c6e9e93daeb2236c9adf2a3c5d2c297af96a3c2254f999c808678a0c8ce77f48ee808b0654923876fdf0bf537b2ee3746697bb51817ffec3695466109bff2d670cd18caa5bae960daa02df65ce0809505b6798da0b24dafe542117c700551668bce61a63be12c0addbede174e7e3a6718ab647ad698b5076261d31d2dbe7591d5ae91a3b5401e9240e92b8ae05b7c8d469b8", 0x93}, {&(0x7f0000000080)="0d65ad190ddd89e00562026b121cb5891829ff558f1f202f53be86ccc52f374ced9e51207c4b1470e56e97a783", 0x2d}], 0x2}, 0x0) 03:50:03 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r1, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x6, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x0, 'rr\x00', 0x20, 0x0, 0x57}, 0x2c) 03:50:03 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @gre={{0xa, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @private=0xa010101, {[@lsrr={0x83, 0xf, 0x62, [@multicast1, @empty, @multicast1]}, @ssrr={0x89, 0x3}]}}}}}}, 0x0) 03:50:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqsrc(r0, 0x0, 0xc, 0x0, &(0x7f0000000000)=0x52) 03:50:03 executing program 4: r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x41, &(0x7f0000002040)) 03:50:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000034c0)=[{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@iv={0x10}], 0x10}], 0x3, 0x0) 03:50:03 executing program 2: r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x0, &(0x7f0000002040)={0x0, 0x0, 0xffffcbbf}) [ 907.652690][ T3859] device macvtap13 entered promiscuous mode 03:50:03 executing program 0: r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x1c, &(0x7f0000000040)={0x0, 0x0, 0x40}) 03:50:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xb8, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa1"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:04 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "5272ab", 0x8, 0x2c, 0x0, @empty, @local, {[@fragment={0x0, 0x0, 0x0, 0x1, 0x0, 0x4}]}}}}}, 0x0) 03:50:04 executing program 1: capset(&(0x7f0000000040)={0x20080522}, &(0x7f00000000c0)) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 03:50:04 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "000400", 0x8, 0x2c, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1, {[@hopopts]}}}}}, 0x0) 03:50:04 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "5272ab", 0x0, 0x11, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}, 0x0) 03:50:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x12, &(0x7f0000000000)="9e", 0x1) 03:50:04 executing program 2: capset(&(0x7f0000000040)={0x20080522}, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{}]}) 03:50:04 executing program 1: perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:50:04 executing program 3: capset(&(0x7f0000000040)={0x20080522}, &(0x7f00000000c0)) setuid(0x0) 03:50:04 executing program 4: syz_emit_ethernet(0x32, &(0x7f0000000240)={@local, @multicast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}, {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 03:50:04 executing program 0: capset(&(0x7f0000000040)={0x20080522}, &(0x7f00000000c0)) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x8, 0x0) [ 908.368814][ T3895] device macvtap13 entered promiscuous mode 03:50:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$unix(r0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [r1, r1]}}], 0x14}, 0x0) 03:50:04 executing program 4: open$dir(&(0x7f0000000040)='.\x00', 0x43e881, 0x0) 03:50:04 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) 03:50:04 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "5272ab", 0x8, 0x2c, 0x0, @empty, @local, {[@fragment={0x0, 0x0, 0x0, 0x1}]}}}}}, 0x0) 03:50:04 executing program 0: r0 = openat$dir(0xffffff9c, &(0x7f0000000080)='./file0\x00', 0x140, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={{}, {r1}}) read$FUSE(r0, 0x0, 0x0) 03:50:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xb8, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa1"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:04 executing program 3: r0 = openat$dir(0xffffff9c, &(0x7f0000000080)='./file0\x00', 0x140, 0x0) clock_gettime(0x7, &(0x7f0000000040)={0x0, 0x0}) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x0, r1/1000+10000}, {0x0, 0x2710}}) read$FUSE(r0, 0x0, 0x0) 03:50:04 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @gre={{0x7, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @private=0xa010101, {[@lsrr={0x83, 0xfffffffffffffd99}, @ssrr={0x89, 0x3}]}}}}}}, 0x0) 03:50:04 executing program 4: r0 = openat$dir(0xffffff9c, &(0x7f0000000080)='./file0\x00', 0x140, 0x0) read$FUSE(r0, 0x0, 0x0) 03:50:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003300)={0x0, 0x0, &(0x7f00000032c0)=[{&(0x7f0000001140)="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", 0x107}, {&(0x7f0000000140)="fb68740a54145825a1736b1cdbe5cf20eb5aff7df21267540c6fd0c8b4faec93dddd4dc596d502dd959410f248f9b31e65868299993af278c4be9b396c4fa1d83e678fd89620140bf3beb7dbc565befb7f34a01aed68fca91d423562b9bdf1e85d5942f3ed1f462bfa6094c80177289d463b193f870431f9e36c4755ca684f9f066e21d3356c00873d1b986e7cce9bf6e3065ef143c5bf5142a35d50a94c45a3fd810b50206a75bc2c9c084d327226449848ab11402f30dd13ab9ba2254422d19f1aaa7a4a91b5477ec92d511b7a5690dc5d8f9e15b2d21b3d9022ab82e943b83a362f52012ec87a2afb9a55e63209957ef46cc7e71cda6f172f5bc05a266dad481ca3fb495106be71f8188fa84876dcc4fde56f13905be13a61a22360ad99fc24041fadfb09a1ecbcdb4cad6686cff6495648d41b64e85ab0595055e248776262d4379cfb72d4b6aa036a63bb6257d5554ad32aece4b321ed035055cf78fcc8ca9bb18da163d832e03c998c1a9510805cac36f9eea57ebb46299efc82a5192503939c4278e9f999c38b0beb11f3eb8d161f28e7bd00bbd0d191861b780968418fc1e3da140662008f00025ea26838ea24bc011b83619630f8af8cc4e2280176e2a33caba1cb3b3ee8e1101b82ac88fcee4411083401c2e8555d694970f8c2d22bfc9a361a228b5b670f36d2ab91af1a937755dad2bf5eb4dedd7010a970e600263c69b200d072dd2f0835aa56b26f586a8878815e25c6fbeb9f0bdb9d532f0a1e1d88836fd9c2a0b9d3a9c9bd2837ee8ec609f1f417441097f6ea806e2e8b34bd7442f2da919793ab4f7d109f87495810a2a8abf4f225b1e3e4d57480ab70523dc954273f4409559458202c3b9f98e822c918a39f09b7e4a2b1044e870628ee5daa71cdcff1831450571be7f635c37eab852d367d6a62be575ec4773ab3cc29f5a5f7bf08d20caf8e896d4b813704e87630dcd14310b07f42c563bc1c9450954467b0ef3ac98d90908c778d3b0bc648b2fbe2c3afd3c41eaa2f36db84d24b8f6a101847743588ff03eecce6170befa6d88aeedefbd974ceffc460e01ff035ad9c9ec87545477c8a50e62aa282d0b57f49d24eaae131ae8589caab5bef78830e731403c212146c44c419f12755f3e30b67aebb9e3542f50031dc7e2cb300e07125be180b20bd926f0b324cd1b377c40928293b2a0fb501afc30710d7370c359175b39ef1fcfab096aafb737ebdf6883450233968b89b2644b6367c80d9d59cbded417713ad41f673c0ee5f6ad556fd7244a67e8c32b74b346da0acfe306d972653e32129a851200cc1c2c180da91882174c8d0e4a3bbf3f9b3dfdf3dc47effcf8327bd7d341b4390bcdc517d512c14ad427b609e95b985d3ba2f89fa335430c9dc4e3e5aaca86c87a9b61a48ce6f6062ae93f7d54830055a918a0945ef804c7e68bc6502e45dda03ce0123034858da59699eba4cd6db77743adcaa0dcb84469722857def751c7096679ae62d0777757253841d38c4d4fcc2a22e62612018c60f0802e4d6c0c09d5c1067ae2abd621b73e97a98eacb7e71714c7b42f6429978eb4692db3cfa829331b8f8b26789a6649f1aed34fc17c3f69c36b6d711d1ed01a651d9a6a9427b3be01760003aa810c32a83f7336b2bf1518e6aaa6ecd99608abae68798591eca4af783eab04b8679c6a8c9fb8e151bcd0303f09737422b4ae4c6ebc8f01029ad118852d30b1adc5c6621989bca5d87ecffe542c12bd984791a7157b4482f8f18cdd52ad5177f30f7d3dc4e0985bbc50f67c4e66e2e55fb9a995507a552ffa754e094e3ffd68b7cf368c2ae458da81395dd1dc831bd3f9798ed1fc0198ef416636c0801b26ae61891cdf99305492dc23a3b1bc69e756aff5307df826bcc926d4dd400b06f147a6c0fbf9e99f6e0e0b0358f9c217047cd1af310b812b2efde324709c258761ec5c6f719c2bd943dbd6ea8081cfb6354a1df0db5d7b41db047108408bab527dd2d05b5f968550d77dceb377b6cbc968cb33a8982e9e99c025328be615dc0b77c21455e6ab3e322b1a70e20790efe94c2e858bb0a3b5c67ed8b10cc64adff6315f538b37f35e92431a8ab50f1c8bfce54e4ef7819546310af789f7d60c0d3a12c003081ec5f17d5407ae6da4c3a75d7d447edc81e26c070332e0de51b2886a8ee08e684bc0d1ed889f5bb9b4d9473c23c9a097cc2ebe96cc3c2c356259afa1aaf0e6cab462f9a21b723ae9b3726388aac9d3a485aa948d160f6d62fc2e4d1e1e743d960b5b5737a4114c373a7668abab403fab98d285bfef9c53e8a385d9d45739025f54c7956ccfec6b9a9bb449e0383e94a0d8e3b473b84b3d9de3f6fb7e2915b195480095cd155751c0d46aae81889fd46cbc4026b39e4389d89948bd36bc04a1656fd6c638286cdd29a2fadd803aebebbbe49b046be5eac2aa2513106b1fb4c8fbc5b24289163044f06689a64d775e7e2395ad00e90ce7323e6300828c008fdf5b3a39d4c977bda69f10bca6a426ec561ba3cd3e6af2e5f4431d2d02526235bc0b370e7214f864ffb10e90bbfbdea1a53cb4aa8d60fe8b2a2cd249f687fdd18f6709e5b86b4c94aaec33b685b25f43488861c9de3e250463b7b7061fc4f0add950d25a9b3cd8d25053df3a853ff36e3de73b5bd5bc57ae869a3088b65604530f7627b3c6de8a60c5a1ba8018e5b840a2913140d92e4c1142a26b2bcf609e99c7a17072240916947ed15f9060e2c4c91af203402752863c3c2f00df61afd92f50c056a5ef94b1a946d2c25b6fc1b39db3d260e0f1e5360b815dc5c8824f7c974b5d4800745837bcc5532bf4d945a52db5a44940f41d9d8748857c01dc141047a9ddca2afde856db9aa9f52ec9fb4734386779c8c394eeba498cb4ecc82e664b324cb6e1ff598573d7fbe3fd164e80e7b17caeecd4e0eda961b5fbde96fd5b222ced30034cd07b793029495e36ebc63cc9110c5016b352c69c70e830f09872624b674e53372245d372187b6e638d196f8a5b334e51ae6fb9b0b2066795142081d679b81d496e4bb3584b7387b4da1fa4fadb94e65a830aa696380b6a21c3e69f1b56f43ae2e4a076fb0614ceb47a3a624e4d5c04ff4a0873f76aff9cbe8f57026f165d5a77cb63d26366a5798b1ce008caf9a2dc55cf211581fa689c3fb6fab5fd08aa065dc1d1a1962d020fb8ba8e013824410c842c93655ab95a1762f26b66b30da4ef0e0964ef482ce02a9364a3f4a4562de0de9c2be0a423f2b26575fff8a9984e4000ec01cbe3ec87827cf30a41f716d7cb4de544481dfd1f046825f359e3772ee175eb213299c83f922c0e4bd955c29a30ec59b7bdb7a329dbda376b9598034ae1199e610965ad2d9ed52774d87dff247cce3a184a268f357dc0d5b2c57ab169a5534a035f7abf42c26373b5c5ce8b24357e37e975e03a857a0fb2abaf1bf4b15d41a727a582c9fe811c71072f177d20c27917f9143eb21c2493b52803b320a7f731d82c68c7d69584dcb1ed94e99a623306df69fa7ca3ff5bcf9f6fff7ef2ad69bad03ff6b73c7a8181e807ad472e59733499e31443f158d170475445a2a89675059ab11246aa49bb0a27bb7668c64ddc319445911e590c51ca6c8404c50afc0d75803572c3768f52742903a3cb1a89302546e78319a9a509c1e98a55af4f274c1385a2199b49e1e85a1d53b90e3cc8130f037269b815da1bb63c55e5a71fed882943254267acd1f3c7217b940d11dc1e860848ba961a99f5bd4b62b71524e123d643bdf0460a7c4bcc51cd743219ae3e9640f36515769dd9cfbea5e2b2fe9e7105f9a129af2988cc55c5ff74c02844c800a46db4267b0aff199ee3528665d067f4ceeb6b2caa107fb1ad14a26ef66f0995a191dd1ade3e3a98fd43c40e91a7ab915282c235e02bb435ef445acb13d907ecb586c62ec2a69c45688713043b694c67d510ee1a58c00d5bbab992930ebd95bf1e0eb87d3647083a512a1a8cc610c5979576b907b3c2876eaa755efe67e741dca695b76d2c12bf097edef0bc6520d701f6e88db02bb96dc45ffac289f04bab78b6fb0cc2f55144dab58416b6a31bc61c73f2ca96a8307d706a30fa4bc500cc244523d9665a6f3779c72a253c4b51ed0a87c42c971dad06e8c79d69ddfce02f091a8bdbfd551ee471cfaba0eb610b1429b7739d3d5518b9e81b87fbb54d3f7adabda768ccd8f56303b16b87880b195e5671bdd3615409d0169e775141aae29ea21d1911ea6227e15574729f63d89bb25399011c8c6da091be5eb3024f32c725e38ad8630ccb5a3b66d18e505f7c612aaf146b09902d43c31d4c97ae80250de25450f94f90367d53c283be6cb33af5ff6ddb86d68f12cb13ba27e603b4fef92795018fe35d071f8216de99e441abc1a2220cad5cf3e7ada4a7011c262f05e85570e51b2c8f090d29a51895ad7b1065513639c931b71ca06b7c962becdcf47f4d6a620501139309faea047ef60537c2864c69b7e75fe5acd3507d6ae54fb58b8723e21aedc64c177ef0731d4cb8f54903a4bb242715df4d68f1c578a9ddb3741a27ac213ba30770def63df13f1ba2d568be0ff00f159ecccc948f5578a954299f66af2c43fdfb49c72b89459c8622ceb8d2500d5f1c66bdf43322e8b4a9021731f3470e16831a47605054417600edb3dd2f94b4779c8587b00156564e88a44461cf1cd891849b1c6d51f09f1e04508cf2a14fbc25f9b0b63f00d7262d5312349ba0ffa891b4cd5d5410fdebf4a56c9a9a8a17d3c5d388bb45715b3955082ab3be57a8c2dc1faa83e30d2e2410518852503a81c335754f1658d45eab28ac28b6247f44f236680e14eabca6b0a8a2fdba16e2d11b1cc4e61a68955f536d5dfc79af3ce221251362a4b6523f7e275a609c9d7e0c7fcb198fa9dbceeb35973cf490b1ba9fb7e71c7724181e75dc2f5cf979908e1a66b7d3d384f13927384cf41c6ef9ade1d9666974d63683bea481b3fb3124172acbc3519b02328eb8f323897651d7c36e3bfab43b4b2fb3eec3d415b42630e976e43b7babd42f7be84ff6b340588e8ad6fd715091f88b616cedde599202aae37ce039e58e7b22fbd951e0c8e6ff2f0fca51a68821920ba3737699f5fed48834a20c350f555f0bb2c4003b377c928e25528ad0813dc41216ffbb88d1694552c2c2a262f9636da13fa4cca4455f7aa6a123d1636bf2a2d8dc92cb6e53922813fff61b81592311df02a2ba6597ac154f1872c47813d46831473f43a5192f9eababda4f251cb1075bc77e559d3d42b60d728938fed416a95ef45488b0b7a255d6fb83d16f03ccd2a0be3a62a913cc36d3f2932b7a4addde6ef5a82d4d74c692bb6365d9295c065836b3fea3e4374f7265162218920f6909f2a5ac05ac18c28a0682f79551d9f1944ce52c88a18789ce4ddd0aa29742ec7aca6d7d175b9988a9168e8ad603102d5e8d1ab6d587328331694a1fb0de352f5596bc4165e81397afd18f1d197e0d4615d52e8c281f9c0d20d7df32c89f5f46b5af5ff43a1118fb49b212d9da176618edc5786d4e442d25db146fab54370e05d0cf91deb2d104c2522bf66d49cb141221a3b002c02e80983dc903a897d04ea68722ccfea75fd23236af66fc489800df19d99c70944bcfccddf6447eb66ecf90a41479eb8eb7258f92e08f45beae3dfa7f8dbd9f7d24d96dc6c51bedca396d28a79f476ee31596dde329b50dafe050654663ce59157b39fe65cf9d848aec9c00ccba662215fe54d3dcf06185fd3211b944c8edeb4342a0b97444a", 0x1000}, {&(0x7f0000002400)="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", 0xdba}], 0x3}, 0x0) 03:50:04 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x141242, 0x0) write$FUSE_INIT(r0, 0x0, 0x0) 03:50:04 executing program 0: syz_emit_ethernet(0x227, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @gre={{0x9, 0x4, 0x0, 0x0, 0x219, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @private=0xa010101, {[@lsrr={0x83, 0xb, 0x62, [@multicast1, @empty]}, @ssrr={0x89, 0x3}]}}, {{}, {}, {}, {}, {}, {0x8, 0x6558, 0x0, "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"}}}}}}, 0x0) [ 909.061260][ T3931] device macvtap13 entered promiscuous mode 03:50:05 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @remote, @void, {@ipv4={0x800, @igmp={{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @private=0xa010100, {[@generic={0x86, 0x8, '\\D\b\x00\x00\x00'}]}}, {0x0, 0x0, 0x0, @local}}}}}, 0x0) 03:50:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) 03:50:05 executing program 0: r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x21, &(0x7f0000002040)) 03:50:05 executing program 3: syz_emit_ethernet(0x38, &(0x7f0000000100)={@local, @local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "5272ab", 0x2, 0x2c, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1, {[], "a6d9"}}}}}, 0x0) 03:50:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002280)=[{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="b8f4c02b590b422bab7b0e4624f7b014", 0x10}], 0x1}], 0x1, 0x0) 03:50:05 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b927481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 03:50:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'user.', '.\x00'}, 0x0, 0x0, 0x0) 03:50:05 executing program 0: 03:50:05 executing program 2: 03:50:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xbe, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cd"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:05 executing program 4: 03:50:05 executing program 4: 03:50:05 executing program 0: r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x1c, &(0x7f0000000040)) 03:50:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) [ 909.845154][ T3970] device macvtap13 entered promiscuous mode 03:50:05 executing program 1: 03:50:05 executing program 3: 03:50:05 executing program 4: 03:50:05 executing program 0: 03:50:05 executing program 3: 03:50:05 executing program 2: 03:50:05 executing program 1: 03:50:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xbe, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cd"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:06 executing program 4: 03:50:06 executing program 0: 03:50:06 executing program 3: 03:50:06 executing program 1: 03:50:06 executing program 2: 03:50:06 executing program 4: 03:50:06 executing program 0: 03:50:06 executing program 2: 03:50:06 executing program 1: 03:50:06 executing program 3: [ 910.678139][ T3998] device macvtap13 entered promiscuous mode 03:50:06 executing program 0: 03:50:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xbe, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cd"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000034c0)=[{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x204}], 0x3, 0x0) 03:50:06 executing program 3: 03:50:06 executing program 2: 03:50:06 executing program 1: 03:50:06 executing program 0: 03:50:07 executing program 2: 03:50:07 executing program 1: 03:50:07 executing program 3: 03:50:07 executing program 0: 03:50:07 executing program 4: [ 911.384095][ T4021] device macvtap13 entered promiscuous mode 03:50:07 executing program 2: 03:50:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc1, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd60268"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:07 executing program 1: 03:50:07 executing program 0: 03:50:07 executing program 3: 03:50:07 executing program 4: 03:50:07 executing program 2: 03:50:07 executing program 3: 03:50:07 executing program 4: 03:50:07 executing program 2: 03:50:07 executing program 0: 03:50:07 executing program 1: [ 912.073479][ T4044] device macvtap13 entered promiscuous mode 03:50:08 executing program 4: 03:50:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc1, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd60268"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:08 executing program 2: 03:50:08 executing program 3: 03:50:08 executing program 0: 03:50:08 executing program 1: 03:50:08 executing program 4: 03:50:08 executing program 2: 03:50:08 executing program 3: 03:50:08 executing program 4: 03:50:08 executing program 0: 03:50:08 executing program 1: [ 912.676866][ T4065] device macvtap13 entered promiscuous mode 03:50:08 executing program 2: 03:50:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc1, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd60268"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:08 executing program 4: 03:50:08 executing program 1: 03:50:08 executing program 3: 03:50:08 executing program 0: 03:50:08 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$sock(r0, &(0x7f0000001240)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @remote, 0x5}, 0x80, &(0x7f0000001180)=[{&(0x7f00000000c0)="39da", 0x2}], 0x1}, 0x0) 03:50:09 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f00000000c0)=""/161) 03:50:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x44044) 03:50:09 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_int(r0, 0x1, 0x0, 0x0, &(0x7f0000000000)=0xfffffffffffffc8e) 03:50:09 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x14) 03:50:09 executing program 2: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000180)=[{0x0, 0x6}, {0x0, 0x7fff}], 0x2, 0x0) [ 913.296068][ T4092] device macvtap13 entered promiscuous mode 03:50:09 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 03:50:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc3, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc4"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:09 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLOPEN(r0, &(0x7f0000000380)={0x18}, 0xfffffee7) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0'}, 0x4) 03:50:09 executing program 0: splice(0xffffffffffffffff, &(0x7f00000012c0), 0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x3) 03:50:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg(r0, &(0x7f0000006740)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @local}, 0x80, 0x0}}], 0x1, 0x24000880) 03:50:09 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000040), 0x0, 0x24000050, 0x0, 0x0) 03:50:09 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000040)="98", 0x1, 0x24000050, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 03:50:09 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLOPEN(r0, &(0x7f0000000380)={0x18}, 0x67b9d051) write(r0, &(0x7f0000000040)="a3", 0x1) 03:50:09 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000040)="8e", 0x1, 0x50, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) 03:50:09 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000040)='\x00', 0x1, 0x800, 0x0, 0xfffffffffffffec6) 03:50:09 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000080)="bc", 0x1, 0x0, 0x0, 0x0) [ 914.009352][ T4135] device macvtap13 entered promiscuous mode 03:50:09 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f00000001c0)={0x1, 'lo\x00'}) 03:50:10 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000340)={&(0x7f0000000140), 0xc, &(0x7f0000000300)={0x0}}, 0x0) 03:50:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000006240)={0x0}}, 0x24000800) 03:50:10 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x1, 0x0) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 03:50:10 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc3, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc4"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:10 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg(r0, &(0x7f0000006140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x24004094) 03:50:10 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000040)={'syz_tun\x00', @ifru_mtu}) 03:50:10 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000040)=""/255) 03:50:10 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, &(0x7f00000000c0)="d4a46c9f4ce42b67303dd4b29c01000000000000007fcd9a8692b8beef14c6175cfb38957c9a2d002037e3106cc49da0362727fcf48ee568a971786cd521f1d5f442f4f69df413b920a0bde03bb5b1e5852af42c3eadad56c973dabca8b1936c5435f98d7de6e1", 0x67, 0x0, 0x0, 0xcb) 03:50:10 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 03:50:10 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 03:50:10 executing program 1: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0xffffffffffffffc8, 0x0) 03:50:10 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x8450) 03:50:10 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, 0x0) 03:50:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={0x0}}, 0x4048000) [ 915.149505][ T4174] device macvtap13 entered promiscuous mode 03:50:11 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 03:50:11 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc3, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc4"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4000884) 03:50:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) setpgid(r1, 0x0) 03:50:11 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, 0x0) 03:50:11 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, 0x0, 0x0, 0x850, 0x0, 0x0) 03:50:11 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 03:50:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x4040080) 03:50:11 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, 0x0, 0x0, 0x854, 0x0, 0x0) 03:50:11 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000040)="8db075fa5c17fa19499e1ebb080e0d4ceee3061be733bbb33fe2babff0d26024043560b8165a9a402ca86d7c456642e01c1b8079589553a2df486192312da2e3487d2f5027e72896a1afee79d60c65c466589d6f37e169997895b2b06a9bc38c3805571b65892e01ad0cc6e2bf26d53dd3c7764a2e7b63323471fd9ce6804ac0b2e312a0bae95e2fe1118efbd98a560f6ae1f59c73b3512c9eaa7798cbbf37c32c4d227fa56c6930a0", 0xa9, 0x44800, 0x0, 0xffffff4e) 03:50:11 executing program 2: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xffffffffffffffff, 0x1ab040) 03:50:11 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 915.864961][ T4225] device macvtap13 entered promiscuous mode 03:50:11 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000080)="bc", 0x1, 0x4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) 03:50:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:12 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, 0x0, 0x0, 0x4, 0x0, 0x0) 03:50:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000020, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f0000001740)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 03:50:12 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[], 0x5c}}, 0x0) 03:50:12 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000000040)="13", 0x1, 0x44800, 0x0, 0x0) 03:50:12 executing