0cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:56:58 executing program 3: open$dir(&(0x7f0000000180)='./file0\x00', 0xc3, 0x0) 00:56:58 executing program 0: stat(&(0x7f0000002740)='./file0\x00', 0x0) 00:56:58 executing program 5: open$dir(&(0x7f0000000180)='./file0\x00', 0xc3, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 00:56:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00001f000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:56:58 executing program 2: open$dir(&(0x7f0000000180)='./file0\x00', 0xc3, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) 00:56:58 executing program 3: clock_gettime(0x0, &(0x7f0000006b00)) 00:56:58 executing program 4: setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) 00:56:58 executing program 0: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8, 0x1) 00:56:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000020000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:56:58 executing program 2: open$dir(&(0x7f0000000180)='./file0\x00', 0xc3, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x1) 00:56:58 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000002, 0x0) 00:56:58 executing program 4: semget$private(0x0, 0x2, 0x1) 00:56:58 executing program 0: timer_create(0x0, &(0x7f0000000080), 0x0) 00:56:58 executing program 3: readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/222, 0xde) 00:56:58 executing program 5: pselect6(0x40, &(0x7f0000000040)={0x75b0}, 0x0, 0x0, 0x0, 0x0) 00:56:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f001020000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:56:58 executing program 4: r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0xc3, 0x0) r1 = open$dir(&(0x7f0000006b80)='./file0\x00', 0x0, 0x0) linkat(r1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x0) 00:56:58 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80, 0x0) 00:56:58 executing program 2: r0 = msgget(0x2, 0x0) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/104) 00:56:58 executing program 5: open$dir(&(0x7f0000000180)='./file0\x00', 0xc3, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) 00:56:58 executing program 4: syz_clone(0x50040200, 0x0, 0x0, 0x0, 0x0, 0x0) 00:56:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000022000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:56:58 executing program 0: open$dir(&(0x7f0000000180)='./file0\x00', 0xc3, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10003, 0x0) 00:56:58 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x4200, 0x0) 00:56:58 executing program 5: r0 = semget$private(0x0, 0x2, 0x0) semtimedop(r0, &(0x7f0000001240)=[{}], 0x1, 0x0) 00:56:58 executing program 2: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x5f) 00:56:58 executing program 4: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000009d40), 0x1, 0x0) 00:56:58 executing program 3: pipe2$9p(&(0x7f00000000c0), 0x800) 00:56:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000025000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:56:58 executing program 5: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, 0x0) 00:56:58 executing program 2: pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_ROPEN(r0, 0x0, 0x0) 00:56:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000026000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:56:58 executing program 0: r0 = socket$inet6(0x18, 0x8003, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1002, 0x0, 0x0) 00:56:58 executing program 4: mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 00:56:58 executing program 2: open$dir(&(0x7f0000000180)='./file0\x00', 0x4a043, 0x160) 00:56:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000005000)) 00:56:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001400)={0x0, 0x0, 0x0}, 0x0) 00:56:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000032000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:56:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000001200)=[{}, {}, {r0, 0x20}, {r1}, {}], 0x5, 0x20) 00:56:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x1}, 0x8) 00:56:58 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, 0x0, 0x0) 00:56:58 executing program 3: recvmsg(0xffffffffffffff9c, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000780)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 00:56:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000138000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:56:58 executing program 0: socketpair(0x1, 0x3, 0x3, 0x0) 00:56:58 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x1, 0x0) 00:56:58 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff}) timerfd_gettime(r0, 0x0) 00:56:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00003e000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:56:58 executing program 3: mknod(&(0x7f0000000040)='./file0\x00', 0x8000, 0x0) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 00:56:59 executing program 5: setitimer(0x0, &(0x7f0000000080)={{}, {0x200000000000000}}, 0x0) 00:56:59 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000000280)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x1}, 0x8, 0x0, 0x0, &(0x7f0000000200)=[@rights], 0x10}, 0x3) 00:56:59 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) 00:56:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00003f000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:56:59 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000001080), 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000001100)=""/4096) 00:56:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) shutdown(r0, 0x0) 00:56:59 executing program 4: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 00:56:59 executing program 2: getitimer(0x0, &(0x7f0000000100)) 00:56:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000040000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:56:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0x0) 00:56:59 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, 0x0, 0x0) 00:56:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x0) 00:56:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000046000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:56:59 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) readlinkat(r0, &(0x7f0000001080)='./file0\x00', 0x0, 0x0) 00:56:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:56:59 executing program 3: msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3) 00:56:59 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001640)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa, 0x0}, 0x0) 00:56:59 executing program 5: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0xe6f496f4d0d321d0, 0xffffffffffffffff, 0x0) 00:56:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000001280)=@abs={0x0, 0x0, 0x3}, 0x8) 00:56:59 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) poll(&(0x7f0000000040)=[{r0, 0xac9b64bc190eaf78}], 0x1, 0x0) 00:56:59 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r0, 0x80047462) 00:56:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) 00:56:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000048000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:56:59 executing program 4: setrlimit(0x0, &(0x7f0000000040)={0x2}) 00:56:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00004c000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:56:59 executing program 3: mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3d0e5e1cb927c21d, 0x10, 0xffffffffffffffff, 0x0) 00:57:00 executing program 0: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x2) 00:57:00 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0xbc9, 0x0) 00:57:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockname$unix(r0, 0x0, &(0x7f0000001080)) 00:57:00 executing program 5: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000040)=""/86, 0x56) 00:57:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000051000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:00 executing program 3: shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) 00:57:00 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) preadv(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x0, 0x0) 00:57:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000055000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:00 executing program 5: getsockname$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000200)) getitimer(0x1, &(0x7f0000000240)) 00:57:00 executing program 2: read(0xffffffffffffffff, &(0x7f00000004c0)=""/208, 0xfffffffffffffcc7) 00:57:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000000)="968373f5d10c616aed7f66469bda1985aaf0a2bf928d67274506a26d8dfa58f8880c49f81361a1b4af6c84821fd7afe6e4a8f0b095e5b18955443e2a656027470f27e6f6cd3d2a7567e0cc26d5c68dc2696abcc8ca6d500fd522e9ef76741d1f96c20dc0c1b4a2b34c4aa9de34a35837a92c208b6aaa019715bf6a9df567978fca88e77640bc2d13f07556611affe354fb", 0x91, 0x0, &(0x7f0000000100)=@in={0x2, 0x2}, 0xc) 00:57:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000060000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:00 executing program 0: open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) utimes(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 00:57:00 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x301, 0x0) 00:57:00 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 00:57:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) 00:57:00 executing program 5: syz_emit_ethernet(0x4f, &(0x7f0000001140)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 00:57:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000068000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:00 executing program 2: munmap(&(0x7f0000400000/0xc00000)=nil, 0xc00000) madvise(&(0x7f000098c000/0x2000)=nil, 0x2000, 0x0) 00:57:00 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000080), 0x4, 0x0, 0x0) 00:57:00 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8280, 0x0) fsync(r0) 00:57:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00026a000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:00 executing program 4: open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 00:57:00 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 00:57:00 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000001140)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 00:57:00 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000700), 0x10, 0x0) 00:57:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00006c000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:00 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x3}, 0x8) 00:57:00 executing program 2: getitimer(0x88a717791d88b0c6, 0x0) 00:57:00 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) preadv(r0, &(0x7f0000000440)=[{0x0}], 0x1, 0x0, 0x0) 00:57:00 executing program 5: semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x13, 0x0) 00:57:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 00:57:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000074000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:00 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 00:57:00 executing program 5: setitimer(0x0, &(0x7f0000000080)={{}, {0xc600000000000000}}, 0x0) 00:57:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000379000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:00 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8280, 0x0) fcntl$lock(r0, 0x7, 0x0) 00:57:00 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000000280)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x1}, 0x8, 0x0, 0x0, &(0x7f0000000200)}, 0x0) 00:57:00 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, 0x0) 00:57:00 executing program 2: mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x1810, 0xffffffffffffffff, 0x0) 00:57:00 executing program 0: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xfffffffffffffc00}) 00:57:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00007a000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:00 executing program 3: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') readlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/190, 0xbe) 00:57:00 executing program 4: getgroups(0x7, &(0x7f0000000280)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0]) 00:57:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x100, 0x0, 0x0) 00:57:00 executing program 2: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000240)={{0x0, 0xffffffffffffffff}, {0x0, 0xffffffffffffff9a}}, 0x0) 00:57:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000084000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:00 executing program 0: select(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x0, 0x7}) 00:57:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001080)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 00:57:00 executing program 2: clock_getres(0x0, &(0x7f0000000040)) clock_gettime(0x3, &(0x7f0000000200)) 00:57:00 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000001140)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 00:57:00 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8280, 0x0) readv(r0, &(0x7f0000000240)=[{0x0}], 0x1) 00:57:00 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0xc527bbfe4e4b3271, 0x0) 00:57:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000090000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:00 executing program 3: select(0x40, &(0x7f0000000040)={0x1}, &(0x7f0000000080)={0x2}, &(0x7f00000000c0)={0x7}, 0x0) 00:57:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x100, &(0x7f00000001c0)=0x1, 0x4) 00:57:00 executing program 4: semget(0x3, 0x2, 0x254) 00:57:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000194000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:00 executing program 5: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000040)={0x0, 0x8}, 0x10) 00:57:00 executing program 0: syz_emit_ethernet(0x7bf, &(0x7f00000002c0)={@local, @empty, @val, {@ipv6}}, 0x0) 00:57:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0xc) 00:57:00 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0xd, &(0x7f00000000c0)=@in={0x2, 0x3}, 0xc) 00:57:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000394000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:01 executing program 0: shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmdt(0x0) 00:57:01 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x8280, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 00:57:01 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) setsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) 00:57:01 executing program 2: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 00:57:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000b1000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:01 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) pwritev(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 00:57:01 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 00:57:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000044c0)={0x0, 0x0, &(0x7f00000043c0)=[{&(0x7f0000001180)="f807e30a359668fadb84d5b37e8cf0e0b8c2eda78d67f7353cd452bc14e1eba2b751c4119845b8179b529e9b0b97d1cb895a1c4e4b64c54eaa28b551c28316aa639a1d6f6ccc747b2e61ceb9876482cf82b0bec481fe09598432996d6c0007222405c2add11eacbdfe19903600781e2c87eb80067bfbf75f14b54a3284042b05d77f023a62e153d8fe2f7ad88316cd589cead83700090c8f2ac35ef25e94eb87cea00148875a7629bbc2cfe9d382ce9197f911f634c604c0fdad79ca019b4a7dcbc98f5d2de0f2543c64cba88d30dec0189f58a8eb122dda4edde3354e7be306858a80292f21048a1e82e464e9acae0da4e4b795d53447", 0xf7}, {&(0x7f0000001280)="633cb79bb96868d57da5abeb536140", 0xf}, {&(0x7f00000012c0)="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", 0x67e}], 0x3}, 0x0) 00:57:01 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x8280, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 00:57:01 executing program 4: mknod(&(0x7f0000000040)='./file1\x00', 0x8100, 0x0) 00:57:01 executing program 5: r0 = socket$inet6(0x18, 0x3, 0x0) getsockname(r0, 0x0, 0x0) 00:57:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003b1000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000000)="968373f5d10c616aed7f66469bda1985aaf0a2bf", 0x14, 0x0, 0x0, 0x0) 00:57:01 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 00:57:01 executing program 0: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x7}, &(0x7f0000000080)={0x4}, &(0x7f00000000c0)) 00:57:01 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffffffffffa, 0xffffffffffffffff}) 00:57:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003bc000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f00000002c0)=[{r0, 0x8}], 0x1, 0x0) 00:57:01 executing program 3: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0) 00:57:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fcntl$getflags(r0, 0x3) 00:57:01 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0x0) 00:57:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f0000000080)) 00:57:01 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000001140)={@broadcast, @empty, @val, {@ipv4}}, 0x0) 00:57:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0001be000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:01 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) pwritev(r0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000080)='k', 0x1}], 0x2, 0x0, 0x0) 00:57:01 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x8000, 0x0) open$dir(&(0x7f0000000480)='./file0\x00', 0x200, 0x0) 00:57:01 executing program 0: symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00') openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 00:57:01 executing program 5: select(0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)={0x0, 0x7}) 00:57:01 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8280, 0x0) poll(&(0x7f0000000080)=[{r0, 0x64}], 0x1, 0x0) 00:57:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003c1000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:01 executing program 3: r0 = getpgrp(0x0) setpgid(0x0, r0) 00:57:01 executing program 4: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0xffffffffffffffff}}, 0x0) 00:57:01 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x0) 00:57:01 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) bind(r0, &(0x7f0000000140)=@un=@abs={0x0, 0x0, 0x1}, 0x8) 00:57:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000005c0)='./file0\x00', 0x0) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 00:57:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0003d0000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:01 executing program 0: shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 00:57:01 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x8280, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) 00:57:01 executing program 4: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0xffffffffffffffa9}) 00:57:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0002e4000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) flock(r0, 0xa) 00:57:02 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000140)={@random="07a2d7ab8366", @broadcast, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @empty, @random="455932204bd6", @loopback}}}}, 0x0) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0002e5000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 0: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2401, 0x0) 00:57:02 executing program 2: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2401, 0x80ffff) 00:57:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x408fc, 0x0, 0x0, 0x9, 0x0, 0x800000, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0xfd, 0x3e, 0xf3, 0x9, 0x0, 0x65, 0x8c290, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000002c0)}, 0xe815f3bb4d28a8ee, 0x100000000, 0x3b10, 0x4, 0x1, 0x5, 0x1, 0x0, 0x8fb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0xb, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0}, 0x683c, 0x1, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x47, 0x5, 0x20, 0x1f, 0x0, 0xffffffffffffc670, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x7, 0x40}, 0x500, 0x7, 0x5, 0x0, 0x80, 0x3, 0x1ff, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x4, 0x3f, 0x40, 0x4, 0x0, 0x9, 0x20, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x44, 0xf9ae8997b66b5fbe, @perf_bp={&(0x7f0000000200), 0xf}, 0x9170532b60279501, 0x84d8, 0x0, 0x0, 0x40000009d, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0xf, r0, 0x1) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'geneve0\x00', 0x1}) ioctl$TUNSETOFFLOAD(r1, 0x400454c9, 0x13) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000240)={'ip6gretap0\x00', 0xe00}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) sendmsg$inet(r3, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000400)="a6cdcb1a603e408dc83d26351fa86c131378c847581f1c5dd1d2a2d400b83e7298981af97108b7fcc7e63607c81c3dc704ecf377faec8b000683f16bed6725b6d1429778e42e016cc4137ba516fb5e056cfcac1d2bcac040f1ada1f4645c079a952cf455f2585f4e4c1253026ee954a1cc8a5887c36ed79bd4fed862326033f9d9bd2fce23288723fe08a2c43b422c8222b030c0c422b7fd6cef9592c0a9885d8197d272409967c0bae4ab109b5326", 0xaf}, {&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000000600)="497e7d8615d230e7c1642e645a37be413a6f46028be2b30d5f65d1fd2b35ca35e06717f999c56c9dc91d3baf3823578dc48a93b1f0719072e32d612986af0475531cb324453615a1aa9b68d8c1a2498663c155f32b59f4bb524fc54dcfc7ec123ee753c538312214225a4f7be89ee347802fcff5b4e18adf8c2553ce84e166ce371ad3a134eaca2547bccf2c6a965d4529e391ec", 0x94}], 0x3, &(0x7f0000001f00)=ANY=[@ANYBLOB="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"], 0x90}, 0x20004810) socketpair(0x9, 0x800, 0x4800, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, &(0x7f0000000080)) 00:57:02 executing program 4: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x80ffff) 00:57:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x4ea00) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x80, 0x1, 0x0, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x1, 0x101}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x66c2, 0x3, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, r4, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={@cgroup, r4}, 0x14) write$cgroup_int(0xffffffffffffffff, &(0x7f00000006c0)=0x6, 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x58, &(0x7f0000000980)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r4, 0x0, 0xfffffffe}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x0, 0x0}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000480)={0x7f, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x2, 0x0, 0x0, 0x637, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0xc, r5, 0x8, &(0x7f0000000400)={0x2}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0x5, 0x1f, 0x1000}, 0x10, r6, r3}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x443000025) write$cgroup_subtree(r0, &(0x7f0000000540)={[{0x2b, 'pids'}]}, 0x6) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0002e6000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e142b08004de7f9c764362ae28e0207002000000703a08b7989080594e5d04e0d4418e0f1b474b67b2b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0002e7000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00c0ed000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 0: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2401, 0x80ffff) 00:57:02 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2403, 0x0) 00:57:02 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e142b08004de7f9c764362ae28e0207002000000703a08b7989080594e5d04e0d440405f1b474b67b2b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 00:57:02 executing program 3: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2401, 0x0) syz_clone(0x8040000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:02 executing program 0: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x80ffff) 00:57:02 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000001bc0)={0x0, 0x0, 0x0}, 0x0) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0001f4000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0x46d5c5d063bc4c4, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x184, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x7c25512, 0x7fffffffffffffff}, 0x40, 0x0, 0x0, 0x3, 0x0, 0x0, 0x101}, 0x0, 0xbfffffffffffffff, r0, 0x9) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1b, 0x9, 0xffffff5b, 0x5, 0x200, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000340), 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={0xffffffffffffffff, 0x1, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x11, 0x0, &(0x7f00000001c0)="b0ff04c66b0600000000000000ca1f74ff", 0x0, 0x9, 0xe8030000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffdffff}, 0x48) r2 = perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x12, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_config_ext={0x8007fffffff, 0x2cf}, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x4}, 0x0, 0x400000000000, 0xffffffffffffffff, 0x8) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) close(r1) close(0xffffffffffffffff) 00:57:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred, @cred, @cred, @cred, @rights, @rights, @rights, @cred], 0xe8}, 0x0) 00:57:02 executing program 5: openat(0xffffffffffffffff, 0x0, 0x20083, 0x0) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0002f9000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 3: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x80ffff) 00:57:02 executing program 4: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2403, 0x80ffff) 00:57:02 executing program 0: syz_clone(0x0, 0x0, 0xfffffffffffffcac, &(0x7f0000000100), &(0x7f0000000140), 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000000)=ANY=[], &(0x7f0000000600)=""/170, 0x42, 0xaa, 0x1}, 0x20) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffe000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000140)="f0fa67d56cc7b9fe3fd6cdbef3ea761b407b1e1db9fb5fc5363c7062e7fab3c6f6404c374c25ca80b1fff8dfb816ce51925c5391ba88aaedd58e22dae754201c6806ce0424ac052854419e58222020401901c626da645ee63b5b83f6c78e1e7c4860dcd3c9d15abf2c9634b3b52920c14f4c6b050f78ee0363324b29ce4eaadb21097e8046ca1815321971774e3f4e83a2dfd2ae3c51402ab3fa2bdd2f2408fd182eb6d28911d51c80ec61b43225824b5cf7aa2d7011e7a71f01f9b046586d1628ddd3447eae01f95cb3cf5b59fd7e914fb94cbc8a9810fb6fad72c2", 0xdc}, {&(0x7f0000000080)="c2683a73f5d7ed60489c0da4069eda7a5f4031a4b2ca3c8e718bbc441412d6b8b146380fa3167a2d190444921047cb96bde4a50020fb26ed517687756fe45ae0", 0x40}, {&(0x7f0000000240)="c521aaca5a98223332884c4284823eec24b6f0324a6aee76ff9677bd922742768e78eb4c5770bd97590cd2da71a17f50b01df8b2e4f2a46788b18d33d6f2913c88b9cb967d0e068d2119ce0f8f90d680f491c47580b8b2b727f82d48f81db123354f36b4cdf66a66862146b4c68aadeb8c1aa7764ba4b29050b0fede581fd90c3ef6712d3e103fdb03c04f5d3ed92f46bf53fd844586767ae7015b6f0f5294b68de3ba68a47e9b0d9da5d5113be026ae", 0xb0}, {&(0x7f0000000300)="0150048af9a12c98eff87ffee334c86e6009ae19d0943d1cb680614a3d2315b748e780e9cbe64f8581302b1dd0", 0x2d}, {&(0x7f0000000340)="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", 0x648}], 0x5}, 0x0) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000fff000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 2: r0 = socket$inet6(0x18, 0x2, 0x0) setsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 00:57:02 executing program 3: sendmsg(0xffffffffffffff9c, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 00:57:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) 00:57:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r0, &(0x7f0000000140)=@un=@abs={0x0, 0x0, 0x3}, 0x8) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00feff000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 3: utimes(0x0, &(0x7f0000000040)={{0x0, 0x40000000}}) 00:57:02 executing program 2: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 00:57:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000008c0)={&(0x7f0000000180)=@in={0x2, 0x1}, 0xc, &(0x7f0000000680)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000000740)=[{0x10, 0x1}], 0x10}, 0x0) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000020000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 5: r0 = socket$inet6(0x18, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x1, &(0x7f0000000380)=@in={0x2, 0x1}, 0xc) 00:57:02 executing program 2: open(&(0x7f0000000340)='./file0\x00', 0x200, 0x0) r0 = geteuid() r1 = getgid() chown(&(0x7f0000000040)='./file0\x00', r0, r1) chmod(&(0x7f0000000000)='./file0\x00', 0x0) 00:57:02 executing program 0: syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@remote, @remote, @val, {@ipv4}}, 0x0) 00:57:02 executing program 3: mlock(&(0x7f0000ff9000/0x6000)=nil, 0x6000) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x5) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffff030000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 0: readlinkat(0xffffffffffffffff, &(0x7f0000001c40)='./file0\x00', 0x0, 0x0) 00:57:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000140)="f0fa67d56cc7b9fe3fd6cdbef3ea761b407b1e1db9fb5fc5363c7062e7fab3c6f6404c374c25ca80b1fff8dfb816ce51925c5391ba88aaedd58e22dae754201c6806ce0424ac052854419e58222020401901c626da645ee63b5b83f6c78e1e7c4860dcd3c9d15abf2c9634b3b52920c14f4c6b050f78ee0363324b29ce4eaadb21097e8046ca1815321971774e3f4e83a2dfd2ae3c51402ab3fa2bdd2f2408fd182eb6d28911d51c80ec61b43225824b5cf7aa2d7011e7a71f01f9b046586d1628ddd3447eae01f95cb3cf5b59fd7e914fb94cbc8a9810fb6fad72c2", 0xdc}, {&(0x7f0000000080)="c2683a73f5d7ed60489c0da4069eda7a5f4031a4b2ca3c8e718bbc441412d6b8b146380fa3167a2d190444921047cb96bde4a50020fb26ed517687756fe45ae0", 0x40}, {&(0x7f0000000240)="c521aaca5a98223332884c4284823eec24b6f0324a6aee76ff9677bd922742768e78eb4c5770bd97590cd2da71a17f50b01df8b2e4f2a46788b18d33d6f2913c88b9cb967d0e068d2119ce0f8f90d680f491c47580b8b2b727f82d48f81db123354f36b4cdf66a66862146b4c68aadeb8c1aa7764ba4b29050b0fede581fd90c3ef6712d3e103fdb03c04f5d3ed92f46bf53fd844586767ae7015b6f0f5294b68de3ba68a47e9b0d9da5d5113be026ae", 0xb0}, {&(0x7f0000000300)="0150048af9a12c98eff87ffee334c86e6009ae19d0943d1cb680614a3d2315b748e780e9cbe64f8581302b1dd0", 0x2d}, {&(0x7f0000000340)="47e86e73539a0cc96fad250fd7b5013bd349c151375d01b3d7fb5e0f55cfaecb2a3ee2ca26d469005ea6b7dc29b174105fe23f998bc9810fdf3fd3ff374363e64bbbf4b2b0ae565ee8ed83d79ca5fd97cd8b23ccb3f7e0cea6b7619be6261de4b1b024c872257c9b044f166db05942b42a5bb44b76f0091382d686d022b741b78ff531b7ab97e00ffc998a7905b5efd7e1a2a2858d406e7566d02e907cefb0c6ad9fa0e650e872d11e1f7121a032195bd014796bc3d1ca4f6dda863a0b1a88255743721cab2e9d2a7c305f9f00bb9c5ca96c08b0e6366bf480ed5deaa52f224f4617831efb71ef6be7729b5ed191701aae8abda844adc46124b3998f0010ad268d65676c4b80197408cc8c23c7fea00f14ee07706d04e0653785d602e31b34b03dcca6742092b6fe32694a185b115946db26ad903ce946e541210ff24f1f896270a87f4c3e91685c893e8005a3e90da075bd47b0f6c4c02c169a33bbe640bc78c4e68f675ec33fac64639c079c072243d10327ab3ee109d67bca4ec732d1040d0fc27de87eff3c4b97041472f5d9a87302f9e3a7b7420e9ea123dc01087ea03b2f516039de991349e7084f7e419ae763ab9f44076e0175a6a711b1adaa59feafd9df1a078cdca0dadefdb1072e9ddefea510f62944a45be52299e282d450f250299fd76e37077d20ba0a9b4876bfd6999aebc9136eac6fcec3074ca79dc8039e58beca98ac05fd219ffee2df4e540d316c13dbe1544cdb88845a6143b0aab809b49289140e13d9f2a117ac84de674935004257a0154c2ba5f7b1682d4c2480b95089407d257905fc65a26c4d1665d6d149f0924a338e16e98cb45c5135a1165488e4319b4b038d30da3ba90a71e87b8fc28638c6c5607717a7c273f1d74bd24d82b3cd4d7fa8e1687d33a77878a7e163f04f5c08b1000e1b8b6b034bb658c0f42ff7ac94560da0f68c24fa79a705156dc7521e1331be67ba0049a436a45e7e9914cf68b62cea9d79f5be7e6107ed0e290b8d2a91f796f022b065ced3bf6f556df3d7c7a2c124b4587fad13e837c427d4f2cc2465aea57ce3f0e89a1738278684383ad11afbe17d8eed3528eddab623d3b2d2298d6a77546bfc2638eef9d77a6574de30870ff17758b9e3f961ff4c066176bc426f4b790859dffe0252b400b6904d8360531105b71218920f39bfbd3e2e440e32842be9db2aaffe316c5dc38c6436b05dddca4d031eb519d8234fd6b12a4390549f9f2b69c4b6b03e8d26a598b95c68fa58597b5ea981f1dacf033191ae7330440937c68d22898d26f6970109510c6f9b9b9a1a5c975a0b70a635c3f935b177a7a358173ab791bfe0e1b9637eda5457ba7dd7716acc1d9c50403dc6a2509c3b7aa79836c119444485b1320bfa1eeb8975a99033e28827c5d8c3ad68e35767d77e7ee4cfc3557b5baf1b66d8005725520503fec1ef63ec4067dcb2208b31237c42401c7187259f9ee3d247d866fcb3ccd9b6690b513369ad2e678bd7d51f756b08742c6bd79af29b66ceb1f19d30014e2a7977c89ac2637b4779128a99517b1797cfff80d37b1a653aac01c35b97ed0ea7df8a290b7b2992de7fc16af4f8781292b12aa6d68779165d88ce07e065bccda562b2781d0adc62351cf46fda99fbb30910a48521565bea1f27f384ebe238b3ae69833cc2f2c4f5da3c5c6ed353429ebacf29b003e94cb65ca6484b17811ae312f2a6e54714f33aca51ca35f340608c1d7fdd4f88118e918e288b101424046989fa4f799e3f4cebbcfd59146fea6d489227a99e4f6ef32a108e1c6e5c124e136bd58c85c64f7a76d457217c45c7aa446637c1667befad90770c3b30b99f018c336e2bbaeb7de31d00eabf56017289dd5dd14d5a2e01993781eed7e045c9f73d0dca99e0c3564706849d92d9c68ffc26b3d91ff3ac8aabfe937fa0980fd18c4d3192b17d0ec1b14352156325960e69179c1156df9407a26280d7563bd069d7a89aa2a3a2ff8f6a73785cd4d5695721ff3cf0dcbad2fd09deb4e91dab00271d5c061a165c9839e86a23dfe432b22ff06b38d9525e6771f1f66237ffe8d20a049f7b851c2ccfb90324d9ac7df9765a126e82b21e10aafdc532c8f1f663ee4fa95be477fb3cf80a03696092591dbe87554873c0c0dc9c27cc72e253ff62667b5909e42c410636a9", 0x608}], 0x5}, 0x0) 00:57:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000240)={&(0x7f0000000280)=@file={0x0, './file0\x00'}, 0xa, 0x0, 0x0, &(0x7f0000000540)}, 0x0) 00:57:02 executing program 3: mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x3012, 0xffffffffffffffff, 0x0) 00:57:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)=@file={0x0, './file1\x00'}, 0xa) 00:57:02 executing program 0: r0 = socket$inet6(0x18, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x10, &(0x7f0000000000)=0x101, 0x4) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000040000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 4: r0 = socket(0x1, 0x4001, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:02 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x8, 0x0}, 0x0) 00:57:02 executing program 5: open(&(0x7f00000001c0)='./file0\x00', 0x200, 0x0) r0 = geteuid() r1 = getgid() lchown(&(0x7f0000000080)='./file0\x00', r0, r1) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffff1f0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 0: lchown(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) 00:57:02 executing program 3: mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 00:57:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) 00:57:02 executing program 2: syz_emit_ethernet(0x42, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 00:57:02 executing program 3: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x893b47294611f633) 00:57:02 executing program 5: socket(0x0, 0x71b373bb97e41ba3, 0x0) 00:57:02 executing program 4: shmctl$SHM_LOCK(0xffffffffffffffff, 0x3) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000900000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000100000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) pwritev(r0, &(0x7f0000000100)=[{&(0x7f00000001c0)="e6", 0x1}, {&(0x7f0000000280)='w', 0x1}], 0x2, 0x0, 0x0) 00:57:02 executing program 4: r0 = socket$inet6(0x18, 0x2, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 00:57:02 executing program 2: lstat(&(0x7f0000000100)='.