program 2: 03:50:12 executing program 1: 03:50:12 executing program 2: 03:50:12 executing program 0: 03:50:12 executing program 3: 03:50:12 executing program 4: [ 916.509403][ T4266] device macvtap13 entered promiscuous mode 03:50:12 executing program 2: 03:50:12 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:12 executing program 1: 03:50:12 executing program 0: 03:50:12 executing program 4: 03:50:12 executing program 3: 03:50:12 executing program 2: 03:50:13 executing program 3: 03:50:13 executing program 0: 03:50:13 executing program 4: 03:50:13 executing program 2: 03:50:13 executing program 1: [ 917.232810][ T4291] device macvtap13 entered promiscuous mode 03:50:13 executing program 0: 03:50:13 executing program 4: 03:50:13 executing program 3: 03:50:13 executing program 1: 03:50:13 executing program 2: 03:50:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:13 executing program 0: 03:50:13 executing program 4: 03:50:13 executing program 0: 03:50:13 executing program 2: 03:50:13 executing program 3: 03:50:13 executing program 1: [ 917.832035][ T4317] device macvtap13 entered promiscuous mode 03:50:13 executing program 2: 03:50:13 executing program 0: 03:50:13 executing program 1: 03:50:13 executing program 4: 03:50:13 executing program 3: 03:50:14 executing program 2: 03:50:14 executing program 1: 03:50:14 executing program 4: 03:50:14 executing program 0: 03:50:14 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, 0x0, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:14 executing program 3: 03:50:14 executing program 0: 03:50:14 executing program 4: 03:50:14 executing program 1: 03:50:14 executing program 3: 03:50:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, 0x0, 0x0, 0x40000001, &(0x7f0000000f80)={0x77359400}) [ 918.640022][ T4343] device macvtap13 entered promiscuous mode 03:50:14 executing program 1: 03:50:14 executing program 4: 03:50:14 executing program 0: 03:50:14 executing program 3: 03:50:14 executing program 2: 03:50:15 executing program 2: 03:50:15 executing program 1: 03:50:15 executing program 0: 03:50:15 executing program 4: 03:50:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, 0x0, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:15 executing program 3: 03:50:15 executing program 2: 03:50:15 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000000000018170000", @ANYRES32, @ANYBLOB="000000000000000015990600040000008510"], &(0x7f00000004c0)='GPL\x00', 0x3, 0x9d, &(0x7f0000000500)=""/157, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:50:15 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r0, &(0x7f0000000240)={&(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x40}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000040)="c86e4f", 0x3}], 0x1}, 0x0) 03:50:15 executing program 4: r0 = epoll_create1(0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) 03:50:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000002300)={0x8, 'vlan0\x00'}) [ 919.424116][ T4376] device macvtap13 entered promiscuous mode 03:50:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@cred={{0x1c}}], 0x20}, 0x0) 03:50:15 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x6, &(0x7f00000002c0)={@remote}, 0x3) 03:50:15 executing program 4: syz_emit_ethernet(0x1e, &(0x7f0000000340)={@remote, @broadcast, @void, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "0e79c9e6849a224c"}}}}, 0x0) 03:50:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000140)=0x4, 0x4) 03:50:15 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0x10) 03:50:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, 0x0, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x17, 0x0, 0x5, 0x7ff, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x40) 03:50:15 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x14, &(0x7f00000002c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x20) 03:50:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000002300)={&(0x7f0000000080)={0xa, 0x4e24, 0x0, @dev}, 0x1c, &(0x7f0000002280)=[{&(0x7f00000000c0)="3406379f74350b94b23b28b5c5d0307b5e0efd7c34f19e78b0eb29d1e1a72cd6dbe50dfe1c5d81097ffa037c464b2d9a06e1dc4439ed8ee96218e3a93631af434735eb67c1f0010eb5a7131547d80134798b5d19008a83edb8966c0dccc0bb7675a8bc01f4d72f610d711697c206c1d6958ba951aeebde8d3d362c1dbaddcb5f7f8bb23bc5ca685ea0000a7e989f4a8b6c5e27f6bb9a1d25926ba9a1944636ea00475d6f5517a0aee5a247482e44e663f63c60e6c3dfdaaa9a2e6cb0976d779c61", 0xc1}, {&(0x7f0000001240)="fac1ab488dc534e32d1c64cc40664bf92fdfc62f6024", 0x16}, {&(0x7f0000001280)="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", 0xa72}], 0x3}, 0x0) 03:50:15 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000002300)={&(0x7f0000000080)={0xa, 0x4e24, 0x0, @dev}, 0x1c, &(0x7f0000002280)=[{&(0x7f00000000c0)="3406379f74350b94b23b28b5c5d0307b5e0efd7c34f19e78b0eb29d1e1a72cd6dbe50dfe1c5d81097ffa037c464b2d9a06e1dc4439ed8ee96218e3a93631af434735eb67c1f0010eb5a7131547d80134798b5d19008a83edb8966c0dccc0bb7675a8bc01f4d72f610d711697c206c1d6958ba951aeebde8d3d362c1dbaddcb5f7f8bb23bc5ca685ea0000a7e989f4a8b6c5e27f6bb9a1d25926ba9a1944636ea00475d6f5517a0aee5a247482e44e663f63c60e6c3dfdaaa9a2e6cb0976d779c61", 0xc1}, {&(0x7f0000001280)="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", 0x4ec}], 0x2}, 0x0) 03:50:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @private0}}, 0x0, 0x0, 0x0, 0x0, "644b2783103d825f1718b3b3c5c8cb7ca55d14f2ef52cb511e284d243f2670c6589858c1b2c22139e1612980494018ed34e8e10bced8a17b7c8b1caf0cf0aa19feb760384f9112efbfbca6d4e4118c9d"}, 0xd8) 03:50:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 920.067876][ T4425] device macvtap13 entered promiscuous mode 03:50:15 executing program 3: unshare(0x20020400) 03:50:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) 03:50:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x40) 03:50:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000001580)=[{r0}], 0x1, 0x0) 03:50:16 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x3d, 0x0, &(0x7f0000000040)) 03:50:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000600)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0xc}]}, 0x1c}}, 0x0) 03:50:16 executing program 4: syz_emit_ethernet(0x112, &(0x7f0000000000)={@random="e387e1b1079f", @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "eb9806", 0xdc, 0x2f, 0x0, @mcast1, @mcast2, {[@routing={0x0, 0x12, 0x0, 0x0, 0x0, [@mcast2, @loopback, @dev, @empty, @ipv4={[], [], @multicast2}, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}]}]}}}}}, 0x0) 03:50:16 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000180), 0x4) 03:50:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) 03:50:16 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) accept4(r0, 0x0, 0x0, 0x1c0000) [ 920.679387][ T4453] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:50:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x7, &(0x7f0000000280)=@framed={{}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, @initr0]}, &(0x7f0000000140)='GPL\x00', 0x4, 0xb5, &(0x7f0000000000)=""/181, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 920.738162][ T4460] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:50:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000440)={&(0x7f0000000380), 0xc, &(0x7f0000000400)={0x0}}, 0x0) 03:50:16 executing program 1: pipe(&(0x7f00000012c0)={0xffffffffffffffff}) connect$packet(r0, 0x0, 0x0) 03:50:16 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x100}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}], "", [[]]}, 0x158) 03:50:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x43, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, &(0x7f0000000f40)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="330000e5", @ANYRES16=0x0, @ANYBLOB="020027bd7000fcdbdf2506000000"], 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}, 0x78, r3}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000400)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x53, r3}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000000)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 920.863922][ T4462] device macvtap13 entered promiscuous mode 03:50:16 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x1b, &(0x7f0000000000)="4af8626735cf96656db8a8432f3b96eee0e7bbf4", 0x14) 03:50:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000080)=""/248, 0x26, 0xf8, 0x1}, 0x20) 03:50:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x18, 0x0, 0x7) 03:50:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x4}]}, 0x18}}, 0x0) 03:50:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) 03:50:17 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0xf, 0x0, &(0x7f0000000680)) 03:50:17 executing program 3: accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 03:50:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="24000000000000000100000001"], 0x68}, 0x0) 03:50:17 executing program 4: bpf$ENABLE_STATS(0x20, &(0x7f0000001840), 0x4) 03:50:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x33, 0x0, 0x7) [ 921.448488][ T4496] device macvtap13 entered promiscuous mode 03:50:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) 03:50:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) 03:50:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x28, 0x3, &(0x7f0000000080)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:50:17 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 03:50:17 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) 03:50:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000002480)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0x5}, 0x1c, 0x0}, 0x0) 03:50:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x19, 0x0, 0x7) 03:50:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000000000018170000", @ANYRES32, @ANYBLOB="0000000000000000159906000400000085100000fe"], &(0x7f00000004c0)='GPL\x00', 0x3, 0x9d, &(0x7f0000000500)=""/157, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:50:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, 0x0, &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:50:17 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000000080)='GPL\x00', 0x5, 0xe0, &(0x7f00000000c0)=""/224, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:50:17 executing program 0: socket(0xa, 0x0, 0x1000) 03:50:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000100)=@framed={{}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f87ab61c4993bd8}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 922.083862][ T4528] device macvtap13 entered promiscuous mode 03:50:18 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001b40)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0}}], 0x1, 0x0) 03:50:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:18 executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000040)={@broadcast, @link_local, @val={@void}, {@ipv4={0x800, @icmp={{0x15, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @broadcast, @multicast2, {[@timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}, @ra={0x94, 0x4}, @rr={0x7, 0x1b, 0x0, [@dev, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @multicast2, @empty]}, @timestamp_addr={0x44, 0x14, 0x0, 0x1, 0x0, [{@multicast2}, {@dev}]}]}}, @timestamp}}}}, 0x0) 03:50:18 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000027c0)) 03:50:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x2, &(0x7f0000000440)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:50:18 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x3, 0x0, &(0x7f0000000680)) 03:50:18 executing program 4: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000300)) 03:50:18 executing program 3: pipe(&(0x7f00000012c0)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, 0x0, 0x0) 03:50:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000180)=@abs, 0x6e) 03:50:18 executing program 1: pipe(&(0x7f0000005640)) 03:50:18 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(0x0) write$binfmt_elf32(r0, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x38}, [{}]}, 0x58) [ 922.760305][ T4560] device macvtap13 entered promiscuous mode 03:50:18 executing program 0: pipe(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 03:50:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x1) 03:50:19 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, 0x0, &(0x7f00000000c0)) 03:50:19 executing program 2: r0 = socket$inet(0x2, 0x3, 0xa8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vlan1\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) 03:50:19 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0x22, 0x0, 0x0) 03:50:19 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000200)=[{&(0x7f0000000080)="f9", 0x1}], 0x1, 0x7) 03:50:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:19 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:50:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x39, &(0x7f00000002c0)={@mcast2}, 0x20) 03:50:19 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0x10, 0x0, 0x0) 03:50:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x8, 0x0, 0x7) 03:50:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 03:50:19 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)={0x0, 0x0, 0x18}, 0x10) [ 923.456343][ T4594] device macvtap13 entered promiscuous mode 03:50:19 executing program 0: sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) 03:50:19 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000002c0)=@req3, 0x1c) 03:50:19 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 03:50:19 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, 0x0, 0x0) 03:50:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 03:50:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:19 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x2f, 0x0, &(0x7f0000000680)) 03:50:19 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x37, &(0x7f00000002c0)={@mcast2}, 0x20) 03:50:19 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000002c0)=@req3, 0x1c) 03:50:19 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:50:19 executing program 2: syz_emit_ethernet(0xa6, &(0x7f0000000040)={@broadcast, @link_local, @val={@void, {0x8100, 0x0, 0x1}}, {@ipv4={0x800, @icmp={{0x20, 0x4, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x1, 0x0, @broadcast, @multicast2, {[@timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}, @ra={0x94, 0x4}, @rr={0x7, 0x1b, 0x0, [@dev, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @multicast2, @empty]}, @timestamp_addr={0x44, 0x14, 0x0, 0x1, 0x0, [{@multicast2}, {@dev}]}, @timestamp_prespec={0x44, 0x14, 0x0, 0x3, 0x0, [{@local}, {@private}]}, @rr={0x7, 0xb, 0x0, [@multicast2, @multicast1]}, @timestamp_addr={0x44, 0xc, 0x0, 0x1, 0x0, [{@private}]}]}}, @timestamp}}}}, 0x0) 03:50:20 executing program 0: bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002340)=0xffffffffffffffff, 0x4) 03:50:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001f00)={0x0, 0x0, &(0x7f0000001ec0)={&(0x7f00000011c0)={0x14, 0x0, 0x21}, 0x14}}, 0x0) 03:50:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) 03:50:20 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x5, &(0x7f0000000000)=@framed={{}, [@map]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:50:20 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x9, 0x0, &(0x7f0000000680)) [ 924.226873][ T4634] device macvtap13 entered promiscuous mode 03:50:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x6, 0x0, 0x7) 03:50:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, 0x0, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:20 executing program 2: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 03:50:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x2}}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:50:20 executing program 4: pipe(&(0x7f00000012c0)={0xffffffffffffffff}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000280)) 03:50:20 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x1, &(0x7f0000000440)=@raw=[@func], &(0x7f0000000480)='GPL\x00', 0x7, 0xb6, &(0x7f00000004c0)=""/182, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:50:20 executing program 3: sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x24, 0x0, 0x100, 0x0, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BANDS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) getsockname$packet(r0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$caif_seqpacket(0x25, 0x5, 0x0) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x24, &(0x7f0000000000), &(0x7f0000000080)=0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_KEY(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001180)={&(0x7f0000000600)={0x48, r4, 0x8, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0xc, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "2ad99075f5"}, @NL80211_ATTR_MAC={0xa}]}, 0x48}, 0x1, 0x0, 0x0, 0x4005}, 0x20040008) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYRES16=0x0], 0x24}, 0x1, 0x0, 0x0, 0x8c1}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae56d88fecf93a1a7503bf746bec66ba", 0x20011150, 0x20c49a, 0x0, 0x27) 03:50:20 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) 03:50:20 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:50:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0xf, 0x2, 'bond_slave_1\x00'}]}]}, 0x30}}, 0x0) 03:50:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x4, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) [ 924.889925][ T4666] device macvtap13 entered promiscuous mode 03:50:20 executing program 3: syz_emit_ethernet(0xc6, &(0x7f00000002c0)={@empty, @multicast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "9ae2c5", 0x8c, 0x2f, 0x0, @remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}, {[@routing={0x33, 0x8, 0x0, 0x0, 0x0, [@private0, @private2, @loopback, @dev]}]}}}}}, 0x0) 03:50:20 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xc, 0x0, 0x0) 03:50:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, 0x0, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0x1}, 0x40) 03:50:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000003c0)={'batadv_slave_1\x00'}) 03:50:21 executing program 0: syz_genetlink_get_family_id$SEG6(&(0x7f0000004880)='SEG6\x00') 03:50:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000000c0), 0x4) 03:50:21 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x10) 03:50:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x1600bd7a, 0x0, 0x7) 03:50:21 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 03:50:21 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000002300)={&(0x7f0000000080)={0xa, 0x4e24, 0x0, @dev}, 0x1c, &(0x7f0000002280)=[{&(0x7f00000000c0)="3406379f74350b94b23b28b5c5d0307b5e0efd7c34f19e78b0eb29d1e1a72cd6dbe50dfe1c5d81097ffa037c464b2d9a06e1dc4439ed8ee96218e3a93631af434735eb67c1f0010eb5a7131547d80134798b5d19008a83edb8966c0dccc0bb7675a8bc01f4d72f610d711697c206c1d6958ba951aeebde8d3d362c1dbaddcb5f7f8bb23bc5ca685ea0000a7e989f4a8b6c5e27f6bb9a1d25926ba9a1944636ea00475d6f5517a0aee5a247482e44e663f63c60e6c3dfdaaa9a2e6cb0976d779c61", 0xc1}, {&(0x7f0000001240)="fac1ab488dc534e32d1c64cc40664bf92fdfc62f6024", 0x16}, {&(0x7f0000001280)="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", 0xa72}], 0x3}, 0x800) 03:50:21 executing program 3: r0 = epoll_create1(0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x8010661b, 0x0) [ 925.602887][ T4701] device macvtap13 entered promiscuous mode 03:50:21 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x8, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:50:21 executing program 2: syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') 03:50:21 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x1, &(0x7f0000000440)=@raw=[@func], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:50:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x28, 0x0, 0x0, 0x0, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}}, 0x0) 03:50:21 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000001c0)={'ip6_vti0\x00', 0x0}) 03:50:21 executing program 3: 03:50:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, 0x0, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x7ff, 0x0, 0x1}, 0x40) 03:50:22 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x18, &(0x7f00000002c0)={@remote}, 0x20) 03:50:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x1600bd74, 0x0, 0x7) 03:50:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, 0x0, &(0x7f00000011c0)) 03:50:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) 03:50:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000001c0)=@framed={{}, [@ldst={0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 926.254370][ T4733] device macvtap13 entered promiscuous mode 03:50:22 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x31, 0x0, &(0x7f0000000680)) 03:50:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x1) 03:50:22 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0xb, 0x0, &(0x7f0000000680)) 03:50:22 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x43, &(0x7f00000002c0)={@mcast2}, 0x20) 03:50:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) 03:50:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:22 executing program 0: syz_emit_ethernet(0x15, &(0x7f0000000540)={@link_local, @random="d5bb9f85b604", @val={@void}, {@x25}}, 0x0) 03:50:22 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000140)=0x4, 0x4) 03:50:22 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000800)={&(0x7f0000000440)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f0000000640)=[@dontfrag={{0x14, 0x29, 0x34}}], 0x18}, 0x0) 03:50:22 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:50:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000002300)={&(0x7f0000000080)={0xa, 0x4e24, 0x0, @dev}, 0x1c, &(0x7f0000002280)=[{&(0x7f00000000c0)="3406379f74350b94b23b28b5c5d0307b5e0efd7c34f19e78b0eb29d1e1a72cd6dbe50dfe1c5d81097ffa037c464b2d9a06e1dc4439ed8ee96218e3a93631af434735eb67c1f0010eb5a7131547d80134798b5d19008a83edb8966c0dccc0bb7675a8bc01f4d72f610d711697c206c1d6958ba951aeebde8d3d362c1dbaddcb5f7f8bb23bc5ca685ea0000a7e989f4a8b6c5e27f6bb9a1d25926ba9a1944636ea00475d6f5517a0aee5", 0xa9}, {&(0x7f0000001240)="fac1ab488dc534e32d1c64cc40664bf92fdfc62f6024", 0x16}, {&(0x7f0000001280)="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", 0x4ee}], 0x3}, 0x0) 03:50:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000980)={'team0\x00'}) 03:50:22 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) bpf$ENABLE_STATS(0x20, &(0x7f0000001840), 0x4) 03:50:22 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f0000000040)) [ 926.911472][ T4770] device macvtap13 entered promiscuous mode 03:50:22 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x12, 0x0, &(0x7f0000000040)) 03:50:22 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x7, 0x0, &(0x7f0000000680)) 03:50:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={0x0}}, 0x0) 03:50:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) 03:50:23 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x4b, 0x0, &(0x7f0000000040)) 03:50:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000002300)={&(0x7f0000000080)={0xa, 0x4e24, 0x0, @dev}, 0x1c, &(0x7f0000002280)=[{&(0x7f00000000c0)="3406379f74350b94b23b28b5c5d0307b5e0efd7c34f19e78b0eb29d1e1a72cd6dbe50dfe1c5d81097ffa037c464b2d9a06e1dc4439ed8ee96218e3a93631af434735eb67c1f0010eb5a7131547d80134798b5d19008a83edb8966c0dccc0bb7675a8bc01f4d72f610d711697c206c1d6958ba951aeebde8d3d362c1dbaddcb5f7f8bb23bc5ca685ea0000a7e989f4a8b6c5e27f6bb9a1d25926ba9a1944636ea00475d6f5517a0aee5a247482e44e663f63c60e6c3dfdaaa9a2e6cb0976d779c61", 0xc1}, {&(0x7f0000001240)="fac1ab488dc534e32d1c64cc40664bf92fdfc62f6024", 0x16}, {&(0x7f0000001280)="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", 0xa73}], 0x3}, 0x0) 03:50:23 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x19, 0x0, &(0x7f0000000040)) 03:50:23 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r0, &(0x7f0000000240)={&(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000040)="c86e4f", 0x3}], 0x1}, 0x4000890) 03:50:23 