\x00', &(0x7f0000000140)) 00:57:02 executing program 5: socket$inet6(0x18, 0x3, 0x3) 00:57:02 executing program 3: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2) 00:57:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x100, &(0x7f0000000280), 0x4) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000200000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@empty, @local, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x0}, @broadcast}}}}, 0x0) 00:57:02 executing program 2: syz_emit_ethernet(0x36, &(0x7f00000002c0)={@random="a7ced5adc257", @local, @val, {@ipv6}}, 0x0) 00:57:02 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000000)=""/7, 0x7}], 0xfffffffffffff67, 0x0, 0x0) 00:57:02 executing program 5: chown(&(0x7f0000000cc0)='./file1\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file\x00', 0x0, 0x0) 00:57:02 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) lseek(r0, 0x0, 0x0) 00:57:02 executing program 2: r0 = socket$inet6(0x18, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x18, 0x1}, 0xc) 00:57:02 executing program 0: socket(0x1, 0x4001, 0x1) 00:57:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001a80)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000040200000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 4: sendmsg(0xffffffffffffff9c, 0x0, 0x0) open(&(0x7f0000001dc0)='./file0\x00', 0x200, 0x0) 00:57:02 executing program 2: fchownat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x4) 00:57:02 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000100)={0x0, 0x80000001}, 0x10) 00:57:02 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000100), 0x10) 00:57:02 executing program 4: poll(&(0x7f00000000c0)=[{}], 0x20000000000001a7, 0x0) 00:57:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000300000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:02 executing program 0: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 00:57:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001bc0)={0x0, 0x0, 0x0}, 0x0) 00:57:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x2}]}}, &(0x7f0000000140)=""/219, 0x26, 0xdb, 0x1}, 0x20) 00:57:02 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) sendto$unix(r0, 0x0, 0x0, 0xd, 0x0, 0x0) 00:57:03 executing program 3: open(&(0x7f0000000080)='./file1\x00', 0xb82, 0x0) 00:57:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000400000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000140)="f0fa67d56cc7b9fe3fd6cdbef3ea761b407b1e1db9fb5fc5363c7062e7fab3c6f6404c374c25ca80b1fff8dfb816ce51925c5391ba88aaedd58e22dae754201c6806ce0424ac052854419e58222020401901c626da645ee63b5b83f6c78e1e7c4860dcd3c9d15abf2c9634b3b52920c14f4c6b050f78ee0363324b29ce4eaadb21097e8046ca1815321971774e3f4e83a2dfd2ae3c51402ab3fa2bdd2f2408fd182eb6d28911d51c80ec61b43225824b5cf7aa2d7011e7a71f01f9b046586d1628ddd3447eae01f95cb3cf5b59fd7e914fb94cbc8a9810fb6fad72c2", 0xdc}, {&(0x7f0000000080)="c2683a73f5d7ed60489c0da4069eda7a5f4031a4b2ca3c8e718bbc441412d6b8b146380fa3167a2d190444921047cb96bde4a50020fb26ed517687756fe45ae0", 0x40}, {&(0x7f0000000240)="c521aaca5a98223332884c4284823eec24b6f0324a6aee76ff9677bd922742768e78eb4c5770bd97590cd2da71a17f50b01df8b2e4f2a46788b18d33d6f2913c88b9cb967d0e068d2119ce0f8f90d680f491c47580b8b2b727f82d48f81db123354f36b4cdf66a66862146b4c68aadeb8c1aa7764ba4b29050b0fede581fd90c3ef6712d3e103fdb03c04f5d3ed92f46bf53fd844586767ae7015b6f0f5294b68de3ba68a47e9b0d9da5d5113be026ae", 0xb0}, {0x0}, {&(0x7f0000000340)="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", 0x675}], 0x5}, 0x1) 00:57:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) close(r0) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:03 executing program 5: readlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file1\x00') 00:57:03 executing program 5: getgroups(0x1, &(0x7f0000000880)=[0x0]) 00:57:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000500000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:03 executing program 4: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0xfffffffffffffe6b, &(0x7f0000000080)=[@rights, @cred, @rights, @cred, @rights, @rights, @rights, @cred], 0xe8}, 0x0) 00:57:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000140)="f0fa67d56cc7b9fe3fd6cdbef3ea761b407b1e1db9fb5fc5363c7062e7fab3c6f6404c374c25ca80b1fff8dfb816ce51925c5391ba88aaedd58e22dae754201c6806ce0424ac052854419e58222020401901c626da645ee63b5b83f6c78e1e7c4860dcd3c9d15abf2c9634b3b52920c14f4c6b050f78ee0363324b29ce4eaadb21097e8046ca1815321971774e3f4e83a2dfd2ae3c51402ab3fa2bdd2f2408fd182eb6d28911d51c80ec61b43225824b5cf7aa2d7011e7a71f01f9b046586d1628ddd3447eae01f95cb3cf5b59fd7e914fb94cbc8a9810fb6fad72c2", 0xdc}, {&(0x7f0000000080)="c2683a73f5d7ed60489c0da4069eda7a5f4031a4b2ca3c8e718bbc441412d6b8b146380fa3167a2d190444921047cb96bde4a50020fb26ed517687756fe45ae0", 0x40}, {&(0x7f0000000240)="c521aaca5a98223332884c4284823eec24b6f0324a6aee76ff9677bd922742768e78eb4c5770bd97590cd2da71a17f50b01df8b2e4f2a46788b18d33d6f2913c88b9cb967d0e068d2119ce0f8f90d680f491c47580b8b2b727f82d48f81db123354f36b4cdf66a66862146b4c68aadeb8c1aa7764ba4b29050b0fede581fd90c3ef6712d3e103fdb03c04f5d3ed92f46bf53fd844586767ae7015b6f0f5294b68de3ba68a47e9b0d9da5d5113be026ae", 0xb0}, {&(0x7f0000000300)="0150048af9a12c98eff87ffee334c86e6009ae19d0943d1cb680614a3d2315b748e780e9cbe64f8581302b", 0x2b}, {&(0x7f0000000340)="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", 0x60a}], 0x5}, 0x0) 00:57:03 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/34, 0x22}, {&(0x7f0000000080)=""/168, 0xa8}], 0x2) 00:57:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000000), 0x100000000000024e}, 0x0) 00:57:03 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0x0) 00:57:03 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) preadv(r0, &(0x7f0000000380)=[{0x0}], 0x1, 0x0, 0x0) 00:57:03 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001400)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 00:57:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000600000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) select(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x7f}, &(0x7f0000000140)={0x0, 0x9}) 00:57:03 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) write(r0, &(0x7f00000000c0)="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", 0xa01) 00:57:03 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x0) 00:57:03 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffff9c) 00:57:03 executing program 2: open(&(0x7f00000001c0)='./file0\x00', 0x200, 0x0) unlink(&(0x7f0000000000)='./file1\x00') 00:57:03 executing program 3: setrlimit(0x1, &(0x7f0000000000)={0x0, 0x7fffffff}) 00:57:03 executing program 0: open(&(0x7f00000001c0)='./file0\x00', 0x28208, 0x0) 00:57:03 executing program 2: open(&(0x7f0000000780)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) 00:57:03 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(r0, 0x80087467, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xff}) 00:57:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000010600000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:03 executing program 5: madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5) 00:57:03 executing program 0: select(0x4, 0x0, &(0x7f0000000040)={0x5}, 0x0, &(0x7f00000000c0)) select(0x40, &(0x7f0000000180)={0x1}, &(0x7f00000001c0)={0x6}, 0x0, 0x0) 00:57:03 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) getdents(r0, 0x0, 0x0) 00:57:03 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) 00:57:03 executing program 5: open(&(0x7f00000001c0)='./file1\x00', 0x200, 0x0) chmod(&(0x7f0000000080)='./file1\x00', 0x214) 00:57:03 executing program 4: madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x1011, 0xffffffffffffffff, 0x0) 00:57:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000040600000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000680)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 00:57:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000100)="c445de6863f10d269b543ed24e609edb3c426e86b62474612a9ce7343799740183c717ececb5cd0e347c06883d04b877bf481558c51780bf98045b2d7f2660ff8e531dca7066b7e030bf6fc76465a1a9f819ad10186c4b119c93b6f744b5a0f4b6d6de836e2d0f468af801a004bc53234892f19154378ed6ce7564e09c96f05bf548b2980c013e0af35007b4380af62c36", 0x91, 0x0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x2}, 0x8) 00:57:03 executing program 5: madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 00:57:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000700000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:03 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = getpgrp(0x0) fcntl$setown(r0, 0x6, r1) fcntl$setown(r0, 0x6, 0x0) 00:57:03 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) fcntl$lock(r0, 0x8, &(0x7f0000000140)) 00:57:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) close(r0) dup(r0) 00:57:03 executing program 2: madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1) 00:57:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffffee0700000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:03 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x8, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000100)='f', 0x1}], 0x2}, 0x0) 00:57:03 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:03 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x490, 0x0) 00:57:03 executing program 3: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1810, 0xffffffffffffffff, 0x0) 00:57:03 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 00:57:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000800000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:03 executing program 5: open(&(0x7f0000000280)='./file0\x00', 0x200, 0xa6) lstat(&(0x7f0000000040)='./file0\x00', 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) 00:57:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000080)) 00:57:03 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/128, 0x80}, {&(0x7f0000000140)=""/1, 0x1}], 0x2, 0x0, 0x0) 00:57:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000900000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:03 executing program 5: open(&(0x7f0000000340)='./file0\x00', 0x200, 0x0) utimes(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) 00:57:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0xffffffffffffff9c, 0x0) 00:57:03 executing program 0: open(&(0x7f0000000340)='./file0\x00', 0x200, 0x0) r0 = getuid() chown(&(0x7f0000000200)='./file0\x00', r0, 0xffffffffffffffff) 00:57:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d40)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x100, &(0x7f0000000000)=0x400, 0x4) 00:57:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d40)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000180), 0x4) 00:57:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000a00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:03 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000d40)) 00:57:03 executing program 4: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') readlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 00:57:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d40)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, 0x0, 0x0) 00:57:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d40)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x80, 0x0, 0x0) 00:57:03 executing program 2: open(&(0x7f0000000000)='./file0\x00', 0x202, 0x0) 00:57:03 executing program 5: semctl$GETALL(0x0, 0x0, 0x6, &(0x7f00000013c0)=""/199) 00:57:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000b00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getpgrp(0x0) getpgrp(0x0) sendmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@cred], 0x20}, 0x0) 00:57:03 executing program 3: bind$unix(0xffffffffffffff9c, 0x0, 0x0) 00:57:03 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg(r0, &(0x7f0000001700)={&(0x7f0000000000), 0xe, &(0x7f0000001400)=[{&(0x7f0000000040)="3ff683f01a78076210b8ed63e4bf55c722893cf2b5b7d2b5c4fa5f60dc612f6262eca7c2ee603ff312886465974d45810af73a2382a4203a3d4ca7b503b650ee1c1c75a7eeebc76b12dad9c14800d36911991e234254d9c9bbcd55e49f0e486c0a195ca6644126184197e28a2a4ad81e1f95ee5f2fd6547f866fe60dbdc9118c1d9908b9e011de47aa8f5bade00ccb90aea4505d3f89886891c461f850327f02b710a7cf9b041fb5e8f6df0ec488d35cbf3ed6df8aedcb830f2e5b2188811ccbef44c1f367ae3f1b601654c61fef87375a2883fae90edf", 0xd7}, {&(0x7f0000000140)="f5ebb835a135f24c74306331584fce2dab79e73ad3b922e3ef71d03ee25ccd6bab8f7456ca05beba459335c4d491ffcb5feb2f3bc4a10f81cc6bc1877038ddd0672e793a2a76ea9aaf4d1791f3011f6a5ad022669cded6d056637a307bc6cf359bdf19ec672f2f42559e493d7a2f082747f8c943b1b109205c77ecc45bac584415b402a4b6342d307a2772bcdee083f70c456821366f813e28af43354c7de95704fc860997295906b7c24798f4970e21498661", 0xb3}, {&(0x7f0000000200)="71af0e20a5a5515e24a5183b5d3be19bef050fbd58a013cc3e8658e9494b5d9e8e8a935fe7f5462b1bc3e00aea82ffe713442017a575f1217229c2d1f7d6fcf42d8e1ead01199864b7771f2ba0f02e943839923a070e05646fed05265054b7c1e68e7997b353f64276df93f22ec95922304a3c893f82636664995823c8", 0x7d}, {&(0x7f0000000280)="be861f19d15eae214a82c88e7dea7c5b34ddc23734cc213d40508d4f53e6befd3e94ece4105747bc82e0474362793b8027937f02d08870a28abd4bba4b80c1091daaa18f0b22d3395375693ade0f1af0a88c1177eff3276c6445a7fa73586cd8be692330de", 0x65}, {&(0x7f0000000300)="dbe258e8a79884995b2900170f83285f054dbc9b4acc8aa2219329396768d232e4b6d74d3db2e9a69ae656fc0c6c116339fd67603c30a5f3350d295112326ace99936bf7f891b867b8ea30f8a00e0e88c2fe4d0b55c2a11f7d02a450eefaf478905937809b0963198e3548febee06142f41224ff386b81dc398996d2c38f779629d1e65659cf576fd28d5d159cd208df3855ed577b012518610629c7770a067295bfba", 0xa3}, {&(0x7f00000003c0)="f2d4aa7f7a87c811790e379f49e87e0522d784b7d7ac46139155f0353c4684f51cb049b3c54f1669a716ea2d5a2f7e36325d6316045041b2e53e0e354dbf1015857fc4633ed753e0b3d2", 0x4a}], 0x6, &(0x7f0000001480)=[{0xe0, 0x0, 0x0, "c3025b0a86654dec78ded06547b11c8ed41ac0b90ab1f401fa8b309fbb84320dc950aa9566232914aa60670f178461ef5d72b010f40de5ebe4ce10bb97ba5987e354fa6ec11ef89646f9ea7220fc32c1ba43a0fb3d0d2a39d41f80268322f44e259c448734d8f02d54a96238f86da81efc9f308e6bd3d33fbf17bded04437cbf83f9939c113bfdffa7b44b826b30e98a3943f327396de1f00a1ac0804c1a24546b3d65dd4ab99b2e17d6b9bb74690022014f2fa81103fcf652ad1ff9c9ee69fbea4f89be4f9fea36c0"}, {0xe8, 0x0, 0x0, "e6320ac54800756b065c94ad3e1f5fb4961de87bd3d8892200d5ebad5fd40457000217c0d56ef773e7631987a74f13f932b112f2ff0c494a36a2d19b26e96403b13e923678c03f9801a0ce68962b4290b4b00f23ad784877e6a416f6a98664235bcb486bd2aef6f1922ac8753a0d339450415a82881265d4c5543f19da97fc828bb1ac009d7893c04167ef5898183cd17043d79ca3763224dcf91129b0857d8a7aedb9e23f2b1cd5d59f2fd9ed83be252c254f4bae76ad595209bbfda1d954419873f490dd07c3a6cf41cc9b878eb5b792"}, {0x40, 0x0, 0x0, "6a5c86ed2160eb86adcf77574b4973f6e385cc3ff90b3a4e4df9178a37554f895ef3143bd092d100bf"}], 0x208}, 0x0) 00:57:03 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg(r0, &(0x7f0000001700)={&(0x7f0000000000), 0xe, &(0x7f0000001400)=[{&(0x7f0000000040)="3ff683f01a78076210b8ed63e4bf55c722893cf2b5b7d2b5c4fa5f60dc612f6262eca7c2ee603ff312886465974d45810af73a2382a4203a3d4ca7b503b650ee1c1c75a7eeebc76b12dad9c14800d36911991e234254d9c9bbcd55e49f0e486c0a195ca6644126184197e28a2a4ad81e1f95ee5f2fd6547f866fe60dbdc9118c1d9908b9e011de47aa8f5bade00ccb90aea4505d3f89886891c461f850327f02b710a7cf9b041fb5e8f6df0ec488d35cbf3ed6df8aedcb830f2e5b2188811ccbef44c1f367ae3f1b601654c61fef87375a2883fae90edf", 0xd7}, {&(0x7f0000000140)="f5ebb835a135f24c74306331584fce2dab79e73ad3b922e3ef71d03ee25ccd6bab8f7456ca05beba459335c4d491ffcb5feb2f3bc4a10f81cc6bc1877038ddd0672e793a2a76ea9aaf4d1791f3011f6a5ad022669cded6d056637a307bc6cf359bdf19ec672f2f42559e493d7a2f082747f8c943b1b109205c77ecc45bac584415b402a4b6342d307a2772bcdee083f70c456821366f813e28af43354c7de95704fc860997295906b7c24798f4970e21498661", 0xb3}, {&(0x7f0000000200)="71af0e20a5a5515e24a5183b5d3be19bef050fbd58a013cc3e8658e9494b5d9e8e8a935fe7f5462b1bc3e00aea82ffe713442017a575f1217229c2d1f7d6fcf42d8e1ead01199864b7771f2ba0f02e943839923a070e05646fed05265054b7c1e68e7997b353f64276df93f22ec95922304a3c893f82636664995823c8", 0x7d}, {&(0x7f0000000280)="be861f19d15eae214a82c88e7dea7c5b34ddc23734cc213d40508d4f53e6befd3e94ece4105747bc82e0474362793b8027937f02d08870a28abd4bba4b80c1091daaa18f0b22d3395375693ade0f1af0a88c1177eff3276c6445a7fa73586cd8be692330de", 0x65}, {&(0x7f0000000300)="dbe258e8a79884995b2900170f83285f054dbc9b4acc8aa2219329396768d232e4b6d74d3db2e9a69ae656fc0c6c116339fd67603c30a5f3350d295112326ace99936bf7f891b867b8ea30f8a00e0e88c2fe4d0b55c2a11f7d02a450eefaf478905937809b0963198e3548febee06142f41224ff386b81dc398996d2c38f779629d1e65659cf576fd28d5d159cd208df3855ed577b012518610629c7770a067295bfba", 0xa3}, {&(0x7f00000003c0)="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", 0x482}], 0x6, &(0x7f0000001480)=[{0xe0, 0x0, 0x0, "c3025b0a86654dec78ded06547b11c8ed41ac0b90ab1f401fa8b309fbb84320dc950aa9566232914aa60670f178461ef5d72b010f40de5ebe4ce10bb97ba5987e354fa6ec11ef89646f9ea7220fc32c1ba43a0fb3d0d2a39d41f80268322f44e259c448734d8f02d54a96238f86da81efc9f308e6bd3d33fbf17bded04437cbf83f9939c113bfdffa7b44b826b30e98a3943f327396de1f00a1ac0804c1a24546b3d65dd4ab99b2e17d6b9bb74690022014f2fa81103fcf652ad1ff9c9ee69fbea4f89be4f9fea36c0"}, {0xe8, 0x0, 0x0, "e6320ac54800756b065c94ad3e1f5fb4961de87bd3d8892200d5ebad5fd40457000217c0d56ef773e7631987a74f13f932b112f2ff0c494a36a2d19b26e96403b13e923678c03f9801a0ce68962b4290b4b00f23ad784877e6a416f6a98664235bcb486bd2aef6f1922ac8753a0d339450415a82881265d4c5543f19da97fc828bb1ac009d7893c04167ef5898183cd17043d79ca3763224dcf91129b0857d8a7aedb9e23f2b1cd5d59f2fd9ed83be252c254f4bae76ad595209bbfda1d954419873f490dd07c3a6cf41cc9b878eb5b792"}, {0xa8, 0x0, 0x0, "6a5c86ed2160eb86adcf77574b4973f6e385cc3ff90b3a4e4df9178a37554f895ef3143bd092d100bfbae73f7e56fd700edd356fcee955f85753ed22bb977cef2ccc42418c1fc951584e5f1a559986892f3dabd23a9b89482bce35fe02a4ed6b9ec801cbb108d38c8049daa3615dce30ac24b1a73e0eedaa9c94086d3717d4247801a61a2da12c50009af913aa8f923f6b"}], 0x270}, 0x0) 00:57:03 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000140)=""/1, 0x1}], 0x2, 0x0, 0x0) 00:57:03 executing program 0: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}) 00:57:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000c00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:03 executing program 5: writev(0xffffffffffffffff, &(0x7f0000001a80)=[{0x0}], 0x1) 00:57:03 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x100c, &(0x7f0000000140), 0x10) 00:57:03 executing program 2: socket$inet6(0x18, 0x0, 0x43) 00:57:03 executing program 3: symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 00:57:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000d00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x38, 0x2, 0x9, 0x801, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6}]}]}, 0x38}}, 0x0) 00:57:03 executing program 5: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@local, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x44, 0x2f, 0x0, @remote, @private2, {[], {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0xff}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 00:57:03 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3, 0x1c) r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8912, &(0x7f0000000040)) 00:57:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000e00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:03 executing program 4: readlinkat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) 00:57:03 executing program 3: mknodat(0xffffffffffffffff, &(0x7f0000001cc0)='./file0\x00', 0x0, 0x0) 00:57:03 executing program 0: connect(0xffffffffffffffff, &(0x7f0000001d00), 0xe) 00:57:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000480)={&(0x7f0000000000)=@in={0x2, 0x4e23, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}], 0x18}, 0x4000000) 00:57:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x7800, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @private}}}}) 00:57:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000f00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:03 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, 0x24) 00:57:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89a1, &(0x7f0000000440)={'gre0\x00', 0x0}) [ 3416.865629][T14278] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 00:57:03 executing program 2: r0 = socket(0x22, 0x2, 0x3) bind$xdp(r0, 0x0, 0x0) 00:57:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @empty}, 0x1c) 00:57:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000020f00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x73, 0x0, &(0x7f0000000180)=0x300) 00:57:03 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x2, &(0x7f0000000140), 0x4) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000001000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xd, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x5}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:04 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x80108906, 0x0) 00:57:04 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0x1d, 0x0, 0x0) 00:57:04 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3, 0x1c) r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8901, &(0x7f0000000040)) 00:57:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000680), 0x4) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000740), 0x4) 00:57:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) 00:57:04 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x8, &(0x7f0000000000), 0x4) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000011000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x6b, &(0x7f0000000080)=@assoc_value, 0x8) 00:57:04 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f00000013c0)={0xa, 0x0, 0x0, @loopback}, 0x17) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000001100000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 0: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x5a, &(0x7f0000000040)={@broadcast, @broadcast, @val={@void}, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "3c2f20309a4c8e59a1081606fadb35aae1f789f642272c8edb3456c12b07ec3176aab08fd7487c1b2fb062fd8cb8798c4ece9448258d298832e2aa40d64d2d49"}}}}, 0x0) 00:57:04 executing program 3: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x10) 00:57:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x82, &(0x7f0000000080)=@assoc_value, 0x8) 00:57:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) 00:57:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'pim6reg\x00', {0x3}, 0x100}) r1 = socket(0x2, 0x3, 0x7) syz_genetlink_get_family_id$tipc(&(0x7f0000000300), r1) [ 3417.009311][T14321] sctp: [Deprecated]: syz-executor.0 (pid 14321) Use of int in max_burst socket option deprecated. [ 3417.009311][T14321] Use struct sctp_assoc_value instead 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000001200000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 5: r0 = socket(0x22, 0x2, 0x2) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c}}, 0x40000) 00:57:04 executing program 0: r0 = socket(0x2, 0x5, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:57:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f0000000140)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @empty}}}}) 00:57:04 executing program 3: r0 = socket(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8937, &(0x7f0000000080)={'batadv_slave_1\x00'}) 00:57:04 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xb, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 00:57:04 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x49, 0x0, &(0x7f0000000040)) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000011600000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000240)={'veth0_to_team\x00'}) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000041600000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 3: syz_emit_ethernet(0x52, &(0x7f00000001c0)={@random="af70ec648682", @dev, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "9a6999", 0x18, 0x6, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}}}}, 0x0) 00:57:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile]}}, &(0x7f0000000080)=""/248, 0x26, 0xf8, 0x1}, 0x20) 00:57:04 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000003c0)={'wlan0\x00'}) 00:57:04 executing program 5: r0 = socket(0x1d, 0x2, 0x2) connect$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="f283c5273883"}, 0x14) 00:57:04 executing program 3: socketpair(0x22, 0x0, 0x0, &(0x7f0000000800)) 00:57:04 executing program 4: syz_emit_ethernet(0x15, &(0x7f0000000080)={@random="652ab45efa6d", @empty, @val={@void, {0x4305}}, {@x25}}, 0x0) 00:57:04 executing program 2: r0 = socket(0x2, 0x3, 0x7) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, 0x0, 0x0) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000001800000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 5: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x88) 00:57:04 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x24, 0x0, 0x0) 00:57:04 executing program 3: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x80, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'a\x00'}, @NL80211_ATTR_REG_RULES={0x40, 0x22, 0x0, 0x1, [{0x3c, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x3}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x80000000}, @NL80211_ATTR_DFS_CAC_TIME={0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0xc1}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x6}, @NL80211_ATTR_REG_RULE_FLAGS={0x8}]}]}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1d}]}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x40886) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000003c0)={'ip6_vti0\x00', &(0x7f0000000340)={'sit0\x00', 0x0, 0x4, 0x0, 0x0, 0x7, 0x14, @mcast2, @private1, 0x10, 0x40, 0x3553aab3}}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000540)={'ip6gre0\x00', &(0x7f00000004c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x9f, 0x8, 0x10, @rand_addr=' \x01\x00', @mcast2, 0x0, 0x7800, 0x0, 0x1ff}}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000001140)={'syztnl1\x00', &(0x7f00000010c0)={'syztnl2\x00', 0x0, 0x0, 0xff, 0x1, 0x8450, 0x0, @private2, @mcast1, 0x0, 0x700, 0x1, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000001200)={'ip6_vti0\x00', &(0x7f0000001180)={'ip6gre0\x00', 0x0, 0x0, 0x20, 0x2, 0x2, 0x68, @empty, @local, 0x1, 0x700, 0x8, 0x80}}) syz_genetlink_get_family_id$tipc(&(0x7f0000001240), 0xffffffffffffffff) sendmsg$NL80211_CMD_ABORT_SCAN(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000012c0)={0x0}, 0x1, 0x0, 0x0, 0x804}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) 00:57:04 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000011800000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 0: r0 = socket(0xa, 0x3, 0x8) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) 00:57:04 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)="9a", 0x1}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002900)=[{&(0x7f00000016c0)=""/4096, 0x1000}], 0x1}, 0x0) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000011900000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 3: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x14, 0x0, &(0x7f0000000140)) 00:57:04 executing program 4: r0 = socket(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8942, &(0x7f0000000080)={'batadv_slave_1\x00'}) 00:57:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x2003}, 0x4) syz_genetlink_get_family_id$mptcp(&(0x7f0000001100), 0xffffffffffffffff) 00:57:04 executing program 5: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x79) 00:57:04 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "bb12da", 0x0, 0x6, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev={0xfe, 0x80, '\x00', 0xa}, {[@fragment, @fragment, @hopopts={0x0, 0x0, '\x00', [@pad1]}, @fragment, @dstopts={0x0, 0x0, '\x00', [@pad1, @calipso={0x7, 0x0, {0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, @hao={0xc9, 0x0, @empty}]}, @srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, [@dev, @dev]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {[@mss, @md5sig={0x13, 0x0, "342e029b7b047021c6741c44b541605b"}, @generic={0x0, 0x0, '.K'}, @exp_fastopen={0xfe, 0x0, 0xf989, "4874bf1bdab0ec938c83be91"}, @exp_smc, @exp_fastopen={0xfe, 0x0, 0xf989, "45aec342fd92731556356ffa9b15e2"}, @mss]}}, {"d605cb9108488cdfb1382a0cbeafad196dec2b3074e60fc60b8e500ae2a98c9f4634276e55f92e80243f70b5c73eb6b9198baf12d935dac28dd35f239808f73fdc76ab1da1f37461537c7c22266934b760f876eaec37bc8ad1c74608af5bdbc65b6cc8d82fbf27d6c961a0d10374b0a9ec19d0a72bbcbd7941e6b134ccb3de958861c446edec96481867269d11e33e6947f80e092101312034d746fd8c8f0423f3f1581aced9c39ebdb39457d66937fe1593fedf509fa5b5f185dd98821c0a15b2fa9b92fdac144841e36da96219a73c656c0b13c7a5abfc059df9e7ef2e75cc733ba6ed9ea1193a157f52fc4b93aa5ee35e3112f5cfb662082f0a064020811288a877b1ac25ac3db130d3605605e48dc23d0ee8a7c35a67efbf244acb975cb3dfa8d198c387aa090a711b96e4fc08b8b8448fcd533b7bf02a4af99485c49619fbc30f8b2d970a742d9e7cf3914cc71a56115b4f57adfadd2091dfd878f524cfe1a4e1f9a08a1cedc8e2cdef043c546360bc39285cd466932f57b5bc98bb17abcf01d773c3d5c61ac6a266f56f11e8d4c6b840c981d56222319ac6a5c784d700b5246b813cf40ae14cab0faa1fd443067bbbf9c28c6eeac71c7dc9b2404602cb01f3558ca5cf8e51015978debd9d60d44345c0f6b231e43d3b0268f88bd405ce7472f63bb59a6bce29dad0c738196a66439c3f6521c29b5847937a1b84fd6c4bfee20ca0339adfa909e71f5f1706aa7d1103a213c96b87f509ade322edbfdab8ac8eb2781f2cd1c79acaedcfe511caff5e0df3b2e88ed2f27dc98df546d190953b76d59fff014e5236d80d3b921738ac7031320a264379971f8e1d2ff8b52b9e1f22a36397e48dac164b9d9d88260e91bc0dd456e0af51287b19ecb09890db9b98882b8e228a558ad29f0c7dfb4f7531377f13b1a99e9854ed26c6fefe6750c54a71d5e2bdf536b69eaebcec0ffb3b38f82b0e57b8f87edca992b3bf06fa9a9e7344932982b344b329bc4ecd27f0efefe4d19b81496248d037b28d44929b33e936078caee34979fca461a079dcca3e4cc7837b173ce7ba9fa670d75d563c3c5d579cb60e3fe460590bdbeb5185bcfb82defcc25d40d94fd02fe680a27c221b5c77ad95a0bfddb4c9d97756453c95fc3f24b7a2791dca29d66493b1ddfe5ade3e3b04fa925301c8e871d0c6d889f12f74f46d89cb6fb563568241df4e5c132ac055e7e3de2fd3802bc8f3ee7434dc42eedb2e0a4a27f24b7c6c3b956835e4daee398da698de8ab85b9a97afd1aca14994df28557fca9d7b7fd5cb349141926870f4460a4148b413c5f26a1a584bc582a7d7a6c12d8fb8d357477d8634e233cb1dddda25afe1d5e647be7781b7fb5a5efa5bad6deffde846740ade79e7893e9cbff0bc455f570f7d0f739da8fd567b6ff9a177d10d83466bab966b0767fdb4caf3713204b80c47c9074ab51af7319943b819515e427c2aac7dd6d58e2b978787fd763488672cce2a502aa7c53e3fdcf75fa138a348d1a41aefcb4170e21a426371b21af35714899953b1355aeaf668c122da7a691b54ef5a107ceceb4ad6f63c2d56000ebd664e5f6d3ea1a0f75407913bc3f7faac4ab6c88ad8ab16dc340f94ee7c8da62977f8b9e547590a7b7affe438fb2d408e26b07d3625278cf5a23d37850ab5c7558019f0b258e307c6a97a3ed8a226503084c24c32531099120d7664a2c97a0a59111c64eaa2e41b0f5af1c5882bb231055e33fe6260ab271a48d6f5f682873c8f7a53731814175b7436fe70d33e046deffeef636b36399ba665a740ba6b77598e02bafc095a5358166339edc31f8089bdb08b24729afe7521f1cb37b7fcad7ae1f6c1ded53a25a2b51c87776ccf12b6d1ca759f6202b8ec58d972c62d662de687914ba0bf506bbb4cac588e2af42e322f3ecf293fc38892b02633c618bf9089a900b54866eb673d7006d2781b29185e4e96b61f8f53bf431c19706308e85897ba8afe7fa1012ff15272304fb8a61f07c4f4a1cf1e78f93608d6593d1f3cf6bf9390ef98ef06ecff16e6d1b12bf39481370be36f72f3373163dad33a93c08505800305ed14264285ceef50643fd0d4c4314c5c99d025384d50f334dffe15d14a0f90178f98f90f7cd3bc916ad51fd806072cf6d249e448a99d069e6f641a4845b6a411b556d55091e76ce74