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x50010, r0, 0x0) 03:50:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='vegas\x00', 0x6) 03:50:23 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x12, 0x0, 0x0) 03:50:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0x1, 0x201}, 0x14}}, 0x0) 03:50:23 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x39, 0x0, &(0x7f0000000680)) [ 927.681298][ T4805] device macvtap13 entered promiscuous mode 03:50:23 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FITHAW(r0, 0xc0045878) 03:50:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:23 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x2a, 0x0, &(0x7f0000000680)) 03:50:24 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x2e, 0x0, &(0x7f0000000680)) 03:50:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000600)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 03:50:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000400)={0x0}}, 0x0) 03:50:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000540)={"1a77673a2c53315ec7b90d00b00d9f03"}) 03:50:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x0, 0x0, 0x0) 03:50:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x1d, 0x0, 0x7) 03:50:24 executing program 2: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000001100)='NLBL_MGMT\x00') 03:50:24 executing program 4: chroot(&(0x7f0000000000)='./file0\x00') mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 03:50:24 executing program 1: chroot(&(0x7f0000000000)='./file0\x00') renameat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 928.377503][ T4846] device macvtap13 entered promiscuous mode 03:50:24 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) open$dir(&(0x7f0000001700)='./file0\x00', 0x0, 0x0) 03:50:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:24 executing program 3: semget$private(0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x2, 0x0, 0x0) 03:50:24 executing program 2: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001ec0)={{0x0, 0x0, 0xffffffffffffffff}}) 03:50:24 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 03:50:24 executing program 1: 03:50:24 executing program 0: 03:50:24 executing program 1: 03:50:24 executing program 0: 03:50:24 executing program 2: 03:50:24 executing program 3: 03:50:24 executing program 4: [ 929.000390][ T4880] device macvtap13 entered promiscuous mode 03:50:24 executing program 1: 03:50:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:25 executing program 0: 03:50:25 executing program 3: 03:50:25 executing program 2: 03:50:25 executing program 4: 03:50:25 executing program 1: 03:50:25 executing program 2: 03:50:25 executing program 1: 03:50:25 executing program 0: 03:50:25 executing program 4: 03:50:25 executing program 3: [ 929.702716][ T4903] device macvtap13 entered promiscuous mode 03:50:25 executing program 3: 03:50:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:25 executing program 2: 03:50:25 executing program 0: 03:50:25 executing program 4: 03:50:25 executing program 1: 03:50:25 executing program 3: 03:50:26 executing program 0: 03:50:26 executing program 4: 03:50:26 executing program 3: 03:50:26 executing program 2: 03:50:26 executing program 1: [ 930.306137][ T4925] device macvtap13 entered promiscuous mode 03:50:26 executing program 3: 03:50:26 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:26 executing program 0: 03:50:26 executing program 2: 03:50:26 executing program 1: 03:50:26 executing program 4: 03:50:26 executing program 3: 03:50:26 executing program 2: 03:50:26 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ipvlan0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x3b, 0x2, [{0x8}, {}]}}) 03:50:26 executing program 0: 03:50:26 executing program 1: 03:50:26 executing program 3: [ 930.950103][ T4947] device macvtap13 entered promiscuous mode 03:50:26 executing program 0: 03:50:27 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:27 executing program 2: 03:50:27 executing program 1: 03:50:27 executing program 3: 03:50:27 executing program 0: 03:50:27 executing program 4: 03:50:27 executing program 3: 03:50:27 executing program 2: 03:50:27 executing program 1: 03:50:27 executing program 4: 03:50:27 executing program 0: [ 931.470464][ T4966] device macvtap13 entered promiscuous mode 03:50:27 executing program 3: 03:50:27 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:27 executing program 2: 03:50:27 executing program 4: 03:50:27 executing program 0: 03:50:27 executing program 3: 03:50:27 executing program 1: 03:50:27 executing program 4: 03:50:27 executing program 0: 03:50:27 executing program 3: 03:50:27 executing program 2: 03:50:27 executing program 1: [ 932.119153][ T4990] device macvtap13 entered promiscuous mode 03:50:28 executing program 1: 03:50:28 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:28 executing program 0: 03:50:28 executing program 2: 03:50:28 executing program 4: 03:50:28 executing program 3: 03:50:28 executing program 1: 03:50:28 executing program 4: 03:50:28 executing program 1: 03:50:28 executing program 3: 03:50:28 executing program 0: 03:50:28 executing program 2: [ 932.738532][ T5011] device macvtap13 entered promiscuous mode 03:50:28 executing program 2: 03:50:29 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:29 executing program 0: 03:50:29 executing program 4: 03:50:29 executing program 3: 03:50:29 executing program 1: 03:50:29 executing program 2: 03:50:29 executing program 0: 03:50:29 executing program 3: 03:50:29 executing program 4: 03:50:29 executing program 1: 03:50:29 executing program 2: [ 933.386861][ T5032] device macvtap13 entered promiscuous mode 03:50:29 executing program 4: 03:50:29 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:29 executing program 1: 03:50:29 executing program 3: 03:50:29 executing program 0: 03:50:29 executing program 2: 03:50:29 executing program 4: 03:50:29 executing program 0: 03:50:29 executing program 4: 03:50:29 executing program 2: 03:50:29 executing program 3: 03:50:29 executing program 1: [ 934.041658][ T5053] device macvtap13 entered promiscuous mode 03:50:29 executing program 4: 03:50:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:30 executing program 0: 03:50:30 executing program 2: 03:50:30 executing program 1: 03:50:30 executing program 3: 03:50:30 executing program 4: 03:50:30 executing program 1: 03:50:30 executing program 3: 03:50:30 executing program 2: 03:50:30 executing program 4: 03:50:30 executing program 0: [ 934.649411][ T5074] device macvtap13 entered promiscuous mode 03:50:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:30 executing program 1: 03:50:30 executing program 4: 03:50:30 executing program 2: 03:50:30 executing program 3: 03:50:30 executing program 0: 03:50:30 executing program 4: 03:50:30 executing program 1: 03:50:30 executing program 2: [ 934.956473][ T5087] device macvtap14 entered promiscuous mode 03:50:30 executing program 3: 03:50:30 executing program 0: 03:50:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:30 executing program 4: 03:50:31 executing program 1: 03:50:31 executing program 2: 03:50:31 executing program 0: 03:50:31 executing program 3: 03:50:31 executing program 4: [ 935.283091][ T5101] device macvtap15 entered promiscuous mode 03:50:31 executing program 1: 03:50:31 executing program 2: 03:50:31 executing program 0: 03:50:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 03:50:31 executing program 3: 03:50:31 executing program 4: 03:50:31 executing program 0: 03:50:31 executing program 2: [ 935.551801][ T5113] device macvtap16 entered promiscuous mode 03:50:31 executing program 1: 03:50:31 executing program 3: 03:50:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 03:50:31 executing program 4: 03:50:31 executing program 0: 03:50:31 executing program 2: 03:50:31 executing program 1: 03:50:31 executing program 3: 03:50:31 executing program 4: 03:50:31 executing program 0: 03:50:31 executing program 2: [ 935.864250][ T5126] device macvtap17 entered promiscuous mode 03:50:31 executing program 1: 03:50:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 03:50:31 executing program 3: 03:50:31 executing program 0: 03:50:31 executing program 4: 03:50:31 executing program 2: 03:50:31 executing program 1: 03:50:32 executing program 4: 03:50:32 executing program 3: [ 936.153598][ T5140] device macvtap18 entered promiscuous mode 03:50:32 executing program 0: 03:50:32 executing program 1: 03:50:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:32 executing program 2: 03:50:32 executing program 0: 03:50:32 executing program 3: 03:50:32 executing program 4: 03:50:32 executing program 1: 03:50:32 executing program 2: [ 936.462146][ T5154] device macvtap19 entered promiscuous mode 03:50:32 executing program 0: 03:50:32 executing program 3: 03:50:32 executing program 4: 03:50:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:32 executing program 1: 03:50:32 executing program 0: 03:50:32 executing program 2: 03:50:32 executing program 3: 03:50:32 executing program 4: [ 936.729324][ T5166] device macvtap20 entered promiscuous mode 03:50:32 executing program 1: 03:50:32 executing program 4: 03:50:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:32 executing program 0: 03:50:32 executing program 2: 03:50:32 executing program 3: 03:50:32 executing program 1: 03:50:32 executing program 4: 03:50:32 executing program 0: [ 937.017200][ T5178] device macvtap21 entered promiscuous mode 03:50:32 executing program 2: 03:50:32 executing program 3: 03:50:33 executing program 4: 03:50:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) 03:50:33 executing program 1: 03:50:33 executing program 0: 03:50:33 executing program 2: 03:50:33 executing program 3: 03:50:33 executing program 4: 03:50:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) 03:50:33 executing program 1: 03:50:33 executing program 0: r0 = socket$caif_seqpacket(0x25, 0x5, 0x3) connect$caif(r0, &(0x7f0000000300), 0x18) 03:50:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 03:50:33 executing program 4: clone3(&(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000001580)=[0xffffffffffffffff], 0x1}, 0x58) 03:50:33 executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000500)=ANY=[], 0x10132) fallocate(r0, 0x100000010, 0x0, 0x4000) 03:50:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) 03:50:33 executing program 1: 03:50:33 executing program 0: 03:50:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0x22000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 03:50:33 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xa5) sendmmsg$inet6(r0, &(0x7f0000000300)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f00000017c0)=[@hoplimit={{0x14}}], 0x18}}], 0x1, 0x0) 03:50:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, 0x0, 0x0) 03:50:33 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x0, 0x0) read$dsp(r0, &(0x7f0000000100)=""/117, 0x75) read$dsp(r0, &(0x7f00000021c0)=""/4121, 0x200031d9) ioctl$SNDCTL_DSP_SPEED(r0, 0x5001, 0x0) 03:50:33 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="c102"], 0x2) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 03:50:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x120, 0x0, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20064084}, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000001c0)=@fragment, 0x8) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0xb605}}], 0xc6, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, 0x0}, 0x0) 03:50:33 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @private}, 0x2}}, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xa}, 0x1c) sendmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0xfffffff5}, 0xfffffff5}], 0x400000000000085, 0x0) 03:50:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, 0x0, 0x0) 03:50:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, 0x0, 0x0) 03:50:34 executing program 3: semctl$GETVAL(0x0, 0x3, 0xc, 0x0) 03:50:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 03:50:34 executing program 3: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000140)) 03:50:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x120, 0x0, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20064084}, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000001c0)=@fragment, 0x8) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0xb605}}], 0xc6, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, 0x0}, 0x0) 03:50:34 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001240)='/dev/autofs\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r2 = dup2(r1, r0) write$cgroup_type(r0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 03:50:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 03:50:34 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @private}, 0x2}}, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xa}, 0x1c) sendmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0xfffffff5}, 0xfffffff5}], 0x400000000000085, 0x0) 03:50:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x2000}, 0x40) 03:50:36 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 03:50:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 03:50:36 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, 0xfffffffffffffffe) 03:50:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x56, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='grpjquota=,d']) 03:50:36 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="5800000024000705000000000000000000000008", @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100736662"], 0x58}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x8, 'tbf\x00'}, {0x4}}, @TCA_INGRESS_BLOCK={0x8}]}, 0x38}}, 0x0) [ 940.918582][ T5277] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 940.954362][ T5276] EXT4-fs (loop4): Unrecognized mount option "d" or missing value 03:50:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0xffffff91}, 0x1c) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc020662a, &(0x7f0000000500)=ANY=[@ANYBLOB="00f4ff000000000006"]) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x6, 0x0, 0x0, 0x120}, 0x9c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, [], 0x1}, 0x1}, 0x1c) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000030c0)={&(0x7f0000002fc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000003080)={&(0x7f0000003000)={0x4c, 0x0, 0x0, 0x70bd29, 0x25dfdbfe, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x36a}, {0x6, 0x11, 0x3a}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000011}, 0x24040080) ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046208, 0x0) 03:50:36 executing program 1: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000005c0)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 03:50:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 03:50:37 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, 0x0) 03:50:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) close(r0) 03:50:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000280)={0x18}, 0x18) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 03:50:37 executing program 1: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000005c0)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 03:50:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000d00)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1}, 0x0) 03:50:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 03:50:37 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="02100100090000002bbd7000fcdbdf2501001400cf000000010015004e210000050099"], 0x48}}, 0x0) 03:50:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000280)={0x18}, 0x18) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 941.630333][ T5318] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. [ 941.669352][ T5315] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. 03:50:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)='/proc/\x00s/sync_\x00le\xf44.\xab%n\x00'/36}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r2) r3 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r3, &(0x7f0000000280)=""/4096, 0x9005) 03:50:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xaf\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x88\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 03:50:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 03:50:37 executing program 1: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000005c0)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 03:50:37 executing program 0: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 03:50:37 executing program 2: r0 = socket(0x2, 0x5, 0x0) read(r0, &(0x7f0000000140)=""/49, 0x31) 03:50:37 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000002340)=ANY=[], 0x100c) 03:50:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ptype\x00') read$alg(r0, &(0x7f0000000140)=""/129, 0xc7) 03:50:38 executing program 2: r0 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='P', 0x1, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f00000010c0)='user\x00', &(0x7f0000001100)={'syz', 0x1}, &(0x7f0000000780)="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", 0x111, 0xffffffffffffffff) r2 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000300)="fa70f46ac869e7b499b634f59762331ba36d9948bba7107a9881e625819035020afc4ff2166bb581f67efa6b0e8603f689a12ffd6152fe0b8faae708fca3dd88f325ac01c6c249d1021c68cdc9fe7458bd24859d36944f21a2e40d40303739a0ac9f231b35e4b557c921606a3a55624f4edb12504c839246dc578f33ad961e84b7", 0x81, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000180)={r0, r1, r2}, &(0x7f0000000480)=""/234, 0xffffffffffffffe1, 0x0) 03:50:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:38 executing program 1: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000005c0)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 03:50:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)) openat$procfs(0xffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) [ 942.279343][ T5342] device syzkaller1 entered promiscuous mode 03:50:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000001d80)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000001e40)={0x0, 0x0, &(0x7f0000001e00)={&(0x7f0000000300)={0x14, r1, 0x95f2a18d80b2ab71}, 0x14}}, 0x0) 03:50:38 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[], 0x208e24b) ioctl$RTC_AIE_OFF(r0, 0x7002) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x4000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x2) 03:50:38 executing program 0: add_key$keyring(&(0x7f0000001280)='keyring\x00', &(0x7f00000012c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, r0) 03:50:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:38 executing program 3: syz_emit_ethernet(0xf7, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd624ab0e400c12300fe8000000000000000000000000000aafe"], 0x0) 03:50:38 executing program 1: semop(0x0, &(0x7f0000000000)=[{0x0, 0x4}], 0x1) 03:50:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xae80, &(0x7f0000000080)={0x0, 0x0, [0xc0000100, 0x0, 0x3, 0x2, 0xda0]}) 03:50:39 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x141001) dup3(r0, r1, 0x0) syz_open_procfs(0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:50:39 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @private=0xa010101}, {0x2, 0x0, @broadcast}, 0xa2}) 03:50:39 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000540)='./file0/bus\x00', 0x0) mq_notify(r0, &(0x7f00000000c0)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}) 03:50:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:39 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) 03:50:39 executing program 3: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_FSYNC={0x3, 0x4, 0x0, @fd_index}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) [ 943.396916][ T5396] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 03:50:39 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000540)='./file0/bus\x00', 0x0) mq_notify(r0, &(0x7f00000000c0)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}) 03:50:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xee49}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) 03:50:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:50:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:39 executing program 2: r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffb, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3cde0b0000732e66617400028001000240000000f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) getdents(r0, &(0x7f0000000040)=""/97, 0x61) 03:50:39 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x1020000, 0x1000}, 0x20) 03:50:39 executing program 4: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000000)=""/130) 03:50:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) userfaultfd(0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) unshare(0x8000400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 03:50:39 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) write(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x3c}}, 0x0) 03:50:39 executing program 0: syz_io_uring_setup(0x278c, &(0x7f0000000180), &(0x7f0000ff7000/0x6000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000200), 0x0) syz_io_uring_setup(0x3c09, &(0x7f0000000300)={0x0, 0x7953}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) 03:50:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 03:50:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x34f, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0xffffffffffffffc0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='ext4_journal_start\x00', r1}, 0x10) 03:50:39 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5411, 0x759004) 03:50:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 944.359119][ T5492] device macvtap22 entered promiscuous mode 03:50:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:50:42 executing program 0: syz_mount_image$udf(&(0x7f0000000780)='udf\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000980), 0x0, &(0x7f00000009c0)={[{@adinicb='adinicb'}, {@umask={'umask'}}]}) 03:50:42 executing program 4: unshare(0x8000400) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000100)) 03:50:42 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GENEVE_REMOTE6={0x14, 0x7, @loopback={0x5}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:50:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) 03:50:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) [ 946.795633][ T5508] device geneve2 entered promiscuous mode [ 946.805695][ T5510] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 946.829309][ T5510] UDF-fs: Scanning with blocksize 512 failed [ 946.849278][ T5510] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 946.889267][ T5510] UDF-fs: Scanning with blocksize 1024 failed 03:50:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:50:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x248800) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0x13) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) 03:50:42 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001440), 0x0, &(0x7f0000001500)={[{@nls={'nls', 0x3d, 'cp936'}}, {@nls={'nls', 0x3d, 'maccroatian'}}]}) [ 946.910819][ T5510] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 946.918345][ T5510] UDF-fs: Scanning with blocksize 2048 failed [ 946.926471][ T5510] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 946.934061][ T5510] UDF-fs: Scanning with blocksize 4096 failed [ 946.993258][ T5510] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 947.004483][ T5510] UDF-fs: Scanning with blocksize 512 failed [ 947.015863][ T5510] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 947.039662][ T5510] UDF-fs: Scanning with blocksize 1024 failed [ 947.072321][ T5510] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 947.080130][ T5510] UDF-fs: Scanning with blocksize 2048 failed [ 947.088245][ T5510] UDF-fs: warning (device loop0): udf_load_vrs: No VRS found [ 947.095898][ T5510] UDF-fs: Scanning with blocksize 4096 failed 03:50:43 executing program 4: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x0, 0xfffeffff}) [ 947.168561][ T5531] ntfs: (device loop3): parse_options(): Unrecognized mount option . 