f17602da4e946d6124387e1873a492f57ca9d442f6a9297d3e2e91cb5707c50c69364699d78ca3c36e8b4b30d2cf4b846682815710de147851200abb543d3496c68a5373b6acdfcf6372b57d2b901774c005cf8e63f7708d673f5de7fc3496aebdf6a1ed306d3ac321f3b7a93d4f88ed0ee50b2808b1dc107493719fd83f911cf05418ca0695ea5ed4be372120b95d5a102d399761b4d8ef48053d2e32d71977c189aa6111483eaff14dbf237d60c23ff082c0151e7856a51ae13942e866a6b0ffe8bba324f36cc8fc6c03c1fb9de843fe1cd76fe3c290642e12a30b4c850d76cdb2b565f71c00e4db4bf85051e10f317758be72d86201ca82a2ceb0e52174577118b6b79c979f04408676f639f5dd08a18926b86b506abc0b527a3f0e22c0eb7827ccf4a8d9e90f9338e1037fd467146491aa1f917cb3d554a000f28442a648b846c960570fd45b2bb4c9c511bea1304d7dffec63e25c906518a836d36f3ef3a6b80e6b697ca9b7a71726aff718f8121e88ce5ffc9c8b1816c44de2faf5c70fa9f0007844a00bc230a012471d7f5bf3f3533271331b4ff653eb69fbfbf642400963006c9b5ea76cdb709e5830a6037b03ba9244f11c9cb50eb7c19623ea8843f29218a4fe89ea4faa56d57b048f7ce74f8562275bd4eb66e91f5b18f91e92d3de500d43bf3ddf924bada60388a218ef7a9d1ebeaef6059fd54a1bf9cecf0c21f0a090c1e386a908f9c615e4fe82652d9379790eb7cce66056a4bec3e52f0c2105aed579cd3129f7ce5ee74f3e3160b0dcd54c7dfdba52d28f2430be4f38fb147662120a8250e9e873a92a9ad2fe299c8a6cdb24da981b29b880cde83be02392b650483e70c14370d8e3212bdb7654bb9d8afaf50492e9e7e638d27da7bc1551585522a5dc906fe9a3520520a2368a2d823b57215659186ce23b5b76745216127e46d6f91e12eab3790958959c036b0245d8f164540bdc1eac39589a8cd744c171a5a7c2a22befceb8c6510ed5bcc787390dca1166ca9a5ee31be6bdaa959c6d4b585f78bd4623b01520308bd24668b2f117f77f08881d179778dbe8eaa219ea6924fe3ff6dda5f6ed946d895a810f0ca4c0b5bf4a3a3bb3ea33090e5ba53355065f2cae022495e2cc6a66aa51cd72fa4ddd1ec93c6d95580a616a23d44bb83e63923b3389fe9f2e2e8784929f5e7a727d24d4ea7c842b7c8b325a0fcc5745aab5411467bc69ac6bb02f86f7de08e8d52bed08b39edb8d4ec343122f4e9c61ccd36a7fa3cefd928d20c74c42521ed089f2f274b4129075c489b4548963588f42745b9bae212aa44411abf06d25259253907e333adb7aa34fcc21303bf4caf701ba44345ae10dc38325d2e95fa384f9535a4ff5946f2d43f692f6a94bf49cbc618739760ec1628cdaff0553042d06999fc08dc982940d4c779b8f1c2c7224867215f17482ddbff4f89835d11c8efe1d2da4fb69ef5c9392b4aeaf2a9163e2d4f19ebd75a4392489d60abfae1d8dc89c72ea78767872ed8b7f0227735fb8f4a1415a5b20cdf70bffd105b074f2c5ed2b32cb8240da398f8e74783a714351ab707b130de6b861159d2532a12758922184e9143e5fcc34a2c9f3006ee36c26da39ee740156d5f4c8d34badaa925060bf5d3e921fd86d5e21c021a151758b8b5d3346ec150cf7150c78e96db44f37779cf519af4f7076364c546cc4df943c4d58c848a3e8bca40c1eeb7c22ed4d1ba25976949cb53948edcae5a9cc0850910bc8e641b88ce5d234cf16e75898275b828eca4eacde6acc67e9cf7f164a7bd756332917d69776e7a57eb0c580f414b83fed26cc4b0765d89eb9cea131e0c06de3c3bf8ec34cce0c1b3c524b7b0fae005e3b7a0e0f58dedc7ec3737cf1f16d58b32a25d7db39f133ce96ada09f42a355a621a7925941ca395614239759e1995f94efd79457c9b237a7ef867c08d5b3dbd450a8153bd8bd20f2acd977584bbf72fdd5868b3830dc61e0ca95966d7719453999d477cb82ca83338a10edad07de669c18fdc0c0dd53526bfd4feeb925e414da05cfa07bb0ff798b4079042bc7c41b8ecd37aa5ab3b73cdfd2a8149c5bd76235362de435ac9c4b8f896dbecf350c9bb8141659ff0c69083680480671084aa2afec42d9342d40f862ba93a0abad218aa401c13eaa388c8bf71c2de12b16b7a0fce886b98609d2425248be8ce6c130198336eee1007f6246d6523cf4741b3073e2dd2719cec8e12d396f32f542244ba2ad0aacf1477567903efbae628254f59a5f5cc9f65594cc85310b1e492fbb7f257a2c93cd93cdd4a7e95b1cbbcd3afe184da20d7c8fc1b90edb4a94251b337727ceb95246d2a17cf6558c72d426f6594d3b8a486103beb94f5f7c3997bdd0d6c239daeb2ec2fc50c19f336b269e21fa9453c75bb94311a79ce1fa61c8193a7945c05a70e2be6269609f1865bbb54310564d03a64bd8ba8febefa9d5b8838fb80e4c7f2491f58c82811452c51b6961856d4b1542b879d779b729f6b1f967f693d60fe3333eee41246604eba3f154ead49917992b608e2aaeb2d84b78f2c0bf4304f9b5313a9232bdde614dc4e16a33dcd26309cb7ba649b84011cbfbf8fcc4ac4c3cd92eef96a49b25fc40568b9d697fde21775949dfa241cf7a0e6ab4ad0e2c5bcd7864909ddc8c6203f1c0af4d3463bf02a0f8ded509a66351b7fc4e9c9d98e1ec0d30d0c94dcdd43b2d861f24c943c55338c751afa17debc9c90974c5945f1c77616213aaf4e277e5fd1cd8ea61367ce3e16d34709d25a6d5b2dac50837719f842b5bb382f5595f7c68667a9ddd065d96687facbb7b936c0d788fbdf764c61e2bd39eee8cb51c60a67530333f9cc4e1a810e6e024c00fb61b3540622337d8218638d61385cd29d5a479d56b2f5c0b6ddbcf93aeefedcaafb67defdfb9290663664f43762445678e958060154e9821883b27a966e73e8e4d57defc942676cf94f68953ca880f41fec069d26d0147775c288fa2531ce7ad0de08fe0f238bee413eff2b603825c3e38dba7ff95cb64af29445431faaa602eeebac27eb7607d5de6e5f182095e37407cb59eac7059dd018bbf13270fa9ba7b07336e22c833707bf0d0002a1ed70741bce7682b8bc9cb3ebe693167c7b8678a238304463c945986a0a987bf010245350ef1f26ea7fff65fcf3191a7eb753bf4249a109d71ae1504d506f8bf425e3861e8e8804cb6b450b1f1a87444a29d46046bdce01cfe14065f0ecc834fb9dc75819ef9765bee842dcc2be8d1f219353d6a1bc01631fe95a891cbb84cb24201595e69c81c29a522d98f43770c9b1c20a42147287b48e39506a66df76fc99ef369cfa2a02cfa55f5abe40aaa3941dd91f1c67be582633a53951d873f6bbe90a4314da1e9847145ed0d580bbd0b63442e311f1684549ab0451e69a8de859ec43d684e802c7fa3e8eb4d5fc0e0b17d284316876248a187a94506294e54ddf2cdb434d0674789e9b031a35ead683949f9c118d6bbcb522cd889f6270c36ddd1f59444c98e2553a38370f80889419266840aa8a896c6fe310b3598d83bdc7272612943003f52102fc24ae1da680dde4a5ef3d"}}}}}}}, 0x0) 00:57:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x64010101}, 0x10) 00:57:04 executing program 2: syz_emit_ethernet(0x42, &(0x7f0000000200)={@link_local, @remote, @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev, {[@rr={0x7, 0x3}]}}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @multicast2}}}}}}, 0x0) 00:57:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x17, 0x0, &(0x7f0000000100)) 00:57:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0xc, &(0x7f0000000080)=@assoc_value, 0x8) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000001a00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000180)) 00:57:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x1c, 0x2, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x3}}]}, 0x1c}}, 0x0) 00:57:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000600)={'ip6tnl0\x00', &(0x7f0000000580)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x4, 0x10, @mcast1, @mcast1, 0x1, 0x8, 0x6884, 0x6}}) 00:57:04 executing program 4: openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 00:57:04 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xd, 0x2, &(0x7f0000000180)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:04 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x2142) 00:57:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @private}}}}) 00:57:04 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0xa, 0x0, &(0x7f0000000040)) 00:57:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x8, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 00:57:04 executing program 0: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@local, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x44, 0x2f, 0x0, @remote, @private2}}}}, 0x0) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000011a00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @empty}}}}) 00:57:04 executing program 3: syz_emit_ethernet(0x46, &(0x7f00000000c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "f072d3", 0x10, 0x0, 0x0, @empty, @local, {[@hopopts={0x0, 0x1, '\x00', [@generic={0x5, 0x1, "fb"}, @generic={0x0, 0x3, "60b79b"}]}]}}}}}, 0x0) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000011b00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x3b, 0x0, &(0x7f0000000040)) 00:57:04 executing program 4: syz_emit_ethernet(0x15, &(0x7f0000000080)={@random="652ab45efa6d", @empty, @val={@void}, {@x25}}, 0x0) syz_emit_ethernet(0x37, &(0x7f00000000c0)={@link_local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "d22528", 0x1, 0x62, 0x0, @remote, @private1, {[], "af"}}}}}, 0x0) 00:57:04 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={'veth1_vlan\x00', {0x2, 0x0, @rand_addr=0x64010102}}) 00:57:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x8}, 0x8) 00:57:04 executing program 2: r0 = socket(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000041e00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000001e80)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000a80)={0x1c, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x1c}}, 0x0) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000001f00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x2, 0x3, 0x3, 0x0, 0x0, {}, [@NFQA_CFG_PARAMS={0x9, 0x2, {0x3, 0x2}}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x28}}, 0x0) 00:57:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={&(0x7f00000003c0)=@newtfilter={0x1ec4, 0x2c, 0x0, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}, @filter_kind_options=@f_basic={{0xa}, {0x1e8c, 0x2, [@TCA_BASIC_ACT={0x15e8, 0x3, [@m_skbmod={0x150, 0xf, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x7}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x101}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x0, 0x81}}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x7ff}]}, {0xe6, 0x6, "6b19569c0d15a554d0d04e513972ea140c93c97c40591b52534189a8e470c23e87270da663e394b1bb17ec37f4a428c43f8a7146f9deda0854e1794b7f0c94606425878071b5b18583aec3412edd0390c0f4d5e9583eaaeb274e035627120576c2d6bb05f5ea9c44cce4e6d586da495fd809d540b92fe24886136e7b2a4ca1a19dadb06cb50ff415bfb364b74b476b533abd335d7883b8fb05847f46a770a342e100c6c7e644fda89957009c419741b8942c0ad1f6b781ba3eeeb12440cecd56f38aeed995779046e601770dc982994034b2bb41c59451e04b77cb0380137bb070bb"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}, @m_tunnel_key={0xc0, 0x0, 0x0, 0x0, {{0xf}, {0x4c, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @private0}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x6}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x6, 0x0, 0x5, 0x0, 0x8}, 0x2}}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e23}]}, {0x48, 0x6, "b4569c4fc66814b7ac89a235a9cd07c1556537a9f6d779a46fe37258683bac1a7c7614e21f838864332564d763d8eecb95f15315937c7a7db4298b86b8199fe92182dc4d"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_ct={0x78, 0x8, 0x0, 0x0, {{0x7}, {0x14, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e20}, @TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e22}]}, {0x3d, 0x6, "11ca410f1a9b2f2a0fdd7d9d4ba0ab36289f09197854ab46d8885aae79a642f4c75e865699ccaee41908f48d4ee1516f25847f3c32bdad2cc2"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_skbedit={0x1030, 0x0, 0x0, 0x0, {{0xc}, {0x4}, {0x1002, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_vlan={0x114, 0x18, 0x0, 0x0, {{0x9}, {0x70, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x0, 0x0, 0xffffffffffffffff, 0x1}}}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0xb5, 0x0, 0x0, 0x20f, 0x3}}}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x8, 0x3ff, 0x0, 0x0, 0x9}, 0x1}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x5}]}, {0x79, 0x6, "a721b0d0084d61889c10f3b8f5243ecaba7b66d5dff2dc9695e0faee5ecf2f2aa4fe8e3a692fa676b26d62c5d798ff682852dfaabe6afc9eeb88f0c552b74adac2d8078b02467e6374e21f7dfd638a3d138f25cd94d68e4cd12ee634fe9956bb08f2ee490e2e574eac4fa578ec85c5cb4d966276de"}, {0xc}, {0xc, 0x8, {0x0, 0x3}}}}, @m_vlan={0x128, 0x0, 0x0, 0x0, {{0x9}, {0x44, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{0x0, 0x0, 0x0, 0x4850d62f, 0xffff}}}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x0, 0x2, 0x0, 0x3, 0x3}}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}]}, {0xba, 0x6, "6ef45c0ed75ba3598d149fa5b436202891c27269de07843906e7d873fc5f6660ccbf2bf9a61487fb3ecb7fa021e4c75fc0915102c8b293979b34c7e69dd829d356387ea3cb256dcd806a291740949caaeca43f15f156394d88007998d7ea1c26d60a5eec93421f7e677f02b54fdf5e514df4927d382aa562daa45aa335f7a90a54182d25273cb18ebfef0304d9064382f3115594191300d2566eb61c6015eb5fadea1aa4ea6c3f95802ad0c163f04bc4b33ab2514514"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_bpf={0xf0, 0x0, 0x0, 0x0, {{0x8}, {0x64, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS={0x24, 0x4, [{0x4c4}, {0x2, 0x0, 0x0, 0x6}, {}, {0x8001, 0x8f}]}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x10001, 0x5, 0x0, 0x4}}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}]}, {0x68, 0x6, "b10fc5b0eb7fd88690ffae04dd6651a5dcd82efb5c24314ba25b5d5fff765631903d103b470566ea647dbc4f67e0ec7253865d2b9391f5054f5498758ff2b26222c52b7026958954aa63de76737324445e330255357ab5978205d15b9d019b3e2a26df13"}, {0xc}, {0xc, 0x8, {0x1}}}}]}, @TCA_BASIC_ACT={0x170, 0x3, [@m_mpls={0xbc, 0x0, 0x0, 0x0, {{0x9}, {0x4}, {0x8d, 0x6, "486e73c7949d81e16b0d701ecdf3bbd34c39f580a073ae9692e0e6e1f22036323db3271856c3b98967d6aa329bcbdcb3596ae17faf6328c0b5845080fbad0d8291fcab4de406a89754b2d796123965cb40b61d7d7296f1724d25079916ddc15707f67e38e29e10d0789e59c288ad5e2021986931f08668a6e3fa741a7f55fa32f080ff035752629f4f"}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}, @m_ipt={0x80, 0x6, 0x0, 0x0, {{0x8}, {0x54, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}]}, {0x7, 0x6, "eb663e"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_csum={0x30, 0x0, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}]}, @TCA_BASIC_EMATCHES={0x48, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x2c, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18, 0x0, 0x0, 0x0, {{0x401}, {0xffffff63, 0x0, 0x9, 0x7, 0x0, 0x0, 0x1}}}, @TCF_EM_IPSET={0x10, 0x1, 0x0, 0x0, {{0x3}, {0x4, 0x0, 0x4}}}]}, @TCA_EMATCH_TREE_LIST={0x18, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x0, 0x0, 0x0, {{}, {{}, {0x0, 0x0, 0x0, 0x1}}}}]}]}, @TCA_BASIC_ACT={0x698, 0x3, [@m_skbmod={0x658, 0x1e, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SKBMOD_SMAC={0xa}, @TCA_SKBMOD_SMAC={0xa, 0x4, @random="3a55e0b4c008"}, @TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x8}]}, {0x604, 0x6, "571eb743849aa0e127c1b333cae74a46581b26ef4f799401d08d189bd51930de039f62ce886c78c163f72f4ad1a75d111d7a2b4a887c4cccdcb9cb568ad5c3d20699d2d8c0696430090d948aaa676bfc9265d9e45d4fd0aa11a45d03b7bd88c10939886b09ff67aac5642acdc12180ddb1e2dbdbcf82da04afe66d4908a15c271dade5e3c874acda199e06c1e6e2a6ed7f9d27aa271577e9aa0f343dde88c375c41a6fbcba80c5d0f942640797e1a49a0e3bc9b7eea2d89b95a4fa860dcca58b113dcb7770af81dd187e6c9e619396668bcde1502953beebbf06bc447ac128f890763e8ee8150c4b0241313041ff4b3c690bcc97712bb2ee69077f62165cbd4eb7232982e6160754ca7d9060d9d4678a6eebd8a601d1be4ef28ee295bc4d4c24e80fdb790caee05d2ac1a9abd233ec29c6d654ac3f2905d030d7e41c6adb699372434aa2082640158bc9d2e3a94d00ca03eb02814d28b45672a94ac609b3861e780844b1619ae4fd5253e2bc26a1caf6d7d534735e7ddeaea0dbbba1271d2b3e4ec1c2469c949dedca436b7e0b370220634afcfeff751da195decc53215266baf78c6d45901984c3a76db6ebafa102b44beb0e10fea642b5cdadc7beb9e8627267f866142c0f684a3fc69ca68b0d4006e13351c050ae0d5ac7598c49c3141c594123e760cd9e5bb1f91914ba1293cee5ed3e0d410e29dd2d90a46033f32820d7682c70c96f8fe2ae28fcb6ee942b36986335bf810c9dd8eb2e230993dcf936a8702f100e1e2d271e46521a3afce28a17628c5ca2a140d0f69880a25e6bda6d4aa001b744abb2eb51be37432b41f6e57330cb3e9a59e44bdbdcf08c2bf6437557e9ba2f861bee09db1725dc15ae54fadf399ff7932bf59cb48b6beeb8d5567fcd963aa3bce0d73e41a5d0258d49852f48b97a0b4bc3e9607aa6969af553cf0909ba3622bc6764a526af296977bb8d4ff81fd170cb9460c4956704716da937630beed456180f65500819f87b88df3ac6145542d3359606131731ac0fa548e7355db4c6171934fc8826f9cd1b722b69029bf769ce0f76458705c02e57f242d60993ff5cfac7c2d3fad770f5abf71497c22f1231e45e6b482b78532283c4ba39b648d62fac2f308d7af1699bc26b27725fc275527f3962dd19e725029694fb25da1a8da11a45b7ae8cd338cab0e35db716d6566d98286f5da155593d9a5a88ff459d975a4e24b1613816596d5166ff5ecde343c1603058da3cfb6afabb9962fa78e3ef141804420c53c6763416c0ecc18046a4eae6e3e6e6a86f198aec8f69b218a18b041d137103feec43797a434354990df4bdb870e41cbb18d0f9f0722b42abc7006482d266795e17e94ac1970e732e3be12247b595ee14f1e3d599a3a60a7815d5188970c934f4dd5b9c2b1bdc4a0799a7b0c4178f529e1d04c6213cc59224fa2865ae5e28fa082f7376190694448b547e0e6cf96d0589c88537b365e0760a2a277845106dd4936a3ef0c90fd2fa40977b27effdde3de8424bf6e4858043cca1e65db24dd8be8e130139bca928ca0ac7599ae2296f95db1d7898fda40c7e8e7f03c63708b8520cc952102b2e86be98a9d256db5ac28a4c673963002d5f35063e1253d07f5e80f9824e8534b77bed12da6f4cb7b9441203eb461892829b590c21485b2e9196d13766a65db52e864f26496dca9e76f8bddfdbdcd0a47187b8ab82c72344d35eedf8d33ead0f9fc62521e466f8f7aec7022de983d70296ee8e41c47585df288dd430b9c10963e229d553328fe0634d592aae9b74f5927feae654c2cfc96c2c7b34794d476d3edcc9148a44cb983143bfed907033e4e4c33ef7507928d5267c5ebe0da3c001c0939fa78b606cfaaddc1781ecc5174e9511f60758f45e934124fa6664e210666910ef83dec30ab46c299360c44f41582bfe80315e0a235462a5fd6a6c4c12238f113ccfada1b0e725a351e3ca5febd6d4e6683c066ed87f860ce83c7cb602fcce27a0bff87c90928d325d77671e85e41930dd55079f7c8a926e67d1e63bb5f7fcef39b22f628ee1839eef372791a440b83d2dcbecbda4bbef50d730d338482e36a3cf559cee4428549cae9ae962cdfa46729a3e0811f97efc39ba1ac9a31d9a98ee586ed4e5af5b69c50e35434944ae99cc954176de"}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_tunnel_key={0x3c, 0x0, 