03:50:43 executing program 0: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/udmabuf\x00', 0x2) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000004540)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000300)={r1}) [ 947.282499][ T5509] device macvtap23 entered promiscuous mode [ 947.340942][ T5508] device geneve2 entered promiscuous mode 03:50:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}]}, 0x3c}}, 0x0) 03:50:43 executing program 4: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000700)=""/67) [ 947.381224][ T5531] ntfs: (device loop3): parse_options(): Unrecognized mount option . 03:50:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000001040)={0x18, {"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", 0x1000}}, 0x1b7) 03:50:43 executing program 3: [ 947.979125][ T5554] device macvtap24 entered promiscuous mode 03:50:43 executing program 2: 03:50:43 executing program 4: 03:50:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) write$UHID_INPUT(r1, &(0x7f0000001040)={0x18, {"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", 0x1000}}, 0x1b7) 03:50:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:50:45 executing program 3: 03:50:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 03:50:45 executing program 4: 03:50:45 executing program 2: 03:50:45 executing program 0: 03:50:45 executing program 3: 03:50:45 executing program 4: 03:50:45 executing program 0: 03:50:45 executing program 2: [ 950.107132][ T5587] device macvtap25 entered promiscuous mode 03:50:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 03:50:46 executing program 3: [ 950.328487][ T5600] device macvtap26 entered promiscuous mode 03:50:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) 03:50:48 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:50:48 executing program 0: pselect6(0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x3938700}, 0x0) 03:50:48 executing program 4: 03:50:48 executing program 3: 03:50:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 03:50:49 executing program 3: 03:50:49 executing program 4: [ 953.188975][ T5618] device macvtap27 entered promiscuous mode 03:50:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x3c}}, 0x0) 03:50:49 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:50:49 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x0) 03:50:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {0x2}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_STARTUP_QUERY_INTVL={0xc}]}}}]}, 0x40}}, 0x0) 03:50:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) 03:50:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x25, 0x4, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x4, 0x0, @private, @multicast1, {[@timestamp_addr={0x44, 0x4}, @generic={0x0, 0x9, "ffc9a5c3ba1528"}, @generic={0x0, 0xf, "ffd3f1eb90d63e761e763d612a"}, @timestamp_prespec={0x44, 0x44, 0x0, 0x3, 0x0, [{@initdev={0xac, 0x1e, 0x0, 0x0}}, {@broadcast}, {@private}, {@broadcast}, {@broadcast}, {}, {}, {@empty}]}, @cipso={0x86, 0x1d, 0x0, [{0x0, 0xa, "0a7225d61b22c806"}, {0x0, 0x7, "e4850dcfd7"}, {0x0, 0x6, "2c4efff7"}]}]}}}}}) 03:50:52 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x3c}}, 0x0) 03:50:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c0000001800210000000000000000001c"], 0x1c}}, 0x0) 03:50:52 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x0) 03:50:52 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:50:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_LAST_MEMBER_INTVL={0xc}]}}}]}, 0x40}}, 0x0) 03:50:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_int(r0, 0x1, 0x2, 0x0, &(0x7f0000000340)) 03:50:52 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000005180)={0x0, 0x0, 0x0}, 0x0) 03:50:52 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:50:52 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x3c}}, 0x0) 03:50:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0xe000000, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000002000055bd25a80648c63940d0524fc60100035400a0002000200000037153e3735000580c4080000d1bd", 0x33fe0}], 0x1}, 0x0) 03:50:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) 03:50:55 executing program 4: r0 = memfd_create(&(0x7f00000001c0)='\x97&\x89\\\xd0\xe7\xca\x16ZG\x948\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf$\x89\x00\x00\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\x04\x00\x00\x00IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1m\xc8\xf0\x1e\rr\xa9\xa8\xcf\xad\xa9\x01\xe2\xa0L\xd5\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j%\xa5\xcc\xa6\x86\xb2\xdeY\x17yX\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcQj\x1a`\x15\xf7\xc8\xbb\f\t\xacd:#\x96\xf9\xd7\x1c]I\xff\xff\xff\xff\xd8\x8f\x1fe}\x1a\x91\xdf{\xe0\'mZlU\".\x18)\xcf\x1am\xdc\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1cB\x8eu\x85\xcew\x89\x95&3NX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf\x00\x00\x00-U\x96t\xc9\t\'\xaa\x9etf\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd2y\xffi)G\xc7~\xe2\xa0\x0ff<\x8e', 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:50:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) 03:50:55 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:50:55 executing program 0: timerfd_create(0x2, 0x0) 03:50:55 executing program 3: socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000010000104fd0004000000000000000000", @ANYRES32=r2, @ANYRES32], 0x28}}, 0x0) [ 959.379106][ T5696] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 959.417890][ T5696] device team0 entered promiscuous mode 03:50:55 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0xffffffffffffb939}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:50:55 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 959.443134][ T5696] device team_slave_0 entered promiscuous mode [ 959.459099][ T5696] device team_slave_1 entered promiscuous mode 03:50:55 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000040)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x90) 03:50:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) [ 959.517659][ T5704] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 03:50:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) listen(r1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 03:50:55 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:50:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:50:58 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x800, 0x0) read$FUSE(r0, &(0x7f0000000e00)={0x2020}, 0x2020) 03:50:58 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000040)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x90) 03:50:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r4, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x44}}, 0x0) 03:50:58 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:50:58 executing program 3: syz_usb_connect$uac1(0x0, 0x84, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x72, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x5}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0xe, 0x24, 0x2, 0x2, 0x0, 0x0, 0x0, "48c56b4208"}]}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x3ff, 0x0, 0x0, 0x0, {0x7, 0x25, 0x1, 0x80}}}}}}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000180)={0xa}, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 03:50:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000000), 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 03:50:58 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:50:58 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "602c3e3a99d54adc7064428359d5bdaba4e920"}) 03:50:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x30, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x30}}, 0x0) 03:50:58 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000040)={@multicast, @multicast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @multicast1}, {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 03:50:58 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 962.766114][ T17] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 963.025979][ T17] usb 4-1: Using ep0 maxpacket: 16 [ 963.156060][ T17] usb 4-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 963.165034][ T17] usb 4-1: config 1 has no interface number 1 [ 963.171911][ T17] usb 4-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 963.183143][ T17] usb 4-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 963.197922][ T17] usb 4-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 963.475929][ T17] usb 4-1: string descriptor 0 read error: -22 [ 963.483080][ T17] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 963.494672][ T17] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 963.549985][ T17] usb 4-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 963.800182][ T17] usb 4-1: USB disconnect, device number 2 [ 964.535662][ T17] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 964.815742][ T17] usb 4-1: Using ep0 maxpacket: 16 [ 964.965783][ T17] usb 4-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 964.974852][ T17] usb 4-1: config 1 has no interface number 1 [ 964.983056][ T17] usb 4-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 964.994636][ T17] usb 4-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 965.009053][ T17] usb 4-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 965.315904][ T17] usb 4-1: string descriptor 0 read error: -22 [ 965.322241][ T17] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 965.334081][ T17] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 965.389455][ T17] usb 4-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 965.461590][ T17] usb 4-1: USB disconnect, device number 3 03:51:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:01 executing program 4: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clock_gettime(0x2, &(0x7f0000000200)={0x0, 0x0}) clock_nanosleep(0x2, 0x57862a7911, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) 03:51:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x30, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x30}}, 0x0) 03:51:01 executing program 0: semctl$GETZCNT(0x0, 0x4, 0xf, 0x0) 03:51:01 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x3ff) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f00000001c0)) 03:51:01 executing program 0: timer_create(0x3, 0x0, &(0x7f00000007c0)) timer_settime(0x0, 0x0, &(0x7f0000000840)={{}, {0x77359400}}, &(0x7f0000000880)) 03:51:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x14}, 0x48) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c9f21aeb2d98309a62fe4b49440000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028006001800040000000500010004000000"], 0x44}}, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x4, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x9}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xb04dacff44c6d7aa}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xffff}]}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004004}, 0x40) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000004c0)={0x7, 0xc4, "dcce7dcb42270bc6560ab863d3d627cf40da7e34f9978195578017189ac11cfeb64f18e29afb5ab2bb6872ebc391081fabef7e8ca715078bad7c5ad71ad3db23a47935be351e6e1b68bb02a39e81f2b31aa620773e22a5b3b38d7aed8525d53551e633bd05dad3b7b84c4253600f5563e71f9237366d2e6b3131dc4880f4acddec09391ff115c1daeb2cbe03df9b726b3380c204c6c9db6418fc597d0302e7107297a6d6dc5825bd8c0f708c24616ad4b75b7715efe7cfa103370cbfb3cdd602686bc41d"}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYRESOCT], 0x130}}, 0x4000) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x30, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x23151}, [@IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x30}}, 0x0) 03:51:01 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:01 executing program 3: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) 03:51:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x48}}, 0x0) 03:51:01 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_DELOBJ={0x1c, 0x14, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_OBJ_TYPE={0x8}]}], {0x14}}, 0x44}}, 0x0) 03:51:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000a80)=[{{&(0x7f0000000040)={0x2, 0x4e20, @remote}, 0x10, 0x0}}], 0x1, 0x0) 03:51:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e1f, @remote}, 0x10) 03:51:04 executing program 2: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:04 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local, @empty, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "259a5f", 0x8, 0x0, 0x0, @dev, @dev, {[@routing]}}}}}, 0x0) 03:51:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') read$alg(r0, &(0x7f00000000c0)=""/136, 0xfe5b) read$alg(r0, 0x0, 0x0) 03:51:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0x900}, 0x40) 03:51:04 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000500)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x2c}}, 0x0) 03:51:04 executing program 2: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:04 executing program 4: clock_adjtime(0x0, &(0x7f0000000440)) 03:51:04 executing program 2: sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:07 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) 03:51:07 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:51:07 executing program 3: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000500)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}]}, 0x2c}}, 0x0) 03:51:07 executing program 2: r0 = socket(0x0, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:07 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/if_inet6\x00') read$FUSE(r0, &(0x7f0000002500)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 03:51:07 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080)={0x0, 0x3a4f}, &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_FSYNC={0x3, 0x4, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) 03:51:07 executing program 2: r0 = socket(0x0, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f00000001c0)='./bus\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 03:51:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') read$alg(r0, &(0x7f0000000140)=""/129, 0xc7) read$alg(r0, 0x0, 0x0) [ 972.255361][ T5944] overlayfs: filesystem on './bus' not supported as upperdir 03:51:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000006c0)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x20}}, 0x0) 03:51:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:10 executing program 2: r0 = socket(0x0, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:10 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x20000811) 03:51:10 executing program 3: 03:51:10 executing program 2: r0 = socket(0x10, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:10 executing program 5: 03:51:10 executing program 3: 03:51:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:10 executing program 4: 03:51:11 executing program 3: 03:51:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:13 executing program 4: 03:51:13 executing program 2: r0 = socket(0x10, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:13 executing program 3: 03:51:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) 03:51:13 executing program 5: 03:51:14 executing program 3: 03:51:14 executing program 4: 03:51:14 executing program 5: 03:51:14 executing program 2: r0 = socket(0x10, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) 03:51:14 executing program 4: 03:51:14 executing program 3: 03:51:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:16 executing program 5: 03:51:16 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) 03:51:16 executing program 4: 03:51:16 executing program 3: 03:51:17 executing program 3: 03:51:17 executing program 5: 03:51:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:17 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0x541b, 0x0) 03:51:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:17 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x11, 0x0, 0x0) 03:51:17 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000180)={0xaa, 0x5e}) 03:51:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:17 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000040)={0x0, 0x3136564e, 0x0, @stepwise}) 03:51:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:17 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:17 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f00000002c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000100)={0x0, 0x0, 0x0, [], 0x0}) 03:51:17 executing program 4: syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000003680)=[{&(0x7f0000000400)="de", 0x1, 0x80000001}], 0x1000000, &(0x7f0000003780)={[{',@#\x90^'}]}) 03:51:17 executing program 3: socket(0xa, 0x0, 0xafc5) 03:51:17 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) 03:51:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') [ 981.764773][ T6060] squashfs: Unknown parameter '@#^' 03:51:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x31, 0x0, 0x0) 03:51:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000000)=0x7, 0x4) 03:51:17 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=ANY=[], 0x38) 03:51:17 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:20 executing program 5: timer_create(0x0, 0x0, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{}, {0x0, r0+10000000}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x3938700}}, &(0x7f0000000380)) 03:51:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:20 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:20 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, 0x0) 03:51:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x29, 0x13, 0x0, 0x0) 03:51:20 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001ec0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, 0x0, 0x0) 03:51:20 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:51:20 executing program 3: pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 03:51:20 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x38, &(0x7f0000000100)=@fragment, 0x8) 03:51:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x1b, 0x0, 0x0) 03:51:23 executing program 4: rt_sigprocmask(0x0, &(0x7f0000001280), &(0x7f00000012c0), 0x8) 03:51:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:23 executing program 5: clone3(&(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000000)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x1}, 0x90) 03:51:23 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:23 executing program 4: openat$dsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp1\x00', 0x8841, 0x0) 03:51:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:23 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:23 executing program 3: syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) 03:51:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0xfffffffd, 0x4) 03:51:23 executing program 5: sysfs$1(0x1, &(0x7f00000007c0)='hash\x00') 03:51:24 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:26 executing program 4: r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, r0) 03:51:26 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:26 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="65727370616e30000000000000000000c3"]}) 03:51:26 executing program 5: socketpair(0x10, 0x3, 0x0, &(0x7f0000000340)) 03:51:26 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:26 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) r1 = socket(0x18, 0x0, 0x0) close(r1) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0x80005) 03:51:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:26 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:26 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:26 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:26 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_CTX_REMOVE_NOTIFICATION(r0, 0x5451, 0x0) 03:51:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:27 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 03:51:27 executing program 4: timerfd_create(0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$cuse(0xffffffffffffff9c, &(0x7f0000000880)='/dev/cuse\x00', 0x2, 0x0) 03:51:27 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000080), 0x2e) r1 = syz_io_uring_setup(0x7057, &(0x7f00000000c0)={0x0, 0x7af4, 0x10, 0x2, 0x34c}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x200000c, 0x110, r1, 0x10000000) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', {0x2}, 0xf50}) 03:51:27 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:27 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) 03:51:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 03:51:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:27 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x1e, 0x3, &(0x7f00000004c0)=@framed, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:51:27 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, 0x0, 0x0, 0x0) 03:51:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:51:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:27 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x29, 0x2b, 0x0, 0x0) 03:51:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5a, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}]}, 0x40}}, 0x0) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0xb, 0x0) 03:51:27 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:27 executing program 3: r0 = fsopen(&(0x7f00000000c0)='debugfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 03:51:27 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, 0x0}, 0x0) 03:51:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/211, 0x2e, 0xd3, 0x8}, 0x20) 03:51:27 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:27 executing program 4: syz_80211_join_ibss(&(0x7f0000000080)='wlan1\x00', 0x0, 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000001400)={0x3, @default, 0xee01}) getsockname$ax25(r0, 0x0, &(0x7f0000001b40)) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000001b80)) 03:51:27 executing program 3: r0 = fsopen(&(0x7f00000000c0)='debugfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x80) 03:51:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 992.156342][ T6279] BPF:[1] ENUM (anon) [ 992.186613][ T6279] BPF:size=4 vlen=1 [ 992.201765][ T6279] BPF: [ 992.219996][ T6279] BPF:Invalid name 03:51:28 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') [ 992.240621][ T6279] BPF: [ 992.240621][ T6279] [ 992.280491][ T6279] BPF:[1] ENUM (anon) [ 992.304389][ T6279] BPF:size=4 vlen=1 03:51:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x29, 0x2a, 0x0, 0x0) 03:51:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000080)="e5", 0x1, 0x0, 0x0, 0x0) 03:51:28 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 992.325868][ T6279] BPF: [ 992.341631][ T6279] BPF:Invalid name [ 992.364324][ T6279] BPF: [ 992.364324][ T6279] 03:51:28 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x30) 03:51:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:28 executing program 3: clone3(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, {0x41}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:51:28 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 992.511114][ T6302] ptrace attach of "/root/syz-executor.1"[6300] was attempted by "/root/syz-executor.1"[6302] 03:51:28 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, 0x0) 03:51:28 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:28 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x20) 03:51:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:28 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f00000001c0)) 03:51:28 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 992.703504][ T6315] ptrace attach of "/root/syz-executor.1"[6314] was attempted by "/root/syz-executor.1"[6315] 03:51:28 executing program 4: perf_event_open$cgroup(&(0x7f00000006c0)={0x3, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:51:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x1500}]}}, &(0x7f0000000240)=""/211, 0x26, 0xd3, 0x1}, 0x20) 03:51:28 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 992.876345][ T6328] ptrace attach of "/root/syz-executor.1"[6327] was attempted by "/root/syz-executor.1"[6328] 03:51:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'adiantum(xchacha12,serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="27fae4d807c6920b3027a2345e93a286c5b2cc66c7a475aba84e173b850e612d", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000200)=""/4109, 0x100d}, {&(0x7f0000000080)=""/57, 0x39}, {&(0x7f0000000140)=""/33, 0x21}], 0x3}}], 0x1, 0x0, 0x0) 03:51:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:28 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x8000, 0x2) ioctl$vim2m_VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000040)) 03:51:28 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000042c0)={0x1, &(0x7f0000004280)=[{0x2}]}, 0x10) 03:51:28 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x8, 0x0, 0x0) 03:51:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:29 executing program 4: syz_mount_image$fuse(&(0x7f0000000140)='fuse\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) 03:51:29 executing program 5: r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000180)=""/184) 03:51:29 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:29 executing program 3: pselect6(0x40, &(0x7f00000005c0)={0x4}, 0x0, &(0x7f0000000640)={0x2}, &(0x7f00000006c0), 0x0) [ 993.399848][ T6363] fuse: Bad value for 'fd' 03:51:29 executing program 5: keyctl$dh_compute(0xd, 0x0, 0x0, 0x0, 0x0) [ 993.447195][ T6363] fuse: Bad value for 'fd' 03:51:29 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001ec0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000001fc0)={0xb, 0x10, 0xfa00, {0x0}}, 0xffffffffffffff58) 03:51:29 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000000040)=@bpq0='bpq0\x00', 0x10) 03:51:29 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x40) 03:51:29 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:29 executing program 5: syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x10000000, 0x200) 03:51:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0x3, 0x0, 0x0) 03:51:29 executing program 3: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)=@fragment, 0xfffffffffffffe21) 03:51:29 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:29 executing program 4: migrate_pages(0x0, 0x9, 0x0, &(0x7f0000000080)=0xfffffffffffffe34) 03:51:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:29 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000140)={@empty}, 0x14) 03:51:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x30, 0x0, 0x0) 03:51:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:30 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x35, 0x0, 0x0) 03:51:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:30 executing program 3: pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000008, 0xffffffffffffffff) 03:51:30 executing program 5: syz_open_dev$vcsn(0x0, 0x0, 0x0) clone3(&(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_genetlink_get_family_id$l2tp(&(0x7f0000002800)='l2tp\x00') 03:51:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:30 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:30 executing program 4: r0 = epoll_create1(0x0) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) 03:51:30 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x1000005, 0x4) 03:51:30 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:30 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000080)) 03:51:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:30 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0x10) 03:51:30 executing program 3: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:51:33 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:33 executing program 5: r0 = fsopen(&(0x7f0000000040)='cpuset\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 03:51:33 executing program 3: select(0x40, &(0x7f0000001140), 0x0, &(0x7f00000011c0)={0x2}, &(0x7f0000001200)) 03:51:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x13, &(0x7f0000000100)=@fragment, 0x8) 03:51:33 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x14) 03:51:33 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) [ 997.366782][ T6475] new mount options do not match the existing superblock, will be ignored 03:51:33 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000002180)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000200)) 03:51:33 executing program 5: epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240), 0x8) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 03:51:33 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x894c, 0x0) 03:51:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:33 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00'}) 03:51:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:36 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:36 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) 03:51:36 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0)='devlink\x00') 03:51:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:36 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f00000002c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000040)={0x0, @reserved}) 03:51:36 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:36 executing program 4: bpf$MAP_CREATE(0x1d, &(0x7f0000000080), 0x40) 03:51:36 executing program 3: socketpair(0x27, 0x0, 0x0, &(0x7f0000000100)) 03:51:36 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 03:51:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:36 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r1}}, 0x20) 03:51:39 executing program 3: statx(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x100, 0x2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0xa8, 0x4, &(0x7f0000000340)=[{&(0x7f0000000080)="ec17bb187773223acf744653412ce7735013e43f83b308978d1cc44814ccb70f0781a8d2200219e2dc170074462f541ebfaaa1497a3a221eb9d151bf181301e5e8b10b9857b9047023d631ce87f6963e4594b88395c93f24dc5f9a811a2caaf2113218bb96dccdc609c10c1e8554a0a32cdc6b1a455535bd565921f49029c7e32b0546c1c861ec1fa279e223fdf3c4c20ed766f41919591f051e0a577afdcd84f4d1d1e164575e77219caf468885f03092e9a9bc3c1adc0b3027", 0xba, 0x1000}, {&(0x7f0000000140)="7412dacf96ca1ab20bff6b680fbc61c10260719fe608ed374aa81ef30f569f3a555a788b9857c0c5095ef42189125ab4819c35739dfc28d22702f82f393d6dddd8c6e68cadaab2e7509cffece14e1ecf79bb54fbab4ddea9b6c68550d352dda90b6b467130f0e936d4937894727f5d703ec05f7ab5b647c09660549e5b6fa1b973c028009b251d9f41c9cd8e0e526aa9549b0ea9e69ca25d784b97ded833bac46b91829a48caa871cdad904bfa638a9e0ebc1e94caf300a37ca3fb0457dc9fad558c873d4e82816f70a79ea5eec3695fce5c8a90a3110ed683426ce59ecb1166fc7548e26e005956e2", 0xe9, 0x81}, {&(0x7f0000000240)="b6d897e71a1224c4a5d5bcabdac2e88f2eeb4a72751b53cb0f214e39d81f00ca45b060bac04bb30173653e5472cda483042e0f30", 0x34, 0x400}, {&(0x7f0000000280)="dcee610fe3968f2e6ce8648f28d6dd9368f15b8882aa71218aa6cd945f2350e42c4947ed02d0a8ebef83db0cc1437de2bad117833866267b11c268ca4b8c5d7f3d45e5007fc2f2117211be8502e9f3046efc6cb8604bae55ca491624c38b33e7c1e6c4fb494ca16d982be1e7877a250e8220c8bd49795be2f69ea5330b2feb17fa471e991927658ff08699659f537c0c5dbe11d501", 0x95, 0x10000}], 0x210000, &(0x7f0000000500)={[], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x0, 0xbe02bd7954bd074a, 0x39, 0x33, 0x34, 0x62, 0x65], 0x2d, [0x63, 0x64, 0x38, 0x66], 0x2d, [0x39, 0x34, 0x0, 0x35], 0x2d, [0x37, 0x34, 0x63, 0x62], 0x2d, [0x35, 0x3d, 0x62, 0x58, 0x31, 0x63, 0x0, 0x66]}}}, {@appraise_type='appraise_type=imasig'}, {@uid_lt={'uid<', r0}}, {@dont_hash='dont_hash'}, {@smackfstransmute={'smackfstransmute'}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x37, 0x33, 0x61, 0x0, 0x37, 0x0, 0x62], 0x2d, [0x36, 0x39, 0x39, 0x62], 0x2d, [0x35, 0x37, 0x35, 0x36], 0x2d, [0x38, 0x38, 0x0, 0x30], 0x2d, [0x39, 0x39, 0x63, 0x66, 0x62, 0x63, 0x33, 0x35]}}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}) syz_open_dev$vbi(&(0x7f0000000680)='/dev/vbi#\x00', 0x0, 0x2) syz_open_dev$char_raw(&(0x7f0000000740)='/dev/raw/raw#\x00', 0x1, 0x200000) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000007c0)=""/84, &(0x7f0000000840)=0x54) 03:51:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:39 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000", 0xe, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:39 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x1a, 0x3, &(0x7f00000004c0)=@framed, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x4}, 0x78) 03:51:39 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f00000007c0)) 03:51:39 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000", 0xe, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:39 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind(r0, &(0x7f0000003680)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80) [ 1003.586952][ T6556] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0xe797d8b6) [ 1003.631753][ T6556] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 03:51:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') [ 1003.721669][ T6556] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1003.778720][ T6556] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 03:51:39 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) 03:51:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') [ 1003.883144][ T6556] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0xe797d8b6) [ 1003.891868][ T6556] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1003.913601][ T6556] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1003.921383][ T6556] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 03:51:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:42 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000", 0xe, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:42 executing program 4: add_key(&(0x7f00000001c0)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffeb8, 0x0) 03:51:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x29, 0x19, 0x0, 0x0) 03:51:42 executing program 3: syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0xb04c1) 03:51:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0), 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:42 executing program 4: openat$capi20(0xffffffffffffff9c, &(0x7f00000025c0)='/dev/capi20\x00', 0x20000, 0x0) 03:51:42 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000), 0x4) 03:51:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000040)={'batadv0\x00', @ifru_names}) 03:51:42 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b000000000000", 0x10, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0), 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:42 executing program 5: syz_open_dev$hiddev(&(0x7f0000000300)='/dev/usb/hiddev#\x00', 0x0, 0x20000) 03:51:45 executing program 4: keyctl$dh_compute(0x10, &(0x7f0000000240), 0x0, 0x0, 0x0) 03:51:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:45 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b000000000000", 0x10, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in=@loopback}}, 0xe8) 03:51:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0), 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x29, 0x32, 0x0, 0x0) 03:51:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000100)={'bond_slave_0\x00', @ifru_data=&(0x7f00000000c0)="bdbb7ea2d3ea3a471cc05fa3618b8907b5ed63875391e015061f8e4017c55537"}) 03:51:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x2c, 0x1, 0x2, 0x401, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}]}, 0x2c}}, 0x0) 03:51:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x88, 0x0, 0x0, 0x0) 03:51:45 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b000000000000", 0x10, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:45 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40318, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:51:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0x6, 0x0, 0x0) 03:51:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000100)=@fragment={0x0, 0x0, 0x2}, 0x8) 03:51:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:48 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000", 0x11, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:48 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x2, 0x4) 03:51:48 executing program 4: 03:51:48 executing program 3: accept4$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:51:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x29, 0x6, 0x0, 0x0) 03:51:48 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000", 0x11, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:48 executing program 5: clone3(&(0x7f00000002c0)={0x20000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:51:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r1, 0x1}, 0x14}}, 0x0) 03:51:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote}], 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') 03:51:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x21, &(0x7f0000000280)={{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@loopback}}, 0xe8) 03:51:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:51 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000", 0x11, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:51 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f00000001c0)=0x9, 0x4) 03:51:51 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000002740)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_INFO(r0, 0x805c4d25, 0x0) 03:51:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, 0x0) 03:51:51 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOBLANK(r0, 0x4611, 0x0) 03:51:51 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:51 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f00000002c0)={0xb, {'syz1\x00', 'syz1\x00', 'syz1\x00'}}, 0x118) 03:51:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000001c0)=@get={0x1, 0x0, 0x81}) 03:51:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @remote, 0x205}], 0x1c) syz_open_procfs(0xffffffffffffffff, 0x0) 03:51:51 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0xa00, 0x0) 03:51:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:52 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x50900, 0x0) 03:51:52 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:52 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3a, &(0x7f0000000100)=@fragment, 0x8) 03:51:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2}]}, {0x0, [0x0]}}, &(0x7f0000000340)=""/230, 0x27, 0xe6, 0x1}, 0x20) 03:51:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x4, &(0x7f0000000140), 0x4) 03:51:52 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x1d, &(0x7f0000000280)={{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@loopback}}, 0xe8) 03:51:52 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x0, @multicast1}}}, 0xa0) 03:51:52 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x97d}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x10004, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:51:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)={0x1c, 0xd, 0xa, 0x301, 0x0, 0x0, {}, [@typed={0x4, 0x65}, @generic="e9"]}, 0x1c}}, 0x0) 03:51:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5}]}}, &(0x7f00000000c0)=""/232, 0x2a, 0xe8, 0x1}, 0x20) [ 1016.497667][ T6753] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 03:51:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:54 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x35, &(0x7f0000000100)=@fragment, 0x8) 03:51:54 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x1, &(0x7f0000000000)=@raw=[@func], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x48], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:51:54 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x20) 03:51:54 executing program 0: openat$adsp1(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/adsp1\x00', 0x161001, 0x0) 03:51:55 executing program 5: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000040)={0x16, 0x7, 0x0, {{0x9, '[#!*$#+:#'}}}, 0x16) write$P9_RXATTRCREATE(r0, &(0x7f00000018c0)={0x7}, 0x7) 03:51:55 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@raw={'raw\x00', 0x9, 0x3, 0x268, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x340, 0xffffffff, 0xffffffff, 0x340, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@ipv4={[], [], @empty}, @empty, [], [], 'team_slave_0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x208}}, {{@ipv6={@remote, @private1, [], [], 'batadv0\x00', 'wlan0\x00'}, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2c8) 03:51:55 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:55 executing program 3: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000480)='$', 0x1, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f00000001c0)={0x0, r0}, 0x0, 0x0, 0x0) 03:51:55 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, 0x0) 03:51:55 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:51:58 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0xa0) 03:51:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8980, &(0x7f00000000c0)={'sit0\x00', 0x0}) 03:51:58 executing program 5: syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x14f440) 03:51:58 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x5452, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 03:51:58 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0), 0x0, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:58 executing program 4: socket$inet6(0xa, 0x0, 0x758) 03:51:58 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r0}) 03:51:58 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0), 0x0, 0x0, &(0x7f0000003700)={0x77359400}) 03:51:58 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:51:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8980, &(0x7f00000000c0)={'sit0\x00', 0x0}) 03:51:58 executing program 4: clone3(&(0x7f00000001c0)={0x11000, 0x0, 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:52:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x29, 0x4c, 0x0, 0x0) 03:52:01 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0), 0x0, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x8, &(0x7f0000000380)=@framed={{}, [@alu={0x7}, @exit, @initr0, @generic={0x7f}]}, &(0x7f0000000400)='GPL\x00', 0x4, 0xc8, &(0x7f0000000440)=""/200, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540), 0x8, 0x10, 0x0}, 0x78) 03:52:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x13, &(0x7f0000000100)=@fragment={0x0, 0x0, 0x2}, 0x8) 03:52:01 executing program 4: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x401, 0x0) 03:52:01 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:52:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0x3, 0x0, 0xff2d) 03:52:01 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0xbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:52:01 executing program 4: syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x416102) 03:52:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x9, 0x4) 03:52:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c66861", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:04 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 03:52:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)={0x0}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') 03:52:04 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:04 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x48, &(0x7f0000000600)={@private2}, 0x14) 03:52:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4820}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:52:04 executing program 3: socketpair(0x2c, 0x3, 0x3f, &(0x7f0000000240)) 03:52:04 executing program 4: syz_io_uring_setup(0x6dd1, &(0x7f0000000080)={0x0, 0x0, 0x20}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 03:52:04 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000002740)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_INFO(r0, 0x541b, 0x0) 03:52:04 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:04 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='comm\x00') 03:52:04 executing program 3: read$qrtrtun(0xffffffffffffffff, 0x0, 0x0) 03:52:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c66861", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600)=[{0x0}, {0x0}], 0x2}, 0x2) 03:52:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000040000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000d302005ff4f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$gfs2(&(0x7f0000000300)='gfs2\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0, 0x800020, &(0x7f0000000580)={[{@data_ordered='data=ordered'}]}) 03:52:07 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, 0x0, 0x0, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:07 executing program 5: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x101, 0xa0600) 03:52:07 executing program 3: inotify_add_watch(0xffffffffffffffff, 0x0, 0x100005e0) 03:52:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0x7d, &(0x7f0000000080), 0xe) [ 1031.593093][ T6917] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 03:52:07 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f00000000c0)='!