0x0, 0x0, {{0xf}, {0xc, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}]}, {0x4}, {0xc}, {0xc}}}]}, @TCA_BASIC_ACT={0x4}, @TCA_BASIC_EMATCHES={0x4c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x4}, @TCA_EMATCH_TREE_LIST={0x3c, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x10, 0x4}, @TCF_EM_META={0x28, 0x2, 0x0, 0x0, {{}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x0, 0x20}, {0x0, 0x4, 0x1}}}, @TCA_EM_META_RVALUE={0x9, 0x3, [@TCF_META_TYPE_VAR='+', @TCF_META_TYPE_INT]}, @TCA_EM_META_RVALUE={0x4, 0x3, [@TCF_META_TYPE_VAR]}]}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7}}]}]}}]}, 0x1ec4}}, 0x20000004) 00:57:04 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x47, 0x0, &(0x7f0000000040)) 00:57:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={{0x14}, [@NFT_MSG_DELCHAIN={0x20, 0x5, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x48}}, 0x0) 00:57:04 executing program 5: syz_emit_ethernet(0x20b, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "691594", 0x0, 0x0, 0x0, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {[@routing={0x0, 0x0, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00', @loopback]}, @routing={0x0, 0x0, 0x0, 0x0, 0x0, [@loopback, @private0, @private0, @dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1, @remote, @private1, @dev, @local]}], "09e892dcb9260d566cd3acb9f6f9f58a32bf2d97b2a969670e8669ee38435129943583595effc2e7f7e85039eed8907b3cd64c5e15610d1ecc5bef87e6b2403fa15bc3244e75229e385ade4145d455f14ec26b304a70478bb7b6525d7ec6fa13"}}}}}, 0x0) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000002000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg0\x00'}) 00:57:04 executing program 3: r0 = socket(0xa, 0x3, 0x8) recvmsg$kcm(r0, &(0x7f0000001180)={0x0, 0x0, 0x0}, 0x2120) 00:57:04 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x2}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb010018000000000000009000000090000000090000000300000000000007"], &(0x7f00000003c0)=""/152, 0xb1, 0x98, 0x1}, 0x20) 00:57:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x29, 0x0, &(0x7f0000000100)) 00:57:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x4, 0x0, 0x0) 00:57:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x11, &(0x7f0000000000)="8c", 0x1) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000102000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x894c, 0x0) 00:57:04 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_mreq(r0, 0x0, 0x1a, &(0x7f0000000000)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8) 00:57:04 executing program 4: syz_emit_ethernet(0x7a, &(0x7f00000001c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x44, 0x2f, 0x0, @remote, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}}, 0x0) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000002200000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000002500000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 5: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0xe, 0x0, &(0x7f0000000140)) 00:57:04 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x20008854) 00:57:04 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0/file0\x00'}, 0x10) 00:57:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r1, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}]}, 0x24}}, 0x0) 00:57:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x34, r1, 0x1, 0x0, 0x0, {0x7}, [@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000002600000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x1}, {0x8}, {}, {0x6, 0x2}]}]}}, &(0x7f0000000300)=""/170, 0x46, 0xaa, 0x1}, 0x20) 00:57:04 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x1e}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:04 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8940, &(0x7f0000000080)) 00:57:04 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x44040) 00:57:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x0, 0x40, 0x6, 0x14}, 0x48) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000003200000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), r1) recvmsg$kcm(r0, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000000740)=""/110, 0x6e}], 0x1, &(0x7f0000001bc0)=""/95, 0x5f}, 0x0) 00:57:04 executing program 0: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000400)={'ip6gre0\x00', &(0x7f0000000380)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @mcast2, 0x0, 0xf00}}) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000013800000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:04 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x2, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0xae}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:04 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 00:57:04 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000140)=0x3000, 0x4) 00:57:04 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x142) 00:57:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000180), r0) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r2, 0x431, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 00:57:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000240)="96bca0274d7454a999f6d56ac88ed484", 0x10) 00:57:04 executing program 2: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000300)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 00:57:04 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8941, 0x0) 00:57:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000003e00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:05 executing program 4: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x30, 0x0, &(0x7f0000000140)) 00:57:05 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 00:57:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000600), r1) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x101}, 0x14}}, 0x0) 00:57:05 executing program 2: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x85) 00:57:05 executing program 0: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@local, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x44, 0x2f, 0x0, @remote, @private2, {[], {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0xff}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x68, 0x0, 0x0, 0x70bd2d, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'wg0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6tnl0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:groupadd_exec_t:s0\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x410}, 0x800) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r0, 0x1, 0x81, 0x6, @remote}, 0x14) bind$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) 00:57:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000003f00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:05 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) ioctl$sock_bt_hci(r0, 0x8b00, &(0x7f0000000080)) 00:57:05 executing program 3: setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000001c0)={0x2c, 0x0, 0x0, 0x2}, 0x8) socketpair(0x2b, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x880}, 0x4000000) socketpair(0x27, 0x0, 0x20, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$GTP_CMD_DELPDP(r1, 0x0, 0x0) accept4$inet6(r0, 0x0, 0x0, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 00:57:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000600)={'batadv_slave_1\x00'}) 00:57:05 executing program 2: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x7, 0x3, &(0x7f0000000000)=@raw=[@initr0, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x8e, &(0x7f0000000080)=""/142, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) 00:57:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000004000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000080)={0x84, @local, 0x0, 0x0, 'fo\x00'}, 0x2c) 00:57:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000004600000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:05 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x3, 0x2, &(0x7f0000000180)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:05 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x6, 0x3, &(0x7f0000000f80)=@framed, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:05 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x1ca, 0x1, 0xfff, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 00:57:05 executing program 2: unshare(0x20000) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) socketpair(0x0, 0x6, 0x7, 0x0) 00:57:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000004800000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:05 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0x7, 0x0, 0x0) 00:57:05 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x15, 0x3, &(0x7f0000000f80)=@framed, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:05 executing program 5: r0 = socket(0x11, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 00:57:05 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x30, 0x0, &(0x7f0000000040)) 00:57:05 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x5421, &(0x7f0000000040)) 00:57:05 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x2, 0x0, 0x21, 0x0, @empty, @empty}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "65aa1f", 0x0, "964434"}}}}}}, 0x0) 00:57:05 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x3e71}, 0x0) 00:57:05 executing program 2: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000400)={'ip6gre0\x00', &(0x7f0000000380)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @mcast2, 0x0, 0x7800}}) 00:57:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) 00:57:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x31, 0x0, &(0x7f0000000100)) 00:57:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000004c00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:05 executing program 0: sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, 0x0}, 0x0) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2}, 0x8) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 00:57:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x8901, &(0x7f0000000040)) 00:57:05 executing program 5: socket(0xa, 0x6, 0x4) 00:57:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000005100000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:05 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000380)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010026bd7000fddbdf250b00000006000a00ffff000008000300", @ANYRES32=r3], 0x24}}, 0x0) 00:57:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000200)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @mcast1, @loopback}}) 00:57:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)={0x30, r1, 0x205, 0x0, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x0, 0x0, 0x5}}}}, 0x30}}, 0x0) 00:57:05 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000040)={0x9, {{0x2, 0x0, @multicast1}}}, 0x108) 00:57:05 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01022cbd7000fedbdf252b0000000a0001007570616e300000000c0005000203aaaaaaaaaaaa0a0001007770616e"], 0x38}}, 0x0) 00:57:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000001e00)={0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000000a80)={0x14, 0x29, 0x201, 0x70bd2d, 0x0, "", [@nested={0x4}, @generic]}, 0x14}], 0x1, 0x0, 0x0, 0x8081}, 0x40080d4) 00:57:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001c00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000180a010400000000000000000a0000000c0005400000000000000000080007400000000008000740000000000c000380080002400000000030000000060a010200000000000000000700000008000a400000004008000a40000000000900020073797a31000000002c0e00000e0a01020000000000000000000000000900010073797a31000000000800044000000000f80d03807404008070040b800c00018008000100647570cfe5aa44444052d8006e756d67656e0000b80301800e000100696d6d656469617465000000a4030280d401028076000100669e3b58ce29694314d3a42d178e5c124b369ef6f6f1b91aadc8c6955e7131dc2d697b54bbf2dd631162c8d48dd2394539145a5117c46e086ef4e9193a7e33d8bbd94a5fabe711356d4560c460d21b6933131e8645e81ba3d915a80ed8a784e9ff3cdc9bfdff24d6ac64a8f1393d55f151d70000550001006106872d3ef958791df8855a7b9c11d77257d1b82b762f3c4cf8ca4d1e12115d3cd7a75ba19ed491868515401a1f8ac45e063dfb5c15bd7ea45bdaa33de0ee089d07e8a125e51b6595091c3ab60720686d000000a9000100107c287bb333144ccb9173ff1e8b8345eba26a0b3a376c12d5f95663688d7033e66e909b3d56233c13c7ed5a69da0aae0aa1d429e2afd10a3f1b9b527ee6174a2f9582845379894172834f8196dd3afa04e1c7b8fda69c7808c09334c29fb62d040bde0399fb1f5147a4430a0f946c2ec9174cee68e4399120d850a8c73a8cb7ca3ec5a83ffe089eb8ad6ba44d6a0c3bc0e1e6a8614983e59c2b6eb9bde540d221ced9198200000051000100fb84be8d3bb697909f3afd5cf9c5cee32ab1686d0ec2cb409f4b3fa92c6c1e9868b81e2494b64cc0fdd4eaebbf08a7a415c290a50a99bf2d95e58203350caf3e356e828332208229969f84c3f800000008000140000000004c0002804800028008000180000000000900020073797a30000000000900020073797a32000000000900020073797a30000000000900020073797a31000000000900020073797a32000000000800014000000000940002800e0001001a303f77689351b24a4a00007d0001000c8e0af6f2cb890d8a50a23e6e93b91b07bbb98b63544a2536b6244e4437e408314da63a9df8b36d4547130d599e2e0852e68d7071d9bf67d304efa4d364fe1e697a1d7668684cb28c5199bcdbc61f82f780dc9f52029d9365f103172e171c008b492dd47560437467b5258956f8d275caf1e2b6fe6b6467b9000000440002804000028008000340000100000800034000000100080001800000000008000340000000020900020073797a3000000000080001800000000008000180000000009000028089000100685db281519553cacb25b73129dc34f91c94bc294aed379ac1583f69c057715aad305bbcc7d845e45902ec512b6adcf3c048446275223e7a14366bf67f89fbbf6e40ce6531dc7e54a387423e0a3e961b80896e2dc1b37e5c8613f5f0f87529447c9a1fb1be771d5298cd8afc5dd90b7b5aa0b1ee1707a9cfdc7cc93d427c18da022682d6bb0000000800014000000000340001800b0001006e756d67656e000024000280080001400000000f080003400000000008000340000000000800024000000000100001800c000100636f756e746572001800018007000100637400000c00020000000d100001800a00010072616e67650000002c0001800a00010071756575650000001c0002800600034000010000060002400000000008000440000000034409008004000780280901803a00010087d4d5efc15cd5b3c39df41c1da3dc4c3978fe75459cac1806d0b4926c1e982fb8c7fc12c3001cf332d1932f6225bc87b9459399a0230080180002800900020073797a3100000000080003400001000104000280db000100f9dab2644e7685c88021a833ed2ecb7f1f58258d14d04f29cba0aff75f41a706549cf005090000000000000096dd9f13a78ef44df2ef8a111f92633508ac0aef3bb04b3cc2a611c493acb5bc137d58f632e7ce5c58fef64d4a3decb5034ddd7c99a00b33ae160ad20bb7a8ac81032a501fc0635e5f5e9291ea226946d7d478c9504ab4b57df0dae31bf7f6287fd02b9bea10a3fb4f6f1dfe789db79e1b02e46a456dcacf7a790074e8c8e949c1a017393280740c70b0199b3f731a0f4fc94eff991311bee2ce488800ee070100a3f422b896c3e73c2865e9effff9a538ef8ed20d0a890d77e6b2f8345701ca6ddc34fba670f805fd1c008226592c248e8de0b9972701f46a909a8c6b48b88af985c37ec1723085a6bece44bb68e26e85a4c6150a7e59f59ba26d0e4dea9dc25ba161aebd97cd731c51893ab85a549c73854311edb7a8b81d1158bd3ddaca296d651b7237b2556dc6ffbf7a60818a044da3a9446f6606a35d89d762d1594b6788db37e94efd9abb424eb1dd5c6a150e094154b84c3142c2928625b5a444400bbdb1c7ee8c7ec2508b329a2d114b52fd3bd3fa3bea53166f0542fa1605b0cd245fd26e8701d6fc033807575eac697d2fe8aceddcd90d0a87f0beeafa11688ced580964ab6df827f185ae15f4710756540b61be289e67459ea4f3c671feb6837d22412515a6e3f94a694d99759528731e6d4a296d74a4e53ea1a9350752dbec994326bd9881933ac4f58684cc5dff771bb0b60d7dc3550cd0a851a28ea74520478e2af01c20ba6f2cb1a3de4ee5d3dadfd7a5895a8870fb1ce9a11a095b608e41cb3e05626a1244bc896d3b245decd1296a156b6f0e28b7256d73ba7e81ff0521e2ecb751d264b3f992e79af6f5358e531393cb729a993a5d62541245891226298b6237869f1a8d9ac189d36ff390fa44a7f8f792dc74b67dba673f49ae89939fdab76d9a471d012d79d74db1beb232d14faff22eea5f355a95caf179c7f34051a8b1fd37918e8bfa61d3dae2f03ae85d18f3f4754f6947970e8426b3ab1023583876a62bf36de2bf9e19db8f5a477824945b73a68ab253a964058c0d8fa4783d6c6de33d7f3387b38629a67979ff833f4da6216172870a60be6199f7882a5114bea4d8c513873c49f80d3a918ea1ea59361dfcfd26a9c7e712639b12a5e79d48bc0ba130ca8175f938ea23416388841ccfabf89c8a6b07ae4d23faa76c1677cbaf2e942de23ead5ee33bb775e6636d8ac5a802c1cf2c594f9c00f5e8e093f7eaf57441890a680d56aeec8eca9fddaf99aece74253e48d3abac19461149bdba67aac26b2f4432e17d7c7ae19fcb398de04284fcdd014ec05eb650391e0b0919baac8699402b841a78a847a74de4dd014a92fd6a4969d4511e8187897e263145a50edfe280f311b9d2c9a8b237fefd0e5e2c32b1907f0adce701992fe03f286bd7f703e2747c86b58cb1bb6338760cd460e95949bc4b89ba78727123b7e205eddc49b2518f5a9a78900ed3550bffde7f5c757dcc772d5925e13cbf7f3848121e0c9a5c32a3e11ff33134acd9313b19050b92e57915d4afbf16a26ef2761c4f21c7438c437930c430fd35d1f058a6e4312781bcac5882ee0f56af85ca5ebb07abfcb5b6c4227b3f580bf27b4fdbbbbb72ce907fcecaf90684f6f8c8f6e92b2e1f7bd8b331de3782055d18e83ea4fd1be7247c16327957fc574ff036f8639ed05a6fcdf9d5cf41b548534651462f539a5c2d4e78f934d965e17cccbb8c30600a068cacca840964f66e12a755f67c0f2076ec9d0672bff4aa8f743908f261c0919ce9169acdf9ae813756bf4e4bee9372f9ba87e931cdd3b2e14b56a2352b2bb75e7d12e691db4bd6841c4c4d5314f1ca6206d03d27a1f8a13286153587001c2237b7d21ca9bfe50f18c4fa174ed980c036b3680d02bd5635c95736c0b968d5b35672787522f8495c63454049e86b76a08f6f6e65eeb6003b24ee5ecec97983f8f8f0cb5a82c0dfbf370863ea175100a560e119b1b3ebcb43276b6f8e8ef4c259032fda32af994b6fffbde11b0a5972af4bee26d050bb4a3f315281138fabbb75e69753114414b8055a3a8aa8acdfc70c5b1f18cfbba5fb9b05e4543c3927c24b8452a19001039ce6bc90695b852c0d0fa4b55b20efc25137a21b2cee66403ac98821af0935b6f1d6270bef1ba7bd9a4e72df6d1277cf476fe0eda6f86d56f7ac2da64121295d51ee2b8993fdf019082c01f17a7c30faaf9cf505a3d5cc7a46377071e6b2bd1bb3b274fc2fc86d85fe2a8164ea84ad28c9c1f7195d2af78e02eb982db64b827f440cc17b1399f93075aa1440ccc2326e8204d5d6b76400cb70637cd922c0f4485178cb33c2b4d9c95702556e6d98d1af1905a073c7e223606b1fb2fb3e4c55950bbf755c1748bfc90ec8649514534784490a86a12bd39226a994778e7a6a4980807a3c6624716b368fec9c6753ff69c703c85b0ac0550767e7720810d5ddf236e554a6f85fa318f4e2351a15d1705afa0920ddb4595f44b15a2c8a7c688cfe27455695bb036a93645b21ee0538e1828db348251841e77f468df4be3fd943e1b8848fc3263fed28c0f054da7b1e3b5503c3336bf745202d51240fb9adbcfe8694f11eae9c5a9a52db9bbc240e775871b2c54227ad0521292e179b1397feb87e5ba90118b668a8188b00fca61f17e81855312557181e49c524e7d42827275e9d7d45062021240b79f296d26a4c174a61ece984ffe16949b4f6eb8fba278a1658b6bf31c99b8a16bca320a1d21b08400aabcad517ab1dd0b0957d643bdd0a374c91e0ad50c6ea133e08c73903e5f368214abba5689b35eeeaee2e87dd68c1d5c048863ad0bef4d8ae070d475422c289c8be7a0cbf1586ed98da4de564f4478009a66a08ddbed063b8b761a51bb14db948486776a916ce92154ed941b842167cf63b920d83b0c0eec74652e814d60e94e9dd53897418637814ea0c75a67b0b1f3ef1ea7fc4d453ca4c3b60c8c414ceabc0d8cc9439da8bc0da8ca523ded317ac0f6288ed4d16c9addec37c897a81aa7587c6cb89efbfafd5ff10382ea3e84041456a435cafeb160f62ce51e8c5a2a457584d1a3a0bc4f6f085bf2a064450ffd466149f5d802ea9d6cf000014000b80100001800a0001006d61746368000000380000800c00054000000000000000002800018024000280080003400000000008000180fffffffc08000180ffffffff0800018000000000040000800900010073797a3000000000140000001100010000000000000000000000000ad8"], 