\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff) 03:52:07 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000180)='@'}) 03:52:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='cpuset\x00') sendfile(r1, r2, 0x0, 0x800000080004103) ioctl$KVM_CREATE_VM(r0, 0xc008ae05, 0x53605d) 03:52:07 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, 0x0, 0x0, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:07 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_CTX_REMOVE_NOTIFICATION(r0, 0x7a4, 0x0) [ 1031.853477][ T6943] binder: 6938:6943 ioctl c0306201 0 returned -14 [ 1032.640392][ T6943] binder: 6938:6943 ioctl c0306201 0 returned -14 03:52:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c66861", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:10 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, 0x0, 0x0, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x6, 0x0, 0x0) 03:52:10 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7f}]}) 03:52:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f00000001c0), 0x4) 03:52:10 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xa, 0x0, 0x0) 03:52:10 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:10 executing program 5: keyctl$dh_compute(0xe, &(0x7f00000001c0), 0x0, 0x0, 0x0) 03:52:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='schedstat\x00') sendfile(r1, r2, 0x0, 0x800000080004103) ioctl$KVM_CREATE_VM(r0, 0xc008ae05, 0x53605d) 03:52:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-fixed-time)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0xfec8) recvmmsg(r1, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003400)=""/4108, 0x100c}], 0x1}}], 0x1, 0x0, 0x0) 03:52:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a6", 0xc0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 1034.788749][ T34] audit: type=1326 audit(1605585130.620:31): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=6960 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460d1a code=0x0 03:52:10 executing program 5: syz_io_uring_setup(0x5a5a, &(0x7f0000000040), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x434, &(0x7f0000000140), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 03:52:10 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000002180)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5336, &(0x7f0000000000)={{}, 'port1\x00'}) 03:52:10 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:10 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1035.472616][ T34] audit: type=1326 audit(1605585131.300:32): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=6960 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460d1a code=0x0 03:52:11 executing program 3: select(0x40, &(0x7f0000000040)={0x98}, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) 03:52:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 03:52:11 executing program 0: socket(0x1e, 0x0, 0x400) 03:52:11 executing program 5: pidfd_open(0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x44000) clone3(&(0x7f00000009c0)={0x1201a00, 0x0, 0x0, 0x0, {0x1000}, &(0x7f0000000a80)=""/55, 0x37, 0x0, &(0x7f0000000a40)=[0x0], 0x1, {r0}}, 0x58) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r1, &(0x7f0000000980)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000940)={0x0}}, 0x0) syz_io_uring_setup(0x2e74, &(0x7f0000000000)={0x0, 0xa4a, 0x10, 0x9, 0x24b, 0x0, r0}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x903) syz_open_dev$vcsn(0x0, 0x0, 0x44000) 03:52:11 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {0x0}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:11 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x201, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 03:52:11 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {0x0}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a6", 0xc0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:13 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x73) sendmmsg$inet6(r0, &(0x7f0000005ac0)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) 03:52:13 executing program 3: perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:52:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000013c0)={'wg1\x00'}) 03:52:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8911, &(0x7f0000000480)={'ip_vti0\x00', 0x0}) 03:52:13 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {0x0}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:13 executing program 0: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="b0", 0x1, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='$', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="b0", 0x1, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r0, r1, r2}, 0x0, 0x0, 0x0) 03:52:13 executing program 4: syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x0, 0x200) 03:52:13 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:13 executing program 3: mq_open(&(0x7f0000000100)='ext4_ext_rm_leaf\x00', 0x8c0, 0x0, 0x0) 03:52:13 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001340)='ns/time\x00') 03:52:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0x23, 0x0, 0x0) 03:52:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a6", 0xc0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="cb"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb3, &(0x7f00000000c0)=""/179, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:52:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000a00)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "4de75e", "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"}}, 0x110) 03:52:16 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x17, 0x0, 0x0) 03:52:16 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, 0x0) 03:52:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xd, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:52:16 executing program 0: openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x18b2c2, 0x0) 03:52:17 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x101b00) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "cd42e3ad1edca1b890e98d3110298d948093c0ece5d7bbc368db61bfaf29fa698ab50f006e782796cb046fad36d2bfa0c200", "8f1cbdd3f4595be14c5a2ceaf084c3c0d79f94190affae2bdc39f7b08a308cf236c564697b2b5fd7f3eb8c0527f97c6f2b6dd1c6c2636c6ef9e1323cd296beea", "5727fc0427d9b8aa2e9b3f4908fad2b4123c3505ad0afaab8a3b1f240d8b9e68"}) 03:52:17 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x3, &(0x7f0000000280)={{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@loopback}}, 0xe8) 03:52:17 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, 0x0}, 0x8800) 03:52:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x33, &(0x7f00000001c0), 0x4) 03:52:19 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x200000f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:52:19 executing program 5: r0 = socket$caif_stream(0x25, 0x1, 0x0) recvmmsg(r0, &(0x7f0000004540)=[{{&(0x7f00000001c0)=@phonet, 0x80, 0x0}}], 0x1, 0x2000, 0x0) 03:52:19 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f00000001c0)='/dev/vcsu#\x00', 0x0, 0x24a003) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 03:52:19 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:20 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:20 executing program 3: rt_sigsuspend(&(0x7f0000000000)={[0x4]}, 0x8) 03:52:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0x78, 0x0, 0x0) 03:52:20 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockopt$ax25_int(r0, 0x101, 0x3, &(0x7f0000001200), &(0x7f0000001240)=0x4) 03:52:20 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x84d00) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 03:52:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x14, 0x0, 0x0) 03:52:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x19, 0x4) 03:52:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:23 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:23 executing program 0: timer_create(0x1, 0x0, &(0x7f00000000c0)) timer_delete(0x0) 03:52:23 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x5, 0x0, 0x0) 03:52:23 executing program 3: perf_event_open$cgroup(&(0x7f00000006c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc33, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:52:23 executing program 5: keyctl$dh_compute(0x16, &(0x7f00000001c0), 0x0, 0x0, 0x0) 03:52:23 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="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", 0xfa, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f00000003c0)='e', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000240)={r1, r0, r0}, 0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={'streebog256-generic\x00'}}) 03:52:23 executing program 4: process_vm_writev(0x0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/1, 0x1}, {&(0x7f0000000040)=""/219, 0xdb}, {&(0x7f0000000140)=""/171, 0xab}, {&(0x7f0000000780)=""/155, 0x92}, {&(0x7f00000002c0)=""/36, 0x24}, {&(0x7f0000000900)=""/134, 0x86}, {&(0x7f00000003c0)=""/19, 0x13}, {&(0x7f0000000400)=""/208, 0xfffffffffffffcc8}, {&(0x7f0000000880)=""/92, 0x5c}], 0x9, &(0x7f0000000840)=[{&(0x7f0000000640)=""/22, 0x16}, {&(0x7f0000000680)=""/167, 0xa7}, {&(0x7f0000000740)=""/8, 0x8}, {&(0x7f0000000300)=""/146, 0x8e}], 0x4, 0x0) 03:52:23 executing program 3: mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) pipe2$9p(&(0x7f0000000900), 0x0) 03:52:23 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:23 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:52:23 executing program 0: syz_genetlink_get_family_id$l2tp(&(0x7f0000000300)='l2tp\x00') 03:52:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:52:26 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000028c0)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000100)) 03:52:26 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x64}, 0x40) 03:52:26 executing program 5: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000180)="fc0501382a375b871a7f7afe1130780acc023be843974a5db253395328eb7f09327dd09420f419ebade5434987afb51f409adde71b1006a5ff655433f123fcf802915827babbab48c54b4ade0dfc3d0ef56bcfdb004255186985a4b79ac2130691b412a6916c5bce8d9c60ccd7c241dd8d899036afd8c451d3e2cd84c8b5735214c14bc178c060753ddbb7e9cafd3ce6b5127c7e94cc922dfddc881b36f7be08ba72574e0d730b8899d0ca408e8163ab671eec9c4cf96b95c02abdfefeb3ffb2", 0xc0, 0xfffffffffffffffc) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="b0", 0x1, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r0, r1}, 0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={'blake2s-160-x86\x00'}}) 03:52:26 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x35, &(0x7f0000000280)={{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@loopback}}, 0xe8) 03:52:26 executing program 4: syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') openat$vcsa(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vcsa\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f0000000800)='fscrypt-provisioning\x00', 0x0, &(0x7f0000000880), 0x8, r1) 03:52:26 executing program 5: r0 = add_key(&(0x7f0000001300)='id_legacy\x00', &(0x7f0000001380)={'syz', 0x3}, &(0x7f00000013c0)='v', 0x1, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000012c0)='keyring\x00', 0x0, 0x0, 0x0, r0) 03:52:26 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:26 executing program 3: getsockname$l2tp6(0xffffffffffffffff, 0x0, 0x0) 03:52:26 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$BTRFS_IOC_START_SYNC(r0, 0x4020940d, 0x0) 03:52:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce", 0xf0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:29 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {0x0}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00'}) 03:52:29 executing program 5: syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000240)="b6", 0x1}], 0x0, 0x0) 03:52:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, 0x0, 0x0) 03:52:29 executing program 4: clone3(&(0x7f0000000480)={0x2000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0xffffffffffffffff], 0x1}, 0x58) 03:52:29 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {0x0}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:29 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r0, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=[{0x10}], 0x10}, 0x38) 03:52:29 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/adsp1\x00', 0x161001, 0x0) ioctl$SNDCTL_DSP_STEREO(r0, 0xc0045003, &(0x7f0000000240)=0x1) 03:52:29 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0, 0x0, 0x28}, 0x10) 03:52:29 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {0x0}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:29 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000480), 0x4) 03:52:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce", 0xf0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:32 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0x9) 03:52:32 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x49, 0x0, 0x0) 03:52:32 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x1e, 0x0, 0x0) 03:52:32 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SYNTH_ID(r0, 0xc08c5114, 0x0) 03:52:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x2, &(0x7f0000000140)=@raw=[@initr0], &(0x7f0000000280)='GPL\x00', 0x0, 0xd5, &(0x7f00000002c0)=""/213, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x10, 0x10001, 0x6}, 0x10}, 0x78) 03:52:32 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000025c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000040)) 03:52:32 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000080)) 03:52:32 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f00000001c0), 0x4) 03:52:32 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='coredump_filter\x00') sendfile(r1, r2, 0x0, 0x800000080004103) ioctl$KVM_CREATE_VM(r0, 0xc008ae05, 0x53605d) 03:52:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce", 0xf0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:35 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000020c0)={0x2020}, 0x2020) 03:52:35 executing program 4: prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000006c0)) 03:52:35 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:35 executing program 5: perf_event_open$cgroup(&(0x7f00000006c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc33, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:52:35 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000280)=0xe370) 03:52:35 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000002180)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000002300)) 03:52:35 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$gtp(0x0) recvmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) 03:52:35 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {0x0}], 0x2}, 0x12041) 03:52:35 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {0x0}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4}, 0x40) 03:52:35 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$BTRFS_IOC_START_SYNC(r0, 0x8936, 0x0) 03:52:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a70000000000", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:52:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 03:52:38 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0xc2002, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x5450, 0x0) 03:52:38 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {0x0}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:38 executing program 4: r0 = semget(0x2, 0x0, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x0, 0x76}, {0x0, 0x5}], 0x2, 0x0) 03:52:38 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) 03:52:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000240)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 03:52:38 executing program 4: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x10d141, 0x0) 03:52:38 executing program 3: process_vm_writev(0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 03:52:38 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {0x0}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:38 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 03:52:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a70000000000", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x19, 0x4, 0x0, 0x361}, 0x40) 03:52:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:52:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func]}}, &(0x7f00000004c0)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:52:41 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0xb, &(0x7f0000000000)=@raw=[@ldst={0x3, 0x2, 0x6, 0x3, 0x8, 0xfffffffffffffff0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2a29, 0x0, 0x0, 0x0, 0x9}, @call={0x85, 0x0, 0x0, 0x18}, @map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7}, @exit], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffbb}, 0x78) r0 = syz_open_procfs(0x0, &(0x7f0000002080)='syscall\x00') ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, 0x0) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x7, &(0x7f00000004c0)=[{0x0, 0x0, 0x7}, {&(0x7f00000001c0)="2962dfc0a18ade1c4c00886eaa4232e4993f7048314871c2d006b7b3c7a82f996644fadad1bbcc786c38fbaea2564ab5eb92d0fabcaddb561451cb430a648a240a795457065c1ae701b6f59ca0ed8811e8b6ff1ba0bcb935ed5df89ee1ae4b28551203db04ef01aa9cf877fec21634778894c9b8e4d7524e6bb5b59910139f38bccf6873ef9881f78f9be795b0f896dd78dccb3dae1c3f9c967f719607096f05", 0xa0, 0x100}, {&(0x7f0000000280)="cb0185f1a965a00b0a63441971924cee0a1c09624d15bf243f734753110bd59fa949634ec30cec5e9952be72ce2fd8382867f7c0c49204420e736ff2e29d476b244c818cab0e1e9b31eeab6b2ebf9574f4d17f9a38b21307611054ab4b42c85eb6fcb1dcc8be31013ecb36edb3c38a2ab20d7e448b34d3d5de28d52f2078cbbd642c23b0ec7fbb2fa6a549807a24af23c784bf1a95f057987b300da97fe8b470822374f6d19a154c9dd490c76e481a73f3bee8667e8e3dceabcc3ef2be2199fd379f522d7d7a09230892991c0e6e7ccc4139356a6b58ff9de888001a24b2b970a31cbf8a", 0xe4, 0x5}, {&(0x7f0000000380)="1c8e62e7", 0x4, 0x2}, {&(0x7f00000003c0)="f45d00b5ab46b2f4cda7fbb0e5fe01244b54e066f2f47d9955de88d66d3677973d18f21e7babedf97f9a4cfd03d5c3346089dde2a08f0c5216e91dc433ba", 0x3e, 0x9}, {&(0x7f0000000400)="882985829f41f972da90be42a8302052e27206e059331d1d0fbd913c92d552e4d4cac368a5c22dc4d0a25269959cc86581ea9d186b8100", 0x37, 0x7fff}, {&(0x7f0000000440)="edd5bd8a08f7801de2d0061ae7149ec67a4708cba7ff4325db088dcca5886784e585ce4634ffd0f185453f5507d6ea613b7a11ab899fe849783372c3782c5e761aa68a941bfb61682b9863277c3ef4fd866480f29fb5ea67fb5c17e04d1de26455e986dab5c8efdb8c", 0x69, 0xa711}], 0x0, &(0x7f0000000580)={[{@usrquota='usrquota'}, {@discard='discard'}, {@noquota='noquota'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\'+!['}}]}) r1 = syz_open_procfs(0x0, &(0x7f0000002080)='syscall\x00') ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, 0x0) setsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f00000005c0), 0x4) socket$inet6(0xa, 0x7, 0x0) 03:52:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0x82, 0x0, 0x0) 03:52:41 executing program 4: syz_mount_image$jfs(0x0, 0x0, 0x0, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000140)="1b", 0x1}, {&(0x7f0000000400)="88", 0x1, 0x7fff}], 0x0, 0x0) 03:52:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') sendfile(r1, r2, 0x0, 0x800000080004103) ioctl$KVM_CREATE_VM(r0, 0xc008ae05, 0x53605d) [ 1065.939436][ T7400] JFS: discard option not supported on device [ 1065.955620][ T7400] jfs: Unrecognized mount option "smackfstransmute='+![" or missing value 03:52:41 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:42 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000002180)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000280)) 03:52:42 executing program 0: add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="e0", 0x1, 0xfffffffffffffffc) 03:52:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a70000000000", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:44 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x5, &(0x7f0000000100)=@fragment, 0x8) 03:52:44 executing program 5: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0xc0040, 0x0) 03:52:44 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:44 executing program 3: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self\x00', 0x20a001, 0x0) waitid$P_PIDFD(0x3, r0, 0x0, 0x2, 0x0) 03:52:44 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000040)={0x0, 0x2, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3eb4fa8e"}}) 03:52:44 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, 0x0) clone3(&(0x7f0000000280)={0x20000900, 0x0, 0x0, 0x0, {}, &(0x7f00000000c0)=""/106, 0x6a, 0x0, &(0x7f0000000240)=[0x0], 0x1}, 0x58) 03:52:44 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:44 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) perf_event_open$cgroup(&(0x7f0000000780)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c40}, r0, 0x0, 0xffffffffffffffff, 0x0) 03:52:44 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x4d, 0x0, 0x0) 03:52:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x18, &(0x7f0000000100)=@fragment={0x0, 0x0, 0x2}, 0x8) 03:52:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x3, 0x0, 0x0) 03:52:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xfc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:47 executing program 0: mq_open(&(0x7f0000000080)='[$:}\x00', 0x0, 0x0, &(0x7f00000000c0)) 03:52:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000a00)={0x9, 0x108, 0xfa00, {r1, 0x0, '\x00', "9be98d7ff45534c759462d66b8f79c68859064556eeaf69b7ca21cca9276e9d9e39f44f23bd5b15493fd62b6ef2ab4feb0a98aba895eb595ef11af74022a388bb7fab47de100861813e9cc5f4e7b0f5110750aa49f86ed48949e40d7992134253d3bd1733a77a7c033bc9446f4cc38d55e15e79669460e45b3e1eaca5d3575ae8d34f812bf664ff657dff62e1c4f5b459ae22b8bc16694c011d4979ccd658ad6860d2d590dc913d15b30ac0ccccee841b88640010bfbc74aa599948cdb7fcfb6b595092011bbbd82622696548b7397adaa00908eb62bd09bde8df0a6c6a6bd7af3b87637bd519a076990a92ed907d4dc27c0ab328b5603ae15b92b2de8296b31"}}, 0x110) 03:52:47 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:47 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000200)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0x30, 0x0, &(0x7f0000000240)=[@dead_binder_done, @request_death, @increfs_done], 0x1, 0x0, &(0x7f0000000280)="d0"}) 03:52:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 03:52:47 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000080)) 03:52:48 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:48 executing program 3: pidfd_open(0xffffffffffffffff, 0x0) 03:52:48 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) 03:52:48 executing program 4: clone3(&(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f00000018c0)=""/70, 0x46, &(0x7f0000001940)=""/140, 0x0}, 0x58) 03:52:48 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x29, 0x17, 0x0, 0x0) 03:52:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xfc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:50 executing program 3: syz_genetlink_get_family_id$nl80211(&(0x7f0000000780)='nl80211\x00') 03:52:50 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:50 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000002540)='rxrpc\x00', &(0x7f0000002580)={'syz', 0x3}, 0xfffffffffffffffb) 03:52:50 executing program 4: clock_getres(0xc40fa6d0fb7d10a0, 0x0) 03:52:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000000)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x207}}, 0x18) 03:52:51 executing program 5: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/adsp1\x00', 0x161001, 0x0) ioctl$SNDCTL_DSP_GETCAPS(r0, 0x8004500f, &(0x7f0000000000)) 03:52:51 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000010c0)={0x2a, 0x1, 0x4001}, 0xc) 03:52:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BTRFS_IOC_START_SYNC(r0, 0x541b, 0x0) 03:52:51 executing program 0: r0 = socket(0x11, 0x2, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 03:52:51 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:51 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f00000001c0)='syz0\x00') 03:52:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xfc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:54 executing program 5: request_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='*\x00', 0xffffffffffffffff) 03:52:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000), 0x4) 03:52:54 executing program 0: socket$isdn(0x2c, 0x3, 0x0) 03:52:54 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$FBIOPAN_DISPLAY(r0, 0x4606, 0x0) 03:52:54 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:54 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {0x0}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:54 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f00000001c0)='/dev/vcsu#\x00', 0x6, 0x2) write$cgroup_type(r0, 0x0, 0x0) 03:52:54 executing program 5: timer_create(0x8, 0x0, &(0x7f00000000c0)) 03:52:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x5, [@datasec={0x3, 0x1, 0x0, 0xf, 0x2, [{0x3, 0x0, 0x2}], "e400"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "017a"}]}, {0x0, [0x0, 0x0, 0x2e]}}, &(0x7f0000000240)=""/183, 0x45, 0xb7, 0x1}, 0x20) 03:52:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x8, &(0x7f0000000100)=@fragment, 0x8) 03:52:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/254, 0xfe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:54 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {0x0}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:54 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000000c0)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) 03:52:54 executing program 3: bpf$ITER_CREATE(0x21, &(0x7f00000016c0), 0x8) 03:52:54 executing program 5: socketpair(0xb, 0x0, 0x0, &(0x7f0000000680)) 03:52:54 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f0000000300)={0x0}}, 0x0) 03:52:54 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {0x0}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/211, 0x2e, 0xd3, 0x1}, 0x20) 03:52:54 executing program 0: socket(0x2b, 0x1, 0x5) 03:52:54 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x3f, 0x2) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x3, @win={{}, 0x0, 0x0, &(0x7f0000000280), 0x1, 0x0}}) 03:52:54 executing program 4: perf_event_open$cgroup(&(0x7f00000006c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:52:54 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x4e, &(0x7f0000000100)=@fragment, 0x8) 03:52:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/254, 0xfe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:52:57 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:57 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, 0x0) 03:52:57 executing program 4: bpf$MAP_CREATE(0xc, &(0x7f0000000080), 0x40) 03:52:57 executing program 3: socket(0x1d, 0x0, 0x8) 03:52:57 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000004a40)={'vxcan1\x00'}) 03:52:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x19, &(0x7f0000000100)=@fragment={0x0, 0x0, 0x2}, 0x8) 03:52:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/211, 0x1a, 0xd3, 0x1}, 0x20) 03:52:57 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:52:57 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000000)=0x2, 0x4) 03:52:57 executing program 5: socket(0x1, 0x0, 0x7fff) 03:52:57 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/254, 0xfe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000940)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000280)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 03:53:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x19, &(0x7f0000000100)=@fragment={0x0, 0x0, 0x2}, 0x8) 03:53:00 executing program 5: syz_io_uring_setup(0x639b, &(0x7f0000000080), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), 0x0) 03:53:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f00000000c0)=@newtaction={0x60, 0x30, 0x1, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_ife={0x48, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x60}}, 0x0) 03:53:00 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:00 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:00 executing program 3: r0 = syz_open_dev$video4linux(&(0x7f00000002c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) 03:53:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f00000000c0)=@newtaction={0x60, 0x30, 0x1, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_ife={0x48, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x60}}, 0x0) 03:53:00 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_MIDI_INFO(r0, 0xc074510c, &(0x7f0000000000)={"e2420a0ebfbbcad2e96753a02d1ba1111aadf6655c6e0574c7d0aa88092e", 0xb6}) 03:53:00 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000000040)) [ 1084.834598][ T7686] Sensor A: ================= START STATUS ================= [ 1084.863876][ T7686] v4l2-ctrls: Sensor A: Test Pattern: 75% Colorbar 03:53:00 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) [ 1084.905430][ T7686] v4l2-ctrls: Sensor A: Show Information: All [ 1084.946306][ T7686] v4l2-ctrls: Sensor A: Vertical Flip: false [ 1084.975270][ T7686] v4l2-ctrls: Sensor A: Horizontal Flip: false [ 1085.002452][ T7686] v4l2-ctrls: Sensor A: Brightness: 128 [ 1085.036976][ T7686] v4l2-ctrls: Sensor A: Contrast: 128 [ 1085.042406][ T7686] v4l2-ctrls: Sensor A: Hue: 0 [ 1085.055843][ T7686] v4l2-ctrls: Sensor A: Saturation: 128 [ 1085.061441][ T7686] Sensor A: ================== END STATUS ================== 03:53:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/255, 0xff}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:03 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETCAPS(r0, 0x8004500f, &(0x7f0000000000)) 03:53:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 03:53:03 executing program 4: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_persistent(0x16, 0x0, r0) 03:53:03 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:03 executing program 3: socketpair(0xa, 0x0, 0x0, &(0x7f0000000900)) 03:53:03 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0xfff, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000001c0)={0x0, 0x3, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ca0df695"}, 0x0, 0x0, @fd}) 03:53:03 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a00)={0x14}, 0x14}}, 0x0) 03:53:03 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}) 03:53:03 executing program 3: bpf$MAP_CREATE(0x1a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) 03:53:03 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/255, 0xff}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:06 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f00000009c0)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000040)={0x1, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}) 03:53:06 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) get_mempolicy(&(0x7f0000000000), &(0x7f0000000080), 0x8, &(0x7f0000ffc000/0x4000)=nil, 0x3) 03:53:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xd}, 0x40) 03:53:06 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x20) 03:53:06 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x1d, &(0x7f0000000100)=@fragment, 0x8) 03:53:06 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:06 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x46000, 0x0) 03:53:06 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x1c, 0x3, &(0x7f0000001080)=@framed, &(0x7f00000010c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:53:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x10, &(0x7f0000000280)={{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@loopback}}, 0xe8) 03:53:06 executing program 5: syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x6, 0x0) 03:53:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/255, 0xff}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:09 executing program 0: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0}, 0x38) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000006c0)) 03:53:09 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x7}]}]}}, &(0x7f0000000340)=""/230, 0x32, 0xe6, 0x1}, 0x20) 03:53:09 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:53:09 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f00000009c0)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000000)={0x6, @sliced}) 03:53:09 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x90) 03:53:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x8000000, 0x4) 03:53:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0xc6, 0x4) 03:53:09 executing program 3: timer_create(0x2, 0x0, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, 0x3938700}}, 0x0) 03:53:09 executing program 4: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000200)=""/67) 03:53:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:12 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:53:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000080), 0xe) 03:53:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x29, 0x36, 0x0, 0x0) 03:53:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x22, &(0x7f0000000140), 0x4) 03:53:12 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x29, 0x11, 0x0, 0x0) 03:53:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) 03:53:12 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_STEREO(r0, 0xc0045003, &(0x7f0000000240)=0x1) 03:53:12 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 03:53:12 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x8}, 0xc) 03:53:13 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000800)) 03:53:15 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, 0x0) 03:53:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:15 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000010c0)={0x2a, 0x1}, 0xc) 03:53:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140), 0x4) 03:53:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x4, 0x0, 0x0) 03:53:15 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000002940)={0x0, 0x0, 0x0}, 0x2000c841) 03:53:15 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x68, &(0x7f0000000000)=0x3, 0x4) 03:53:16 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, 0x0) 03:53:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f00000001c0), 0x4) 03:53:16 executing program 5: syz_io_uring_setup(0x3615, &(0x7f0000000b40), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) clone3(&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:53:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x1, &(0x7f00000002c0)=@raw=[@ldst={0x3}], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:53:16 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)={0x20, 0x9, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={0x0, 0x24c}}, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, 0x0) 03:53:16 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x29, 0x22, 0x0, 0x0) 03:53:16 executing program 4: syz_emit_vhci(&(0x7f0000000040)=@HCI_EVENT_PKT={0x4, @HCI_EV_INQUIRY_COMPLETE={{0x1, 0x1}}}, 0x4) 03:53:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, 0x1, 0x2, 0x401}, 0x14}}, 0x0) 03:53:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000100)=@fragment, 0x8) 03:53:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') sendfile(r1, r2, 0x0, 0x800000080004103) ioctl$KVM_CREATE_VM(r0, 0xc008ae05, 0x53605d) 03:53:16 executing program 0: r0 = io_uring_setup(0x68b3, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f0000000080)={0x0, 0x0, 0x0, [], [{}, {}]}, 0x2) 03:53:16 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000004500)=@nat={'nat\x00', 0x1b, 0x5, 0x4a8, 0x118, 0x310, 0xffffffff, 0x430, 0x0, 0x590, 0x590, 0xffffffff, 0x590, 0x590, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4, @ipv4=@multicast1, @gre_key}}}, {{@ipv6={@rand_addr=' \x01\x00', @rand_addr=' \x01\x00', [], [], 'dummy0\x00', 'veth1_macvtap\x00', {}, {}, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@loopback, @ipv4=@remote, @gre_key}}}, {{@ipv6={@dev, @mcast1, [], [], 'veth0_to_bond\x00', 'batadv_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@local, @ipv4, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@empty}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x508) 03:53:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x29, 0x10, 0x0, 0x0) 03:53:16 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x0) write$FUSE_POLL(r0, 0x0, 0x0) 03:53:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:19 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x0) setns(r0, 0x0) 03:53:19 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=@framed={{}, [@func]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0xb3, &(0x7f00000000c0)=""/179, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:53:19 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:53:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x30, 0x0, 0x0) 03:53:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') sendfile(r1, r2, 0x0, 0x800000080004103) ioctl$KVM_CREATE_VM(r0, 0xc008ae05, 0x53605d) 03:53:19 executing program 2: r0 = syz_open_dev$vim2m(&(0x7f00000008c0)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000900)={0x0, 0x1, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "46ed14db"}}) 03:53:19 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=@srh, 0x8) 03:53:19 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) inotify_rm_watch(r0, 0x0) 03:53:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000100)={'ip6tnl0\x00', 0x0}) 03:53:19 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 03:53:19 executing program 3: socketpair(0x22, 0x0, 0x80, &(0x7f0000000000)) 03:53:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x11}, 0x21) 03:53:22 executing program 2: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="b0", 0x1, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="24a14626b64b9edc727e70ff1fc752ecfb43a13c877eeae0f6d8a2cee9f83426f96e1be264d00be00b061db54b80f71474312e35d4c027884bb5119d72da864880292815ee38fc50e186ea1ea3c2fe5840d18af7eac8c0724d5a7baa0280bd90f3661e344b312d5a3ddcc47cc0228a1e6021d3e666d7f4632e414d28ef4714845e0f96d41bcae16ab90ca2c740f835aeea11764d59dde35e751da56dd61ceac1187cc2a83d369052c4574e51019164f353b6b5bd34ccbfb0a1b47eb9607a1f11", 0xc0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="b0", 0x1, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r0, r1, r2}, &(0x7f0000000200)=""/203, 0xcb, 0x0) 03:53:22 executing program 0: mq_notify(0xffffffffffffffff, &(0x7f0000004840)={0x0, 0x0, 0x2, @thr={0x0, 0x0}}) 03:53:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000002c0)={'ip6gre0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x700}}) 03:53:22 executing program 3: clone3(&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0xffffffffffffffff], 0x1}, 0x58) 03:53:22 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/adsp1\x00', 0x161001, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r0, 0xc0045004, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000040)) 03:53:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007840)={0x0, 0x0, &(0x7f00000077c0)=[{&(0x7f000000ce00)=ANY=[@ANYBLOB="942300003000010028bd7000fedbdf2508008a00", @ANYRES32, @ANYBLOB="4ed6dda23dce273004a364385d948aad77c8a64648ec198662cffcb3094453e847d7351b4fb1b0bb3f0850e9cf82d0456fd4aa9476ed4f653809dc1e3f860bebb5d68515279728495e5623a39cf4ca2b40a82b51e5df07f6502c45590fd209d2929eed70b3d94dd57d0e0ff2cefa86841309279413b7ff0e91f8e16b1bb30a4c1c56b23d534a373aff1610d014620b66c409b8b2009d3541bf2758f928f3a0e9ba72b814ef91a722d1f47c9a3298430b6961652bbc1ad911019976654f31fd8f80cfc13d86b1b9980ab7f78d4706b31a8f06c66b0a4b126d2d2373638767c2825dfaafc4f8a65b877fc00c94a18b90a0953df3e7af8b3cbe8445f14498f239ea93426a153f831413a5704e11a4b4062ff358108bf87345aaefd33023eb94c4a2f49136ae4a95d06d64a392771f78972dc9e0f5739d1c0915f7fb74538a0930c3280cb5217a9219bcc8226586250975795f4288373df70caf18aa629a21affd779639496c39cc0a70074b73ea17c672043a3920b2d8791469b53198253c093986d8097d66ff2add96e97427ef55067908009400", @ANYRES32, @ANYBLOB="c6007c800c007d0004000000000000000588418d4820a756d87310edabda681aa594b3e0a6081fa4aa26f6536a09f09934e55ebbdf0fa4559e34752103e011f31fe82422b568321b40942be0f84c4000c96a97c92a60c0c00325eae4a698822b9071cd1e4c743108003600", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB="d5fbe718b72d6ab93ce05b440dad350f12e95643c08253cfce08c9be7a4ceffc8d54ebeadcf1e0c9fe393701dd9510b4cdfcc559e29e0806fcd56f7f13a42c8c8ec632c8e681b212aabb74c8ed21a8000008007400", @ANYRES32, @ANYBLOB="4fefb0f0aa914efac1ac59ac3aaa01c9a3d0418683745388efb3b692819a9a2659cbf9057927fe778fa5cdb074f10b172de03bb53bc190114b2b25dc3c828aec9a104e123e4b2b0e0c8b220f85e2019a904c35545675f3879cc3f6f0c41d98a4d8802fd9acf57a22f3aea02083804728c6a847df555d7bd2ecf94cdf5808d297cdfd2260663591e16fe0093a5e406bf47eb64f17a37661777ae92abde4ca3dd2db2bda70c8b9632c828b4b183dd020a4d68c4ad5f6309d649e762e620dc4bed3c81cc56d495f87f8faf6c1faae8a8ce7c5d4dcd9b2e6d475b7c4cf1e3af6a41c1aa6ebd14f6a05de8e622a551e0fe99d1f202b1321274ff805b2b372e48c27426cbd676aac0d8fb27eb8a4e188d0ce573348856329a1a92ba639b9b5ad72c959018e4e5730a5f6892c784bf7c75b2769ff8280dbe51d0672e48fb0415fa2dcd0d023ad8f4028c36aaabcc059dc2504b0d4a40ecd02bc8df070fb1b9e5bc20ef400dbfb5850eb6053cdca974b715f7b663ca38577b217bed38e681fe594f39dbb39b453224770020f85cc9f55fefdb3f88e20672b51ff6a77402ac018deb4dea06aa0b92f2996954a9c9d9e92f0000ad1febc2327b1c882cec34bb5acd8fed4468fbb32e35822c10f32bcc2a29319011a60eb8f134fa092a97def62bdcdb0d058a39b0c3efba64caafa045a88b659cb9f03325d193c08a6e63ad36fd78a2e21d3f362e1ae67f0f558c2c32d00113fbe163efa12535488fe6f7c7df2dbe36566de0b00454abd0c40b232a20f2935c017f6e59055811f1627a89bd734c0bfb57cd0fed95a3af21118481e0b005351da9c95fd01ae08467893135a5bac6bea2a1fc55d2e504978038631c1b2819f13af4bfea8b76e7cf2eb11ba1ec7d0117370d60b0b0a54f969bd2eecb4c91e5ba72404e8e75e918fa5d25c9c20d3dedea1290cbf84b030ec0e5399fac3757f168ed23b7b6460917e4dc13b6ecbcb774b886a23fe80baa3e2dffd155ea5883852701f279beed79a8740d3f4ad087f9b1bab65b0cf17824cf549e181028a862ac1fd38a44f0ff2b2b0b45d1ec79324c23f52f42ca6cbdda325d29f34287186ebada8aad2f85f3d37d7de055594cef1253ac4cf13863304685cb2db80f8653d77a066704d2bb3e8d9f8319181f87702c14a1fd9dd319cd061a4eb24f5b50bc62c52d0a8539cf12aed7b62420a1dfbd27de5df791d0852646c5a15d52b11ccfe3d343bb882520ee2917aeb212f2d6b7b682f12dd084c8df70e9e22e9743e326abf986c9bd9d68d8ce53a176f30137b650b7dfe83f4d50b94edd1b8693c0658e12cbb03a5d9e064937d33a99c430af6df14dbd99cc73c575fb9e169ad1409396317e8aa04d160a1053155f99dd0a3c6c56dcc450ddb604f41f9e1f742e37979a8d49a185e5e3ff07fae9df4b359c22d4a9f0975dbd90fefc821dc474aa7ba6431b7b2405dc52b63ee0454ee556df7742632c3ac7df061b4912190f9a01487519193b953c6ea7372c218b8fc4585fee8c8fa445137c8f0c6bf26d59f7e3b7bfcd28a77a4ea79e064f9e99dad920a2f897a9db780f27b46fed2d9546b579acde029d28e259d905b0365b7c0e21444a88ebeda209aa1978e52532c4e862bd462d07ba49ef029d3eedce2782db549911015662a7f4de86cd8b0e7c7d84b2fb84f1e7cb85d589b18f1d7b99d344a4b7c9661054d17e5236a360eb4ddf5362fce05bd777e278b249a6ff3c5dcaccd7a6733d009748b58810fdd6af5fe9a132889856ce52115f04af6c2bfe0d19fb454df044c588775c3251ee3ef216bbdf08eae1c37ad612ddcb1573d6f80476e9d82b97386db7d3f1c635b46e507d1e45103b31380ac78a3e3d318df384e196163ed4d1d07edac3f1f049502f6beb7619a7e470f841389f77df586d7e27970db33bd45cfa0bf12dd6bd09144be071fbc3de1bb7cb67427466153eada8436aab85ac1ec69be0664975e3824c3606bc16a9c630caae5055f4190e7cd4a762c4b5ee008234c6491c6c477cd5b70be3e876452aafe9cd642b9fb27a0845d039e62291a564cb4219c6197d675a46b564314b309755d48959e3988d067767819a02fc817665c3a8026a79105937127660263fe9542b99a9d90a1e02632579c694f30150a433b05ea78622098e5200157adb18908f15a38e679138b1a9d0582776d54145a3499a4fc4b883acaa3eeae9c2862b01cb28bf2d69ec42743edc3fd4b175dcb8222a679d9ed78beb1be346721323010a44767c7c6dc87c59e7d448681a55cac15f340745a241cffd3560576a00455b725db78aa015771523a31fcf533c35c0e11abd92fa2e838d3c352b49e6ca5c6a4586e493dfa52bfb85d48ac96867823bdaf2161f573e04ab07859d8940a9c02eadc1b83201eef086aaff1aebf6aa8dc34f75dda871774f93aeda3e78330dcf3cd81b5232dddf42a863567d1a7d00e04f7c74d1eec076fbfd42a67f5c9cc45eeb6f4ecc82cb525c497bad8824d0adf3019472652cf01c80fefc9930a078330287b44c3935a81a3d6bbbbb0d7f8bbf4e1fcd58587bc3d3391f9ae85d3133754628b432839561c7b73135f6513e27478d4302b84e55cfb4a291da853ca2df349b270f30ba8135efa036909a781f347f2d1e465844bb4204d524aeabc6133a7ec624d3ac30f7722bc52f8b12b9374f7e773f339df4efe867e968eb69578e1fc04a7ad12c4be59dc1a8c1ca7db31eded85072a91a58c502ba692debcf34aa3553edabd3cf731e608fdd8c7a6ff31bb0e7a7735a821eb24e030cc743b40366cc689641915b2d990fc3eba5b8dd77e6cbada944d8f6d1ee234418c89bf5a2a31139178a05bd4f804f267b150bbf8b26cf517a4cfbe18382cbd7be93c651549418c914483c445c32912bac3378f4ef00da6e55942d29177b4f6e23aad315f1b2d3ccfa8ea7232ce1d5b77bc616124feedb4661c7af19f62ba7cc30c78a7d08d7ae4d8776a72e41e83ed9d2a504f00ef347d235fbcb42f10928cc11a9b4f29a8d8a1f97cdad5bfbc312d34d86de7ef3fd8a0fc01bd81d4680cc3aaf71c9c9fd9309d599890a6c5d1249d4aa5da7b7993c3f859d029d0b83e974755d83ddbdb4253201d96ac71f96d522cb26b305c0079cb48b1eaefb17c6c8c0a25fcac1dab76d2bf63329d1020ccec7b518307a63736692f229875c4eee27c7934127dae4276ea12807eecbbd8ab1935f4f9e9d16cf0b1a9364f28c2bcc96be43c172aa9938cbd08f80280eb4239561cc6e5982d13d4b3e968c53be09fcddb9d0cf5b0db77d121ea99b3daf8f6bf55a9216970140207ec3c40c66f38901fd58d1b4ce6c957edca33a31c1166b9cb18df405bc6512a1e975a15f1be91c4b4204bfc8cf3e35a087364a69fa48047899235627dd54b262263cd82f5515f5d7cfa64bf2d86f2bb03762c038844e5bb2a848736be5682af814ea97289c3148b22cd6fc6684e2d46a7860cabcac43578cc9d914abfe2e45cce8a45f202fb30bcad8da07efd55ecbe3421b8abff25b2c1f48e485d1eadd7b1206db933576c7c5e1f526a12df399c1e19326ed7d0aa3a8348be960651b958e02f637019ab10924828d6bfc7d3b6dd1c0f46ef83f48c1ff3a3d268bd03be2adb4f9b37802daba2d6661987e83a21d964809b3d4e81dbedba30c9195767828859e38bfc7ee6424816d9f39735aa28ca3f341a7eb4e021433194113c3e6b08df7cc3e3e1d772db299fe68994c87cc1dc9a6baa299e98b50454eec6db0f331c41d468ae59bee97135f8fc7f75700fae3567545e33756d67842e7bd87221208eabf0a8b7dd497d79e44876a74893ae6627102a652620dcfca8330f0f6b9917b84e1d7a25a96c677ff3460b585face50e0c8d356f84c1ccd8bbeceedbc178ebe5452b96d41eb96881f91bcdb7394079ba4cb1e1bec652c3fd314e83bc9d10ed5bb330e2128c3e00a163781a8f146f432c949b33508106c51c0aff9b55892bf730b757e757f8d973a5088b80aef86569216aa0ad0efe6a1d3ecb6ec2e26a0af0e1580fceafbed5c346cad036a9fe2cd515c4ff44f50c7b6ba21bf32f0ee8911f7c94bbf0de50cedda2de0d9d794e5468159c6c39ccdbe4575d1d62f5024f7a61aad5b14d5413efd97955d2308bd2d0c00f9313f652470d98e167f54ea6a0dee123b13c54909efae5a6f7a30308f3be08e9e699badc5afa5ae433b06155e8a45aff9045a7847a17de6dc15d535a0bf78dfb125690dfcb4810e8c77cd840badc8231342ef002f27a132c3537e6539aeeffdea149a2c3d8a6fe4e3c24a054eef796fc69cdff8b315016d889531cf283055f1aa25bb6eebd570235192f15acdad3512888632679428402f6d9b78c3bd48681e4eeec78a003f7ff2667fd19c90b161341d38b0d674256d69a9cebc02df44a448d0071423c868f7ffec9128ecdaf4fe52ef5f463b40fb88bfdea43c9efd5bb47fc98a402df62455afc9682e00636521392f1eb07714c098ff933847b7deb8a9b3a0f554c8aa394cac633859c4ae239524868769ff2d02d50e0f740e9e5db4b07ac62e556d2457f1c28d78cb540475ec6e766a97d9cb3ccd583831939f51e65653699fbf0d12212cde3c2af232f693f13ced07a05ea9db4ba45e0c3fc4db1ca8bb799898d24785fe1975ab00f5974ba7daace4a007f0d5520e297b3cce8e89c5ebe0c943325ab0e4cbf0b9862878c9bbdad381c80605b25d6f67b25887458bfe15db5bed3aa3a0f5cbde2c7924db3c06cc61085c097596b78f94134b5530985d060f3b44ad4b9055307e920a85e3ee2a6f7bde283cf7b8730e376e3a1a33df37c7ac92944e5bbd5d495fc8699531bcdecff5380fcfab9d5eb63881730d86ba0737d339ef906db6a475b67f667e687db6cf44add050b5f67da94966a2e9a76b84f1748ac6cac6d3cd06bd4274fd176fbc79c6853c4a7a02222fa3674050395af7462539f7558810a2af3e6791c89707f103ae7e75003c0fb8c22b5f23af5ff2a4ea7e2c6cd4cf73695223b2e699d2b93ee3df4ed192b1e5d06d93b5eb903177ca4644489265b79683a5393f809b48c429cee04b418ae3d8a7c0d1c5ff26e7f1996d004c9fb4ca86b0d9d7254664351dbf1168ca6c0c5244e3b92f5c91b2c3cb39e0d10b348993d58bab51de188a34aa0813a2ef2407b25d0dedd5b05132b639dfc485273d141267ebd4a128c907c768e1c05ddf0a28769bdcbad4d88c16dd99cb2daebcc20fff2b9fb5260a2e03cee7fe2460940063c5cb105e44728235b31cb686c668c1a8c9adf65a4a62537deea5ce6450cab617b64f839bbaf9e17248dbef85f406a3326edfa1eb97d167a3c55a942654d5a10c26211035d7861f607130bba1f903371f3988ac2bfa7513c1d2f5273b71e81b89e7a47168d63241445e8333f51234ac05eab3a86dd65f09f0062dd640a0dc126d9284eebbe6ccdee271af27836e9f4853ac10a6d3fbd3f8e5cae92e8664b0ab3990163b1ed616fa1170ddc928ba019ca392506e6964305228fe7ba5d6d57103256ef5d3b5169eac97040a85e8dce6118eb89718fe975bd8d9fc6214b3564d3d32c66fc7439709b01e93b58ecd1c3b09bdd96c67bae75dfd6752d4663c25fac637a6b6bb23c8615f5e9c1bfdfd5fb5314bf41b0b9ee04ef87623dd7c3264fea5b9613cbc2db8748c974d266d6af6e51901d50388e364148f132f279be4be03c64edfbd85ea7d0adefe6dcc92776044760ec2da96d6b54df487ee37fff04fc953fd15a731f592ad6ecb3d57f6abb648a2d25da4ab3ebb5b2f58a41afcfa7a4e7f26180cd35bc526bf335b0d63fb7aa831aa7e35242d23789565ea72a2d5f1e3af846354d2d2331f7358e87fc3aca2c1856abcf9685ec1ccb0ccdaafb198679b945e9962be021f5fc083a0c8c1ea2f77e6cabbe29b1ce4a729e56b2dc976241e6057fab49682c0cb95df250fe60207c977399e78dd6de52c42d6f79788476c02bd2587177900c1228cb537375a845a1d22520d01e0fb8408942fa0dc73bce3a90208d14f4181beaff3a1f1699202b8114d116d56818c43f03ee6bb4a010d8fadb1be6dcbe03b5cbcea454a918013c56a6f62bbe49b00c00540003000000000000004fa5f09e36c4fea4a429e1bf641e80dda4f164ee924a8fbe21dbe48d12bb467cb9e7b0ba342d9169696249bd93902e90d1f80dd4746e1565e0fab4584ce5b6d1f3e624e8103010f400ea4c3dd13918f1231d09461195fc6a1770972b631d5795faaae71d9c3899b8492b138157c720d160e3443cebd8c5da9fa1c43d5ab2f921df4961fa562eeeec2f57b80f9343bd9bc711699c769a20f4cd8639ab84a8ff34ff0e7789bae880f9e8e8d0c86fe02758ac1f0a02d281b7e20c4a7084ea6d4d917e890a867169010098f0c02f653ced6ec056ca5cbb9578e3113167b4567c7ba7c15833b1d33f9aab9d44940c83cbcac56d562192a41bd979500d723b4fecac35a5749c9f0f48d7873de66b33c8f7e356caad4947aa7bffc9fc0784f04d76c509b7ba475760c2b48411056940d473a77326265304997cab74e969664553d2628803f05137ab6022eae44ab518e27a0a911ca6d1da9b06bb51a4d091f124c39b99be58d95cb104caad41572841af7dc53be83d7c1fa7f29641e3768a31bb4f0d561f8d06763421664cd6d96cf156b15dc8b865357ec563fc98e849de31c9d92c54c7a7325e987ed42c80eb283029f054bd5eb0dcc1fb583f33d5804b12af7f359d5e2bcb536afe8e703ffe9b6ee40aeae5041771975c4fbcc52e076a38b3dcfc194119c841ecc8a8a1af65a5dd5d9c1d4ecde22851c18c7f24ed97525b4852055ae5fa6b15abbf06d9b370230c5c7b6ec106bb4a04b7d387da76a99b0c44a0f1be72b189084a6046ce6e50b19df189cd6b00e27890074aa0194222351f4a573045a6b4dbe77cd4f6f5c1d5cff75c74ac13491bb6d099603732a6a9c11cdee80c28a422095ba77289048ab3e0a3c931a2f738450bac2a584da8a07de43afdf5fa7f2298f7b04d385c00a32c341ec1