0xec0}}, 0x0) 00:57:05 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x3, 0xf1, &(0x7f0000000140)=""/241, 0x0, 0x12, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:05 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)=@abs={0x1}, 0x6e, 0x0, 0x0, 0x0, 0x38}, 0x0) ioctl$sock_bt_hci(r0, 0x8901, &(0x7f0000000080)) 00:57:05 executing program 0: r0 = socket(0x22, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[], 0x258}, 0x0) 00:57:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000005500000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:05 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x5, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x76}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:05 executing program 5: r0 = socket(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000000)=@pppol2tp, 0x80, 0x0}, 0x0) 00:57:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffffaa5500000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:05 executing program 0: syz_emit_ethernet(0x52, &(0x7f00000001c0)={@remote, @dev, @val={@void, {0x806}}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "9a6999", 0x18, 0x3a, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}}}}, 0x0) 00:57:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x19, 0x0, &(0x7f00000007c0)) 00:57:05 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xb, 0x2, &(0x7f0000000180)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) 00:57:05 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x5, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0xae}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:05 executing program 0: syz_emit_ethernet(0x15, &(0x7f0000000080)={@random="652ab45efa6d", @empty, @val={@void}, {@x25={0x8864}}}, 0x0) [ 3418.805886][T14634] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 00:57:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x14, r1, 0x305}, 0x14}}, 0x0) 00:57:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={&(0x7f00000003c0)=@newtfilter={0x1ec4, 0x2c, 0x0, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}, @filter_kind_options=@f_basic={{0xa}, {0x1e8c, 0x2, [@TCA_BASIC_ACT={0x15e8, 0x3, [@m_skbmod={0x150, 0x0, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_PARMS={0x24}, @TCA_SKBMOD_ETYPE={0x6}]}, {0xe5, 0x6, "6b19569c0d15a554d0d04e513972ea140c93c97c40591b52534189a8e470c23e87270da663e394b1bb17ec37f4a428c43f8a7146f9deda0854e1794b7f0c94606425878071b5b18583aec3412edd0390c0f4d5e9583eaaeb274e035627120576c2d6bb05f5ea9c44cce4e6d586da495fd809d540b92fe24886136e7b2a4ca1a19dadb06cb50ff415bfb364b74b476b533abd335d7883b8fb05847f46a770a342e100c6c7e644fda89957009c419741b8942c0ad1f6b781ba3eeeb12440cecd56f38aeed995779046e601770dc982994034b2bb41c59451e04b77cb0380137bb070"}, {0xc}, {0xc}}}, @m_tunnel_key={0xc0, 0x0, 0x0, 0x0, {{0xf}, {0x4c, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @private0}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}, @TCA_TUNNEL_KEY_PARMS={0x1c}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}]}, {0x45, 0x6, "b4569c4fc66814b7ac89a235a9cd07c1556537a9f6d779a46fe37258683bac1a7c7614e21f838864332564d763d8eecb95f15315937c7a7db4298b86b8199fe921"}, {0xc}, {0xc}}}, @m_ct={0x78, 0x0, 0x0, 0x0, {{0x7}, {0x14, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MAX={0x6}, @TCA_CT_NAT_PORT_MAX={0x6}]}, {0x3d, 0x6, "11ca410f1a9b2f2a0fdd7d9d4ba0ab36289f09197854ab46d8885aae79a642f4c75e865699ccaee41908f48d4ee1516f25847f3c32bdad2cc2"}, {0xc}, {0xc}}}, @m_skbedit={0x1030, 0x0, 0x0, 0x0, {{0xc}, {0x4}, {0x1001, 0x6, "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"}, {0xc}, {0xc}}}, @m_vlan={0x114, 0x0, 0x0, 0x0, {{0x9}, {0x70, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6}, @TCA_VLAN_PARMS={0x1c}, @TCA_VLAN_PARMS={0x1c}, @TCA_VLAN_PARMS={0x1c}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}]}, {0x79, 0x6, "a721b0d0084d61889c10f3b8f5243ecaba7b66d5dff2dc9695e0faee5ecf2f2aa4fe8e3a692fa676b26d62c5d798ff682852dfaabe6afc9eeb88f0c552b74adac2d8078b02467e6374e21f7dfd638a3d138f25cd94d68e4cd12ee634fe9956bb08f2ee490e2e574eac4fa578ec85c5cb4d966276de"}, {0xc}, {0xc}}}, @m_vlan={0x128, 0x0, 0x0, 0x0, {{0x9}, {0x44, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c}, @TCA_VLAN_PARMS={0x1c}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}]}, {0xb9, 0x6, "6ef45c0ed75ba3598d149fa5b436202891c27269de07843906e7d873fc5f6660ccbf2bf9a61487fb3ecb7fa021e4c75fc0915102c8b293979b34c7e69dd829d356387ea3cb256dcd806a291740949caaeca43f15f156394d88007998d7ea1c26d60a5eec93421f7e677f02b54fdf5e514df4927d382aa562daa45aa335f7a90a54182d25273cb18ebfef0304d9064382f3115594191300d2566eb61c6015eb5fadea1aa4ea6c3f95802ad0c163f04bc4b33ab25145"}, {0xc}, {0xc}}}, @m_bpf={0xf0, 0x0, 0x0, 0x0, {{0x8}, {0x64, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS={0x24, 0x4, [{}, {}, {}, {}]}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}]}, {0x65, 0x6, "b10fc5b0eb7fd88690ffae04dd6651a5dcd82efb5c24314ba25b5d5fff765631903d103b470566ea647dbc4f67e0ec7253865d2b9391f5054f5498758ff2b26222c52b7026958954aa63de76737324445e330255357ab5978205d15b9d019b3e2a"}, {0xc}, {0xc}}}]}, @TCA_BASIC_ACT={0x170, 0x3, [@m_mpls={0xbc, 0x0, 0x0, 0x0, {{0x9}, {0x4}, {0x8d, 0x6, "486e73c7949d81e16b0d701ecdf3bbd34c39f580a073ae9692e0e6e1f22036323db3271856c3b98967d6aa329bcbdcb3596ae17faf6328c0b5845080fbad0d8291fcab4de406a89754b2d796123965cb40b61d7d7296f1724d25079916ddc15707f67e38e29e10d0789e59c288ad5e2021986931f08668a6e3fa741a7f55fa32f080ff035752629f4f"}, {0xc}, {0xc}}}, @m_ipt={0x80, 0x0, 0x0, 0x0, {{0x8}, {0x54, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}]}, {0x5, 0x6, "eb"}, {0xc}, {0xc}}}, @m_csum={0x30, 0x0, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}, @TCA_BASIC_EMATCHES={0x48, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x2c, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18}, @TCF_EM_IPSET={0x10}]}, @TCA_EMATCH_TREE_LIST={0x18, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14}]}]}, @TCA_BASIC_ACT={0x698, 0x3, [@m_skbmod={0x658, 0x0, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SKBMOD_SMAC={0xa}, @TCA_SKBMOD_SMAC={0xa, 0x4, @random="3a55e0b4c008"}, @TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_ETYPE={0x6}]}, {0x601, 0x6, "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"}, {0xc}, {0xc}}}, @m_tunnel_key={0x3c, 0x0, 0x0, 0x0, {{0xf}, {0xc, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}]}, {0x4}, {0xc}, {0xc}}}]}, @TCA_BASIC_ACT={0x4}, @TCA_BASIC_EMATCHES={0x4c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x4}, @TCA_EMATCH_TREE_LIST={0x3c, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x10}, @TCF_EM_META={0x28, 0x0, 0x0, 0x0, {{}, [@TCA_EM_META_HDR={0xc}, @TCA_EM_META_RVALUE={0x9, 0x3, [@TCF_META_TYPE_VAR='+', @TCF_META_TYPE_INT]}, @TCA_EM_META_RVALUE={0x4}]}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x1ec4}}, 0x0) 00:57:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x0, 0x0, 0x0, 0x1240}, 0x48) 00:57:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000600), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x20, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x20}}, 0x0) 00:57:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000006000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:05 executing program 4: socket(0x2b, 0x1, 0x9) 00:57:05 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r2, 0x1, {0x0, 0xff}}, 0x18) 00:57:05 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r0) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x1c}}, 0x0) 00:57:05 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) 00:57:05 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x7, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_idx_val, @func]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xf2, &(0x7f00000000c0)=""/242, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000006800000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8953, &(0x7f0000000440)={'gre0\x00', 0x0}) 00:57:06 executing program 5: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@broadcast, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x44, 0x3b, 0x0, @remote, @private2}}}}, 0x0) 00:57:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:57:06 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x1c, 0x0, &(0x7f0000000040)) 00:57:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x18, 0x3, 0x1, 0x301, 0x0, 0x0, {}, [@CTA_FILTER={0x4}]}, 0x18}}, 0x0) 00:57:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000026a00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:06 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8953, &(0x7f0000000040)) 00:57:06 executing program 4: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3, 0x1c) r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x5411, &(0x7f0000000040)) 00:57:06 executing program 2: ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', 0x0}) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) 00:57:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x24, &(0x7f0000000040)=[@in], 0x10) 00:57:06 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000005c0)) 00:57:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000006c00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:06 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8902, &(0x7f0000000000)="0ab80d94") 00:57:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000007400000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:06 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000005c0), r0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x14, r2, 0xc21, 0x0, 0x0, {0x28}}, 0x14}}, 0x0) 00:57:06 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x89a0, &(0x7f0000000000)='/') 00:57:06 executing program 5: setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000000)=[{}], 0x8) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000004100)) 00:57:06 executing program 2: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0xa, 0x0, &(0x7f0000000140)) 00:57:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000037900000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:06 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, 0x24) 00:57:06 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x1, &(0x7f0000000480)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000500)='GPL\x00', 0x6, 0x93, &(0x7f0000000540)=""/147, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r1, 0x407}, 0x14}}, 0x0) 00:57:06 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f00000000c0)=@id, 0x10) 00:57:06 executing program 2: socketpair(0x0, 0x100000, 0x0, 0x0) 00:57:06 executing program 3: socket$inet6(0xa, 0x5, 0x76) r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000300)={'nat\x00', 0x2, [{}, {}]}, 0x48) socket$inet6(0xa, 0x0, 0x0) 00:57:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000007a00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:06 executing program 0: r0 = socket(0x22, 0x2, 0x3) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x7) 00:57:06 executing program 5: r0 = socket(0x11, 0x3, 0x0) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 00:57:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local}, 0x10) 00:57:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000008400000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:06 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000600), r1) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x30, r2, 0x101, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5}]}, 0x30}}, 0x0) 00:57:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8912, &(0x7f0000000440)={'gre0\x00', 0x0}) 00:57:06 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000600)={'ip6tnl0\x00', &(0x7f0000000580)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast1}}) 00:57:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x11c7731778f011d9, 0x0, 0x0, {}, [@L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_OFFSET={0x6}]}, 0x24}}, 0x0) 00:57:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8922, &(0x7f0000000440)={'gre0\x00', 0x0}) 00:57:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={&(0x7f00000003c0)=@newtfilter={0x1ec4, 0x2c, 0x0, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}, @filter_kind_options=@f_basic={{0xa}, {0x1e8c, 0x2, [@TCA_BASIC_ACT={0x15f0, 0x3, [@m_skbmod={0x150, 0x0, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_PARMS={0x24}, @TCA_SKBMOD_ETYPE={0x6}]}, {0xe5, 0x6, "6b19569c0d15a554d0d04e513972ea140c93c97c40591b52534189a8e470c23e87270da663e394b1bb17ec37f4a428c43f8a7146f9deda0854e1794b7f0c94606425878071b5b18583aec3412edd0390c0f4d5e9583eaaeb274e035627120576c2d6bb05f5ea9c44cce4e6d586da495fd809d540b92fe24886136e7b2a4ca1a19dadb06cb50ff415bfb364b74b476b533abd335d7883b8fb05847f46a770a342e100c6c7e644fda89957009c419741b8942c0ad1f6b781ba3eeeb12440cecd56f38aeed995779046e601770dc982994034b2bb41c59451e04b77cb0380137bb070"}, {0xc}, {0xc}}}, @m_tunnel_key={0xc0, 0x0, 0x0, 0x0, {{0xf}, {0x4c, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @private0}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}, @TCA_TUNNEL_KEY_PARMS={0x1c}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}]}, {0x45, 0x6, "b4569c4fc66814b7ac89a235a9cd07c1556537a9f6d779a46fe37258683bac1a7c7614e21f838864332564d763d8eecb95f15315937c7a7db4298b86b8199fe921"}, {0xc}, {0xc}}}, @m_ct={0x78, 0x0, 0x0, 0x0, {{0x7}, {0x14, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MAX={0x6}, @TCA_CT_NAT_PORT_MAX={0x6}]}, {0x3d, 0x6, "11ca410f1a9b2f2a0fdd7d9d4ba0ab36289f09197854ab46d8885aae79a642f4c75e865699ccaee41908f48d4ee1516f25847f3c32bdad2cc2"}, {0xc}, {0xc}}}, @m_skbedit={0x1030, 0x0, 0x0, 0x0, {{0xc}, {0x4}, {0x1001, 0x6, "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"}, {0xc}, {0xc}}}, @m_vlan={0x114, 0x0, 0x0, 0x0, {{0x9}, {0x70, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6}, @TCA_VLAN_PARMS={0x1c}, @TCA_VLAN_PARMS={0x1c}, @TCA_VLAN_PARMS={0x1c}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}]}, {0x79, 0x6, "a721b0d0084d61889c10f3b8f5243ecaba7b66d5dff2dc9695e0faee5ecf2f2aa4fe8e3a692fa676b26d62c5d798ff682852dfaabe6afc9eeb88f0c552b74adac2d8078b02467e6374e21f7dfd638a3d138f25cd94d68e4cd12ee634fe9956bb08f2ee490e2e574eac4fa578ec85c5cb4d966276de"}, {0xc}, {0xc}}}, @m_vlan={0x128, 0x0, 0x0, 0x0, {{0x9}, {0x44, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c}, @TCA_VLAN_PARMS={0x1c}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}]}, {0xb9, 