e9e0df4e2c627ae5498747468a32b9d60c8250afdc4e45afd657fc833586af6be1ca4f71d1ed44f495e9ec9c18178b4e80854e6746ce78f99511885fe901a2dad0519680a368b72c2fd82e12043cf520de2bc92e6612c8c64a3cec1ce617fd7b7078c32aaab53edc0cbc7527e81029855cd11d5c446ce2394285680cbe60c13c6fabb179effd3d9762a2132424f40d79aa0cec4b1041bb6eb8d420cb36d80148320fb2153c0d459ec3435800d50408196d308fc433944cd0a2f53e5ed62eb9eb141c9e9cc7477f03564d470234111fe409aa5188e5bac51870e8741811dd8913c13fd7d5ee6ab4d6a63c850c0fa32e198e3a5ab27f9d6b6fdedc5fad09beb8aea46920a5759d902df9ad466a0a7187f02372e4cfa0640ddb08346c92fba31533e09d9ef780b7e94b6a28fbcd1426aa73067a89a84a2e9e48be422a43c45ac60914bb6d8ce365756b90d7f4ffe91abdf2e8267023861a9dd9937caf087ff592a67ea7e32f63e4d82bc2e32435fa18e1d6a8c43f6b5d094ebdb1383d604f193919d91930ce3905683b78765be857d00f41720c0add4543673b25d3e112bf92d917638f1104bca89d0b2a7e0228366f8bdd444b51cbdd7efa0d4664f2bda5b361a437bbfe71ed8556d94fc6e2d6b032760cf16e029807dcf23f0a2f01b726406e9a52cab00cd2e97299a04b5e1db41d212a057fb2895ff7b4151d74abd6bdad95b7e6fa3a3d2b10a5b510f71f81e3290810dee90fd4815d1a6523ee6e1c3902cefc9c37bbff8670fe6d123ada16531781fe400942c000db5e5cd46fb3afaeb8f0dc16feb3cfb3f758f79666e3a828ff57bc0393de068394b3adc7917b213307dca6d2c7759d860100e760dbc23a3a38cb9f28cf56c07da993af82bf665abcaa83c3a1f7361158a1fde3a69ed55577db67ba9f2880769cb2fffe4d01d545eafaaadf92088dad46fd6f971453e6e54eb5b3b7432dbd7716846fe847169be94034ebfc550876fb811b5b06cabb8cdbcece38bd76551842ded0bf995fb7d3a136726fe5b7a2e8f195447354e11d5425ab33ba18a73e15c14d8e572b6ec11795f6b565533ab895ef96a4957858757481dbc5c702e875be6ed277e047aa4f56f6af9c141d2d7c85d61b016170b26af1a22d59e6d7a6eebfa0ba4c896e558753ecf3dd2b423d18df312ab5b204995a7bc353dcd17e1771b0336c1e6736d3f514ec66e1adfb25233954a414c1ac5b0efc8593bbf8ff19b696150193dd081bcc6dbedd4f6cac3dc7c6d67766f5fed77e8d7b80671e8a3e2a9f813ff7eabb26d1e29aaf3ee47b760db464dc121d90d54200bf5fa7ec9206022c14c8e4d60213c45b65dbe05b325e275d215cefaf31cb6c4c9602210b93c09573d404cfd90d3f081cdbf407e812d7a6235248470b380fbaa02a7146b3e1f2c1802e34fd809928c32f13b8844b1ea7b842d26aeb9982a971e94d048193aa9f8b84726e91b1dcdd4b331a343c6affbde6e7abf42851300e8d25062825a8068c2f158cb20d416ba0b32218e39bf339a157fa928a2ce529bab4a5070a150731c2f0a13e28dfcacf7944303970e894b87852aedb4411d4772ef376f7166ff18ce534f7bab2be79e59bc92a358861b79537d5b61c86ff01f043f6e2c0d55f4dadb67f88c7b2d6c3c96d8b2d3b3371443588f1f9537897ee80220a790a9907fae80f541438f98fc0e521516334c73c4dbe597c9fb216c8cb36ddd6fe969ea6808401b5e7dacaef9e32f132c6094185e4ac8bf7a7cc7501b380ab155e93b75cc2883a581dbf0447455939e5008a241c2645e97f6fc72ba49595ed0ea97dc96b3c8e4c65305956d9d3e199455b2981f07de8b21586058ec9987c97692701e86cfae054d629c67bb3c2b0e8e12e5c78970b60a97520abd126622289f4d9cd4b9db49a78b7194820e25854ead2499bbd706941e958df38e2be582245eec50bfe38ea7c2e37c1805325597ec684e926942b8c1e096a0b13bc142e2c508d6c578f6e385e83f77670680f6e577896e3d69e01a28bc595b1b27c64da5c24e94e811805ef5ca639256672e0cec27637f7e0eb47021f0b48a9b84cbb3b1bf41dd7f6efbf3c6775f092a146f3d1e7024b94dce60b53bd4cc78c5f41bfee76b07ead47715f1022d72b78e6c460bdda528daf0ed19cd83895efbdf9d222d81b9c3aa45f3110af2d47169337ab01a7a9594974845e249d9bb5a9878c49060a9f4de5db5d4a8d843e7e26e98bd568d6d784b4451b09d17fd2877728710e87ecd26b880ba0a32b79fd2229a355a952bf8ae6b908915297bb5b53bb898334ba6402c6d4204e1d501a08cd6eca4dc9949a356e7808fa486937a86215e3b5a9a555670cec8b124b3d31194d1ef7bd20fd7fcfe072a54ff382a8d9b67e89009d4e39290b1d9eedeba532647c67d4d992463354a15422bf6aacbd68ae541569784657fcb5ec2f0d4fddd3e75403025b76c6a0d7e41e535f57a655733d2b0d18a048e414dde50c6a3b33b8093dd48f3e3504895b01deb9e1b8b5949914d17ef17eb2e0dfe4cb974915cc84e78da927b6899208fa6dff6e6b9c7fcf09a9e7c9a9007638857f58df122bdea99e509d84527ce739fcd114ef1ce32e390f3525f35f8c89e881ede247fc78cb59b92aa4372db954e126b76b1330bdca71627c91f0cff93ee8ac998f36d1fc8e2508c18314e05d079cfd4721fda23f9a39cd1e537359176110329e967af16743498b7f8cdc5f696c553d483b4904aa569eda8e6ecac9e4821f09c3b940f1eda71d2091cfc6aae2f5a324fb55b95b5e54e71cbc5ca0b798ea697942676020f75528eba070d5698ed1c41e819f12c339dbfbdc525f16be6fa5f2f0645176e2ce9005d86ab39c76280f9f5caac1bbaa6bddbf7e9eee870ba31061ae445060d1e6a8113ad33937f0d14c755616dcac839017ec8f2f36627471c5adfc1744f65e2bd8e745fa3b880f9dd15d3bd01435c51d7e9bf666dcfdc6126a5ee97a7f5b607cf351103aae0bb7bf4a633a0f9df019985004efa9e79e094f916f7d615ccb45416df7b97910c99cd0a0e841f50e1495f69a29dab149105de668a7eae3227e482fc3d9b7f407df49c1ed3994e6e3b283c3e615d003a7fdeae7553ec1c654dbec302354c00432c3731ca30d06c2cc4a9288a90370db1a53fb6547f769f91ba4d6ac785cb48a87a96a4b3220d8f14b61a9892efe8b0183257f0ee438d10b0cb15e016af449fb4a1d36bcef74d26309a06965766abb57f4b439c56138ab7a48aea64f9e423ce573c81952d7640202660fca7da311c08fe8a3af3629492b4345e9fb6164ff40933292d83a129c921a6ba34e04804c24700754295781e53b20dc7e71f9d687d9caf61b33cb9bc65fc834611416108d65e1b99f8a6aa0294806a6e605e61c379199d19e279c588bdd7dcfc867c41177a1a042b9c9130925689ad5213f74a0397a78369b8c451f6479fed23f617768d20edce7676cd2a96f26772ee02a4f1ca03f753ad5b63ec87cf62dd98499b7a186d151f501bcb20450a796f99e4721adb1c5f4f0fab00201443f8bf6bde371e5467b08fee0c1cb5c64bf6e6c3cc8ecd3ba7d17dde38fec6421810c55105bb59f4583b7c51301b9dbf9388ba3fa8d118397fb8a1e9e972f6886340133a40cfb37baff98862a6004bc50a76a6387071fa68fb13165513281fb47caca560922d75c4051a0a9f1027d2c0300e3904e71de0a59b6d70c7d7c38f7dd90fcdc86ea4fb95426c75101be432c4a0baf290647bc284b609f19a970d7dff74024b22a771dd2ac67c8fb450fec4955a321742df440ab5671dd2951579a7144f57ccf9a3ebe1096a05775fcadf7a309def85a32bb55c8790dbde89e26b636e47ec46748787a530c492713442548ae46dd53f81ec606ae5affe11a91d25d9a4546b5aa8f94e24b88630e044ee118aaeb2762093feda64a9c3b82e747a2af05f14aa220efffaf02a4bd2514c8cae52a25e7d5e841407f0a5f49b57b392fa5c7e2bb04d635823614f47216de1904de27d27f4fa50a508558eb458742f07692259442f2cb0c11361e31903556e56016bacc53d77cb40a8dcba63c9cbde0adf2f2ff660a84fab4e849c5b0ab8c4642de70a358d8ab83d68891f53a9a8f6b5496a82f4c71bff384ebcee8da4842c9e099200b3b850ead8bdb1c123f995ad4802288dc6f0fc4c332748cd0c6783152a9d880ac64d2fb40941546e9609672a8c749bd03d213596f48cbe22d5bc65c7208c7df7eea25aa6d2e94b2e4a61bc53be07dd38bc4ad1c60e3d77d50fb419be4a4db8202e01bd6ea03351bc50099a99193017c23eaf9a16bb65679597922ea53194b1e2c6878834a3e1c4f4119f8facb0693612152c15981f9e205dbb13fb637eb33f56e78b5a21e5630e8dae862108e1c0523665d760d887b35ccd3f4436703bcd2f7e402ae2f94f9e4f09b496e18e6d1c4383bd9a8e7d76aaad24f5e01afbf9a89eb2a8b0904120b387f4450ce4a2375ab65a5a48b7db87e0d43918dc1c4ef6f10e65099b0f9c7132a7a8019409a754adce1ebd5918f3184e81c6eb3e98b5c52ad2689c0005d36a13dce43a7d3f5ae8ba1b610a94159e58f4d6a6db0b29831ecf493c8b3fb19a12c711742cd7470cc4ae8bf20a39d50228a004119aca160d5282ad277ac38db10a18f2dee2d2593f37f161f787fafb615a913cbbb1c76955788360a5b1b452c5cc07fcf861661c1110950309df0d0c1fbc5922999692d3d1f13b5d93f744be02088a73c04bdccd0889485793c2422443700a1b84be8edb0f2a7c6f14ac867b5fb2ec5d20756db8b09b2c1c34287239e2e44fb89aec15e36e2cbfce92010c1ea2856740a1c04d93bdf64616ba72e623f8749202cf25a2ee74e029d7de4f44995cd3ed7f908002700", @ANYRES32, @ANYRESDEC], 0x2394}, {&(0x7f0000002940)={0x58, 0x1f, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@typed={0x14, 0x65, 0x0, 0x0, @ipv6=@mcast1}, @generic="ecc89423e03a72ee9e8cfa59f28b0f3d50666af3faa6b14bdcfea61381", @typed={0x12, 0x6e, 0x0, 0x0, @binary="852e5ff4675f773dcb00c2844a7a"}]}, 0x58}, {&(0x7f0000007880)={0x10, 0x25, 0x100, 0x70bd2d, 0x25dfdbfb}, 0x10}, {&(0x7f00000011c0)={0x1198, 0x27, 0x510, 0x70bd2a, 0x25dfdbfb, "", [@generic="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", @generic="40b155cbd1a61e8c4f356b0b8841df7a8f02434db0b8bf2abfbdddcd829840d90929b53cc7a9cdf8e9368ee57d7e", @nested={0x157, 0x50, 0x0, 0x1, [@generic="bf3622e41bb8ecc218ad7e024afd43d3ae3e2a67140761a40d0e99451fa5fb5285bbe3978737acde10000f0988dd45b57894c3b5f26471f21fc23b541e1890c60b49b58f25a2228515ef8fe951e4bfa9d8bd5e7858b7a69ec90834487b0236988af32c36db97d86f6bc61356d19654e842cc0e1e4f26e8ad8ca35301097b2583df6456f20adc8dfd7dc2dad5a9d691ef6e25285037d88ee3122de5d0a713dbe00c6bdc95b191388e32b37d3544db01396ee4aaead6fe784a74df956eba504ca1e91c3cd395bfad8ac0fa10cc4b33b8b2bd004db7a38558dc9bee", @generic="6734eab9c20d90652922101a6bca5b5965d24f80f924ff23b3ab42ad8477216ded4353f59ea0cf89c1ea9eb04799e298d87457e61500df042f65143543f1f72d688fe43dcb13322dd3a752e01645d7ce73dbdd9290d28dff522053a3d2745b0b6a2073236051fabff0d48befce6e2ddc49f5a3ed91ebfef09e"]}]}, 0x1198}, {&(0x7f0000004d00)=ANY=[@ANYBLOB="940200002700000327bd7000fbdbdf25ba05d82e68fa2d2fd540d132b76d8fa91e8f95ced7c8d0cb6c691515193103eeb85fbce94ef340777399d119e20b519a99aa94a82404836cfa3671d390eef03a57d2150079346eb35abc03501761bdd271697d41bc3e51901ad8526c72dbada66ecc59349bff509b87918afcd01d43868c2713caa556eecaa16572b64ae0f3dad168b1e2cf97fed85c861bf44820f78f9700bd9cc8774489b827c1b4f3ea2c0163800c008500170c00000000000008009600"/209, @ANYRES32, @ANYBLOB="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", @ANYRES32=0xee00, @ANYBLOB="0e006d00252d3a5d7b2b12282100000004006200080001003f00000040c57a7c607bf41e0f8ffdeee2a7afc616d31a2567af02ddf164b7c896294c3652475739c46537de451ec503b94ec2d9696791543791bd9ea350a59f0e645a43844706ee9acd74dfe5811275950376d26c4c9722330d6a6453f9c1c1abb63e9cf9a63e70a660d348a0343981c294680deddf5f119974bdc3cfeafda3ef3f64c23626b281e5b1a37f968682ec525908005f8004008600"], 0x294}, {&(0x7f0000004fc0)={0x3f4, 0x3e, 0x200, 0x70bd2d, 0x25dfdbfd, "", [@nested={0x124, 0x87, 0x0, 0x1, [@generic="c702fdb2a17ee7a1cfbeda5644c3ab88a8cb799e194be758ea5930936b72873733a017fbdc4da51913ef71f8ba41cc4cef7099003b1cbee23551ac70263e787020ebd7a474553b22f45b11a3677c525179f7c38a9b40810ec14719907d1a81810c892a0f177472ee37393f75dda93f72f03040f5cb8b357448e3cbbfa7b23e87bb8744aca0b7242c3dceb15841c5b2ff2a126b6943ebbf6a76db1db9de387e98eb31f0575708600dcef6955521373840b1e3520519dd3b3313c86724b77e800c6c694a66927869e63d745562bf55", @generic="04ccd21dd4a00f2e00855461adf64d06ce57cf040aa5807e32db63f42d00a093518e4238d21e276405d182c3ddd5635b034a15cc9377bee906f0085e5412", @typed={0x14, 0x29, 0x0, 0x0, @ipv6=@ipv4={[], [], @multicast1}}]}, @nested={0x1c, 0x12, 0x0, 0x1, [@typed={0xc, 0x7b, 0x0, 0x0, @u64=0x7}, @generic="5b91e85810cb02531cbfdf56"]}, @generic="7d6659fec5eaaef5e6a0e82ceccf5a4d98c78db2f2ebc08e89ce5667524f35e5a697", @nested={0x13c, 0x80, 0x0, 0x1, [@generic="86da61a495df022f2b0b51b0f0a85ec0deb7423c769e2ef473b78b3e52a57db336322a6ac8c13cb8a0963216a33a4054972456449ca47fb330c16ff1610648eeafb2f5d7e40288f2137d377fb75acf56bf84f360f1ee7bbffc96ee3b52890c7796cdbf3a4137c58d7ed4123d09d43ef5fbc1803fed3a08d9929873b36d5d91ecfc68ebc36f7e4f32327736e05e8bb85368758054fae1853668262a38680618c62345412f9c89cf6d118cfb9958551a479e9aabd30d5591f2c4200b85e743ee36c05135dd4e0586ad33cc4a47f03285998dbf1892edefdf04ae75e275b886304591ad3ae97f640c9f", @generic="c5a57b3f71b07ae3f564402ccb3ed31879e2fee9d2c4d66c1847aea61cf8b8d911c33617fd29522751142ee03d4be9ed86019d1884fe572763284e42a349aeda7f9a6448e4308884a3628b4bd7f821a4"]}, @nested={0x2b, 0x95, 0x0, 0x1, [@generic="a3b0a72aa17c2597ef25e60724f7537e49f17f62821a7708fd0cafe8369a1c7620c32c0904e24d"]}, @nested={0x115, 0x7c, 0x0, 0x1, [@typed={0x14, 0x87, 0x0, 0x0, @ipv6=@private0}, @typed={0x14, 0x11, 0x0, 0x0, @ipv6=@remote}, @generic="81edbd444818aed10c67adbd69d81bf9337f34695bed41b29c2999dea97cf595e8b1a2642596fc6aa189b7c3a6e263c0f2c82fdd47be7f52f4af4dc2b54977632373963705ac982633cb7ca98e8e99a3ce42b51eb077ac982adeb7fb8799ac18aadaa31cb882747c827431450d0c328eb6b8843a91d0eb7f6879c559762458bb3b7f62df31335a0ac843440d86ebf121d48ebd26132c523f957b68c650173f7d214b31147d369786aa724ac50f1af354c03d0d0e72c756257774c66c890200f993bbc50a53235ecff9e128c142f92e4a3a834d162a0ed3015f15d187b8198067b395ab8965419fab54"]}]}, 0x3f4}, {&(0x7f0000002380)={0x2ec, 0x12, 0x200, 0x70bd27, 0x25dfdbff, "", [@nested={0x4, 0x6b}, @nested={0x152, 0x72, 0x0, 0x1, [@typed={0xc6, 0x39, 0x0, 0x0, @binary="89296be560a73e44cf03702ace8073065ed49fb7f9fd9a9bac7e1fe9ac3919287bb28af3cb28af0de646e2627d8259f2b118e4762e781c888ec3a5ccce965d73a6c1c19b3d9d2ad5d58a408fdca7d8bd4278c92fffa46c2cb6b69dcc3da073def2a6d65e7d077b52548dc90ebfdfe6bbead2ec702179345d0132025c0095c23024c576f5b483844b684c22cfa476cf1380374dc46995aa31a8a9afea29e5be4a6580aa503385da37a2b592ddc4146e208099b46fb83aea36a3a2455aff4a4a64a7fa"}, @typed={0x8, 0x5a, 0x0, 0x0, @uid=0xffffffffffffffff}, @generic="31f0b58304ea58842729923ea2155f87584a1f1e6c18ff6f79a7144f0db8551de109c2e0040612aa63ecfc23358bda3ca5ebcd7079bcf6f5f26e05a7e2591356efb65fc9bb2d97b0dc19584b77ba6fdc99b576ae35f037de9d85697722993f2858c7c79039aae2080493", @typed={0x14, 0x3e, 0x0, 0x0, @ipv6=@remote}]}, @generic="a335818baf91f2f5385a0cfa7b0553f102dc024e2e13b2771af17fff1d4be41f1b308053621e253a00cee1c13e6678da939a0bd7c68fd23945fe64441b21acb48e7aa5743c04f52d4bafc184d339f6dc514e4d9e32cfabd6fb2944224db24255468625e734bcba15ef6bfc81df2b575a0f5b1ec5636d7ad634503dbbadb88d1f91f8ccc3ced948dc9a095a38a9e49b281d0f839969ab0513a7c59c0c0c1418f29ce5e71d3fcf8c316a66a5c72f57d4382f576a08751c0a5751024941d6febf02b409038f8ce41129676ce6fce6ba1e", @typed={0x8, 0x59, 0x0, 0x0, @fd}, @generic="4eeceefa3222df0b41a22c252b624558c56d20855e3603e148568362a1efcdff83882b61a069043b1a33fe6e105b98379f2391d7a6734279b7d02dcd658bfdb0db421a3ed642011067e11d27fd0a91178993479388d834ec20a06872d1150125b7df2096a661b8cad8e3eded0e91dcb362904592118217baa9c9ddf2233b542ddcef626b8ddcc4905cb432c65db7", @nested={0x1c, 0x8d, 0x0, 0x1, [@typed={0x8, 0x45, 0x0, 0x0, @uid=0xee00}, @typed={0x8, 0x70, 0x0, 0x0, @uid}, @typed={0x7, 0x53, 0x0, 0x0, @str='}\'\x00'}]}]}, 0x2ec}], 0x7, 0x0, 0x0, 0x20000000}, 0x4040000) 03:53:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x43, &(0x7f0000000100)=@fragment, 0x8) 03:53:22 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0xb9dbbdebf731621}, 0x20) [ 1106.607563][ T7980] netlink: 9088 bytes leftover after parsing attributes in process `syz-executor.2'. 03:53:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, 0x0, &(0x7f0000000040)) 03:53:22 executing program 0: ioctl$vim2m_VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000000)={0x0, 0x0, 0x0, "e321ffb31f8543efc2925c9a0bd9b492f205aea503702ad59a63f39ed747e320"}) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, r0) 03:53:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, &(0x7f0000000340)=""/230, 0x29, 0xe6, 0x1}, 0x20) 03:53:25 executing program 4: syz_io_uring_setup(0x51f3, &(0x7f0000000840)={0x0, 0x0, 0x4}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000600), &(0x7f00000006c0)) 03:53:25 executing program 5: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_CTX_GET_CPT_STATE(r0, 0x7b1, 0x0) 03:53:25 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0x4c01, 0x0) 03:53:25 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fb0\x00', 0x0, 0x0) 03:53:25 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_MIDI_INFO(r0, 0xc074510c, 0x0) 03:53:25 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x1a, &(0x7f0000000100)=@fragment, 0x8) 03:53:25 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x200, 0x0) 03:53:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='io\x00') sendfile(r1, r2, 0x0, 0x800000080004103) ioctl$KVM_CREATE_VM(r0, 0xc008ae05, 0x53605d) 03:53:25 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_CONTINUE(r0, 0x5404) 03:53:25 executing program 3: syz_io_uring_setup(0x1006d19, &(0x7f0000000b40), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000bc0), &(0x7f0000000c00)) 03:53:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="1e3a32b94f73d59aedec88cacd9f61d8bdbeb9a7d64b1f88b3669639622da4186c22251a7ead1e8b156918b6b19c216296c92d9639a49f5aecb4784d6d586f68a064615e7230ed2256021f1ee9048d4ad2028aeb968b54d559424ce1f9afedb2b22fb85b1dac477f83d3fe0ff3ac5a32a9b5ec082ee458639ffcac6333c6686148a7fbbd63d7414ee3a3d1faa2c9e7b907aef69f2b7a656646456d7cabd3dd26f027f61bd61f594825e3b51e9ed703b81e98611308317d3cae7e9a0000b8e7a615c33f07c32d44439c2d05373e8f692fb6bdb0a4abe5967aca71d09dec186a7c8108716d8b46c01487cf6bd4e96b11ce2312a700"/256, 0x100}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 03:53:28 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x19, &(0x7f00000001c0)=0x9, 0x4) 03:53:28 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000001600)='/dev/full\x00', 0x48040, 0x0) 03:53:28 executing program 2: 03:53:28 executing program 4: 03:53:28 executing program 3: 03:53:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0x0, 0x0, 0x0, 0xe, 0x2, [], "e400"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "017a"}]}}, &(0x7f0000000240)=""/183, 0x36, 0xb7, 0x1}, 0x20) 03:53:28 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0x0) 03:53:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x64, &(0x7f0000000000)=0x300, 0x4) 03:53:28 executing program 4: ioctl$CHAR_RAW_RESETZONE(0xffffffffffffffff, 0x40101283, 0x0) ioctl$CHAR_RAW_BSZGET(0xffffffffffffffff, 0x80081270, 0x0) getgroups(0x2, &(0x7f0000000080)=[0x0, 0xee01]) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000000c0)=0x7, 0x4) io_setup(0x8001, &(0x7f0000000140)) socket$kcm(0x29, 0x2, 0x0) prctl$PR_GET_DUMPABLE(0x3) syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1, 0x101000) r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x0, 0x18000) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f0000001840)={0x0, &(0x7f00000017c0)=[0x0, &(0x7f00000004c0), &(0x7f00000014c0), &(0x7f0000001540)="0ae138c456d1d84a2035ac6bd5a85f33d4c0090d10193fca0c161b9403eab017130103b9e4ddbce90a0fe52f6ad0ccbae7b688cd39798273f3a870882b9e10a27d62d992e46052af4abd3fce4438cd6249b5891b5c3b17861c516366d46c2877a1fd0099b5f22953b3121f47005935a0b2e3d46dd11dca9fb2005aeb23364222494cfaca9f70bfc7ce8d5e8e95639d454789cfd4fbc302ef66a328d36a67020b095276b6c94487607876929f816851978f3cb6d0361450251b1ccde8", &(0x7f0000001640)="6f88f17a7783ae95c8088702712d1cf3e45043311ef00245ec489678ed78a19ca2d16d2690ad2aa833f5275deeeefa4753161cf3e98f2dfa9f8051966407dce6524dd61d626fb417abb7eec479d9c9d1753d076e31d4c6b19aa2092babc7825074439bc50aa13fe5fe6abe4080f14f90754ab93e692ac06727277335f518338c054f62aa567f7b72e2f1cdf9c4a7edb390b8337ef643747de6a8e5e2c6320c2aed0cd607f2cf4447cdff36a6aa5680afc08a5ff4913a6d163978e5ae", &(0x7f0000001700)="323f28394368d54f89570970c3282f1d1eb1cc7c6a1ab5c3f364fe3ea49dc184b4f7827054b24dc8786b833953f751b15bf8baf36718b8cefeba2b2e354db2eb2d6de860ce1b9a5e97541046ea9b2ff7049f2d427c8f136998c90d6a9b439666f4538b216eb4e223a956a00039bf2dc864a6d0cd3ecb4915c4f0", &(0x7f0000001780)="76b275af87c713eea8e5db06e48f74c4bc64a73c269fb833b506c853d9c405"]}) ioctl$SOUND_MIXER_READ_CAPS(r0, 0x80044dfc, &(0x7f0000001880)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000001980)={0x0, 0x0}) pipe2$9p(0x0, 0x800) syz_usb_control_io$printer(0xffffffffffffffff, &(0x7f0000002500)={0x14, &(0x7f0000002440)={0x0, 0x0, 0x2, {0x2}}, &(0x7f00000024c0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x1004}}}, &(0x7f00000027c0)={0x34, &(0x7f0000002540)={0x20, 0x0, 0x10, "5c3afb07af8d1a514d7bd06e5690695a"}, &(0x7f0000002580)={0x0, 0xa, 0x1}, 0x0, 0x0, &(0x7f0000002740)={0x20, 0x1, 0x1, 0x81}, &(0x7f0000002780)={0x20, 0x0, 0x1, 0x1}}) 03:53:28 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time_for_children\x00') setns(r0, 0x0) 03:53:28 executing program 0: socketpair(0x18, 0x0, 0x3, &(0x7f0000000000)) [ 1113.552112][ T8052] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 1113.564051][ T8052] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 1113.572469][ T8052] CPU: 1 PID: 8052 Comm: syz-executor.4 Not tainted 5.10.0-rc3-next-20201116-syzkaller #0 [ 1113.582445][ T8052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1113.592589][ T8052] RIP: 0010:drm_atomic_set_crtc_for_connector+0x426/0x5f0 [ 1113.599682][ T8052] Code: 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e a6 00 00 00 48 b8 00 00 00 00 00 fc ff df 41 8b 4d 28 <80> 38 00 0f 85 83 01 00 00 48 8b 2c 25 00 00 00 00 48 b8 00 00 00 [ 1113.619792][ T8052] RSP: 0018:ffffc90001e37a80 EFLAGS: 00010246 [ 1113.625853][ T8052] RAX: dffffc0000000000 RBX: ffff888010f25100 RCX: 0000000000000022 [ 1113.633808][ T8052] RDX: 1ffff11028651a66 RSI: ffffffff84302d10 RDI: ffff88814328d330 [ 1113.641779][ T8052] RBP: 0000000000000000 R08: ffff888012a82120 R09: ffff88814328d343 [ 1113.649736][ T8052] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88802f196c00 [ 1113.657794][ T8052] R13: ffff88814328d308 R14: ffff888010f25108 R15: ffff8880221b0f00 [ 1113.665750][ T8052] FS: 0000000001d19940(0000) GS:ffff8880b9f00000(0000) knlGS:0000000000000000 [ 1113.674676][ T8052] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1113.681254][ T8052] CR2: 00007fd992920c10 CR3: 000000001915f000 CR4: 00000000001506e0 [ 1113.689213][ T8052] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1113.697201][ T8052] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1113.705164][ T8052] Call Trace: [ 1113.708489][ T8052] __drm_atomic_helper_set_config+0x72a/0xe80 [ 1113.714655][ T8052] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1113.720189][ T8052] ? drm_atomic_nonblocking_commit+0x120/0x120 [ 1113.726356][ T8052] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1113.732241][ T8052] drm_client_modeset_commit_atomic+0x527/0x7c0 [ 1113.738475][ T8052] ? kmalloc_array.constprop.0+0x20/0x20 [ 1113.744146][ T8052] ? lockdep_hardirqs_on+0x79/0x100 [ 1113.749419][ T8052] ? drm_fb_helper_lastclose+0x170/0x170 [ 1113.760513][ T8052] drm_client_modeset_commit_locked+0x145/0x580 [ 1113.766742][ T8052] ? drm_fb_helper_lastclose+0x170/0x170 [ 1113.772368][ T8052] drm_client_modeset_commit+0x4d/0x80 [ 1113.777821][ T8052] drm_fbdev_client_restore+0xe3/0x1a0 [ 1113.783259][ T8052] drm_client_dev_restore+0x17f/0x270 [ 1113.788621][ T8052] ? __drm_dbg+0xa8/0x150 [ 1113.792929][ T8052] drm_release+0x441/0x530 [ 1113.797394][ T8052] __fput+0x283/0x920 [ 1113.801356][ T8052] ? drm_release_noglobal+0x180/0x180 [ 1113.806740][ T8052] task_work_run+0xdd/0x190 [ 1113.811254][ T8052] exit_to_user_mode_prepare+0x1f0/0x200 [ 1113.816884][ T8052] syscall_exit_to_user_mode+0x38/0x260 [ 1113.822467][ T8052] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1113.828345][ T8052] RIP: 0033:0x417811 [ 1113.832232][ T8052] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a4 1a 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1113.851846][ T8052] RSP: 002b:00007ffcbbed6b30 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1113.860233][ T8052] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000417811 [ 1113.868183][ T8052] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 0000000000000004 [ 1113.876162][ T8052] RBP: 0000000000000000 R08: 00000000000001f4 R09: 00000000000001f4 [ 1113.884111][ T8052] R10: 00007ffcbbed6c10 R11: 0000000000000293 R12: ffffffffffffffff [ 1113.892068][ T8052] R13: 000000000010fde1 R14: 00000000000003e8 R15: 000000000118bfd4 [ 1113.900030][ T8052] Modules linked in: [ 1113.905748][ T8052] ---[ end trace c491bd4eb143449d ]--- [ 1113.914483][ T8052] RIP: 0010:drm_atomic_set_crtc_for_connector+0x426/0x5f0 [ 1113.922550][ T8052] Code: 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e a6 00 00 00 48 b8 00 00 00 00 00 fc ff df 41 8b 4d 28 <80> 38 00 0f 85 83 01 00 00 48 8b 2c 25 00 00 00 00 48 b8 00 00 00 [ 1113.946259][ T8052] RSP: 0018:ffffc90001e37a80 EFLAGS: 00010246 [ 1113.953378][ T8052] RAX: dffffc0000000000 RBX: ffff888010f25100 RCX: 0000000000000022 [ 1113.961951][ T8052] RDX: 1ffff11028651a66 RSI: ffffffff84302d10 RDI: ffff88814328d330 [ 1113.970741][ T8052] RBP: 0000000000000000 R08: ffff888012a82120 R09: ffff88814328d343 [ 1113.978778][ T8052] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88802f196c00 [ 1113.988168][ T8052] R13: ffff88814328d308 R14: ffff888010f25108 R15: ffff8880221b0f00 [ 1113.996619][ T8052] FS: 0000000001d19940(0000) GS:ffff8880b9e00000(0000) knlGS:0000000000000000 [ 1114.005866][ T8052] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1114.012612][ T8052] CR2: 00007fafa0042018 CR3: 000000001915f000 CR4: 00000000001506f0 [ 1114.020727][ T8052] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1114.028710][ T8052] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1114.036758][ T8052] Kernel panic - not syncing: Fatal exception [ 1114.043467][ T8052] Kernel Offset: disabled [ 1114.047778][ T8052] Rebooting in 86400 seconds..