0x6, "6ef45c0ed75ba3598d149fa5b436202891c27269de07843906e7d873fc5f6660ccbf2bf9a61487fb3ecb7fa021e4c75fc0915102c8b293979b34c7e69dd829d356387ea3cb256dcd806a291740949caaeca43f15f156394d88007998d7ea1c26d60a5eec93421f7e677f02b54fdf5e514df4927d382aa562daa45aa335f7a90a54182d25273cb18ebfef0304d9064382f3115594191300d2566eb61c6015eb5fadea1aa4ea6c3f95802ad0c163f04bc4b33ab25145"}, {0xc}, {0xc}}}, @m_bpf={0xf8, 0x0, 0x0, 0x0, {{0x8}, {0x6c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{}, {}, {}, {}, {}]}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}]}, {0x65, 0x6, "b10fc5b0eb7fd88690ffae04dd6651a5dcd82efb5c24314ba25b5d5fff765631903d103b470566ea647dbc4f67e0ec7253865d2b9391f5054f5498758ff2b26222c52b7026958954aa63de76737324445e330255357ab5978205d15b9d019b3e2a"}, {0xc}, {0xc}}}]}, @TCA_BASIC_ACT={0x170, 0x3, [@m_mpls={0xbc, 0x0, 0x0, 0x0, {{0x9}, {0x4}, {0x8d, 0x6, "486e73c7949d81e16b0d701ecdf3bbd34c39f580a073ae9692e0e6e1f22036323db3271856c3b98967d6aa329bcbdcb3596ae17faf6328c0b5845080fbad0d8291fcab4de406a89754b2d796123965cb40b61d7d7296f1724d25079916ddc15707f67e38e29e10d0789e59c288ad5e2021986931f08668a6e3fa741a7f55fa32f080ff035752629f4f"}, {0xc}, {0xc}}}, @m_ipt={0x80, 0x0, 0x0, 0x0, {{0x8}, {0x54, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}]}, {0x5, 0x6, "eb"}, {0xc}, {0xc}}}, @m_csum={0x30, 0x0, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}, @TCA_BASIC_EMATCHES={0x48, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x2c, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18}, @TCF_EM_IPSET={0x10}]}, @TCA_EMATCH_TREE_LIST={0x18, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14}]}]}, @TCA_BASIC_ACT={0x698, 0x3, [@m_skbmod={0x658, 0x0, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SKBMOD_SMAC={0xa}, @TCA_SKBMOD_SMAC={0xa, 0x4, @random="3a55e0b4c008"}, @TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_ETYPE={0x6}]}, {0x601, 0x6, "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"}, {0xc}, {0xc}}}, @m_tunnel_key={0x3c, 0x0, 0x0, 0x0, {{0xf}, {0xc, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}]}, {0x4}, {0xc}, {0xc}}}]}, @TCA_BASIC_ACT={0x4}, @TCA_BASIC_EMATCHES={0x44, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x4}, @TCA_EMATCH_TREE_LIST={0x3c, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x10}, @TCF_EM_META={0x28, 0x0, 0x0, 0x0, {{}, [@TCA_EM_META_HDR={0xc}, @TCA_EM_META_RVALUE={0x9, 0x3, [@TCF_META_TYPE_VAR='+', @TCF_META_TYPE_INT]}, @TCA_EM_META_RVALUE={0x4}]}}]}]}]}}]}, 0x1ec4}}, 0x0) [ 3419.212518][T14743] device team0 entered promiscuous mode [ 3419.212532][T14743] device team_slave_0 entered promiscuous mode [ 3419.212586][T14743] device team_slave_1 entered promiscuous mode 00:57:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x85, 0x0, &(0x7f0000000180)=0x300) 00:57:06 executing program 2: socket$inet_mptcp(0x2, 0x1, 0x106) syz_genetlink_get_family_id$gtp(&(0x7f00000004c0), 0xffffffffffffffff) 00:57:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffffff8c00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:06 executing program 5: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, &(0x7f0000000700)) 00:57:06 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x127000, 0x0) 00:57:06 executing program 4: syz_genetlink_get_family_id$team(&(0x7f0000001600), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'batadv_slave_0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) 00:57:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[], 0x38}, 0x0) 00:57:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000019400000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000300)=""/170, 0x2e, 0xaa, 0x1}, 0x20) 00:57:06 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000000)=@raw=[@jmp], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:06 executing program 0: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, &(0x7f0000000400)={'ip6gre0\x00', &(0x7f0000000380)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @mcast2}}) [ 3419.212751][T14736] device team0 left promiscuous mode [ 3419.212761][T14736] device team_slave_0 left promiscuous mode [ 3419.212889][T14736] device team_slave_1 left promiscuous mode 00:57:06 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x15, &(0x7f0000000140), 0x4) 00:57:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13}, 0x48) 00:57:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000039400000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:06 executing program 5: r0 = socket(0x2, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000002140)={&(0x7f00000001c0)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000001840)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}, 0x0) 00:57:06 executing program 0: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x17, 0x0, &(0x7f0000000140)) 00:57:06 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f0000000000)=@raw=[@exit, @initr0, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000140)='syzkaller\x00', 0x3, 0x96, &(0x7f0000000280)=""/150, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:06 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) getsockopt$inet_tcp_int(r0, 0x6, 0x24, 0x0, &(0x7f0000000000)=0xffffffffffffffc5) 00:57:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @dev}, 0x10) 00:57:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000b100000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:06 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000f40), 0x4) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000000), 0x10) 00:57:06 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum]}, {0x0, [0x0]}}, &(0x7f00000002c0)=""/3, 0x27, 0x3, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x1ca, 0x1, 0xfff, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x3, 0x4}, 0x48) socketpair(0x0, 0x0, 0x4, &(0x7f0000000580)) 00:57:06 executing program 3: r0 = socket(0x18, 0x0, 0x2) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 00:57:06 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000040)={@empty, @multicast, @void, {@mpls_mc={0x8848, {[], @ipv6=@gre_packet={0x0, 0x6, "d13a14", 0x44, 0x2f, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local}}}}}, 0x0) 00:57:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003b100000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:06 executing program 3: socketpair(0x2b, 0x80002, 0x0, &(0x7f0000000200)) 00:57:07 executing program 5: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x29, 0x0, &(0x7f0000000140)) 00:57:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x0, 0x1118}, 0x48) 00:57:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x1ca, 0x1, 0xfff, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x48) 00:57:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003bc00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="0000a86bed61c013b91fde338c2f617b331f2a19e9"]}) 00:57:07 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) getsockopt$inet_tcp_int(r0, 0x11e, 0x0, 0x0, 0x0) 00:57:07 executing program 3: syz_emit_ethernet(0x15, &(0x7f0000000080)={@random="652ab45efa6d", @empty, @val={@void}, {@x25}}, 0x0) syz_emit_ethernet(0x86, &(0x7f00000000c0)={@link_local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "d22528", 0x50, 0x0, 0x0, @remote, @private1, {[@routing={0x2c, 0x8, 0x2, 0x3f, 0x0, [@mcast1, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @local}]}], "afa3e91b54ac53ba"}}}}}, 0x0) 00:57:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @empty}, 0x10) 00:57:07 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x13, 0x0, &(0x7f0000000040)) 00:57:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000001be00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0xe, 0x0, &(0x7f0000000100)) 00:57:07 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x18, 0x2, &(0x7f0000000180)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:07 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@loopback, @in=@private}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xffffffffffffff69) 00:57:07 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000040)={0x0, 'gretap0\x00', {}, 0x6}) getsockopt$inet_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) 00:57:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000edc000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0xe, 0x0, &(0x7f0000000180)=0x300) 00:57:07 executing program 4: unshare(0x4040400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x7, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@map_fd={0x18, 0x0, 0x1, 0x0, r1}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003c100000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x15}, 0x48) 00:57:07 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_CHANNEL={0x5}, @IEEE802154_ATTR_COORD_PAN_ID={0x6}]}, 0x30}}, 0x0) 00:57:07 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x7d, &(0x7f0000000040)=[@in], 0x10) 00:57:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={&(0x7f00000003c0)=@newtfilter={0xec4, 0x2c, 0x0, 0x0, 0x0, {}, [@TCA_CHAIN={0x8, 0xb, 0x3}, @filter_kind_options=@f_basic={{0xa}, {0xe8c, 0x2, [@TCA_BASIC_ACT={0xe84, 0x3, [@m_skbmod={0x150, 0xf, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_PARMS={0x24}, @TCA_SKBMOD_ETYPE={0x6}]}, {0xe5, 0x6, "6b19569c0d15a554d0d04e513972ea140c93c97c40591b52534189a8e470c23e87270da663e394b1bb17ec37f4a428c43f8a7146f9deda0854e1794b7f0c94606425878071b5b18583aec3412edd0390c0f4d5e9583eaaeb274e035627120576c2d6bb05f5ea9c44cce4e6d586da495fd809d540b92fe24886136e7b2a4ca1a19dadb06cb50ff415bfb364b74b476b533abd335d7883b8fb05847f46a770a342e100c6c7e644fda89957009c419741b8942c0ad1f6b781ba3eeeb12440cecd56f38aeed995779046e601770dc982994034b2bb41c59451e04b77cb0380137bb070"}, {0xc}, {0xc}}}, @m_tunnel_key={0xc0, 0x7, 0x0, 0x0, {{0xf}, {0x4c, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @private0}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x0, 0x0, 0x5, 0x0, 0x8}}}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}]}, {0x45, 0x6, "b4569c4fc66814b7ac89a235a9cd07c1556537a9f6d779a46fe37258683bac1a7c7614e21f838864332564d763d8eecb95f15315937c7a7db4298b86b8199fe921"}, {0xc}, {0xc}}}, @m_ct={0x78, 0x8, 0x0, 0x0, {{0x7}, {0x14, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MAX={0x6}, @TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e22}]}, {0x3d, 0x6, "11ca410f1a9b2f2a0fdd7d9d4ba0ab36289f09197854ab46d8885aae79a642f4c75e865699ccaee41908f48d4ee1516f25847f3c32bdad2cc2"}, {0xc}, {0xc}}}, @m_skbedit={0xbf8, 0x0, 0x0, 0x0, {{0xc}, {0x4}, {0xbc9, 0x6, "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"}, {0xc, 0x7, {0x1}}, {0xc}}}]}, @TCA_BASIC_ACT={0x4}]}}]}, 0xec4}}, 0x20000004) 00:57:07 executing program 0: r0 = socket(0xa, 0x3, 0x8) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, 0x0, 0x0) 00:57:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffffffc900000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x4c, 0x2, 0x6, 0x10b, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 00:57:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000500), r0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000bc0)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000b40)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 00:57:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x34, r1, 0x1, 0x0, 0x0, {}, [@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) 00:57:07 executing program 0: bpf$PROG_LOAD(0x10, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:07 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, 0x0, 0x0) 00:57:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003d000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x14}, 0xfffffdef}}, 0x0) 00:57:07 executing program 0: syz_emit_ethernet(0xe81, &(0x7f0000000040)={@empty, @multicast, @void, {@mpls_mc={0x8848, {[], @ipv6=@gre_packet={0x0, 0x6, "d13a14", 0xe4b, 0x2f, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0xcce, 0x0, [], "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"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "264d8baad5924235e4419dc1a695e530152c0dc6f6f1039680a65651de684d7f8c05a7de42d898b433c023e0d6f38a107469cf83f37cf092e5"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0, 0x0, 0x0], "68adec4b708d2bea1fa57c739f6cb7e63e474a9af2960dd7f252e2540752eb4643cdafaf996cefe7f47adc8e80384f515df17ce8b7ca15f5899084681b676102b867a7fe2330fee8efbc35fdc214932b9e12e36d3a4d60810c448125bde9e985687c76190b5ef81cf7cc8bbacc1cacd1f54188d162c15aa5440b0dc4415d8d15ceaa2302b126ecbfa1cb0801784c1a4cea036ea125047e3537416e0eedb7d39a0672781f71110b71615bc8a5e9727b9540e089ee4b98f9414e5e38e820ddce473531cb9ee89a648352273e1135975f8546dce30796dc722af47302af506b9716259c683b24e0217ef9149bed70"}, {}, {}, {0x8, 0x6558, 0x0, "b0c6f3427a9df9bdbeff4ecb27"}}}}}}}}, 0x0) 00:57:07 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @dccp={{0x10, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x21, 0x0, @empty, @empty, {[@generic={0x0, 0xa, "954d3b34d34624d7"}, @timestamp={0x44, 0x8, 0x0, 0x0, 0x0, [0x0]}, @ssrr={0x89, 0x3}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}, @end, @generic={0x0, 0x7, "e62a9721c6"}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "65aa1f", 0x0, "964434"}}}}}}, 0x0) 00:57:07 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f00000003c0)={'ip6tnl0\x00', 0x0}) 00:57:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffffffda00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:07 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x89a0, 0x0) 00:57:07 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x29}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:07 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x1c, 0x3, &(0x7f0000000f80)=@framed, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:07 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x17, 0x2, &(0x7f0000000180)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:07 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x7, 0x4, &(0x7f0000000180)=@framed={{}, [@ldst={0x2, 0x0, 0x3, 0x0, 0xb}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffffffe200000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:07 executing program 3: r0 = socket(0x2, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000002140)={&(0x7f00000001c0)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000001840)=[{0x0}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x2}, 0x0) 00:57:07 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="181f00005bd5dbe2e570de"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000080)=""/183, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xf, 0x4, 0x0, 0x7000000}, 0x48) 00:57:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x1}]}}, &(0x7f0000000080)=""/248, 0x26, 0xf8, 0x1}, 0x20) 00:57:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x1b, 0x6}, 0x48) 00:57:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) 00:57:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000002e400000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:07 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$NL80211_CMD_ABORT_SCAN(0xffffffffffffffff, 0x0, 0x0) 00:57:07 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x2, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x43}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:07 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000300)) 00:57:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000002e500000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x5452, &(0x7f0000000100)={'gre0\x00', 0x0}) 00:57:08 executing program 3: r0 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000780)={'wlan1\x00'}) 00:57:08 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0xa, &(0x7f0000000000), 0x4) 00:57:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) 00:57:08 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x1e}, 0x57, &(0x7f0000000080)={0x0}}, 0x0) 00:57:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000002e600000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:08 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000600), r1) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x40, r2, 0x101, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_ENABLED={0x5}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_KEY_ID, @IEEE802154_ATTR_LLSEC_SECLEVEL={0xffffff74}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8}]}, 0x40}}, 0x0) 00:57:08 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:57:08 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x64, &(0x7f0000000080)=@assoc_value, 0x8) 00:57:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000002e700000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x34, r1, 0x1, 0x0, 0x0, {}, [@nsim={{0xe, 0x300}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) 00:57:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000240)={&(0x7f0000000000), 0x0, &(0x7f0000000200)={&(0x7f0000000d00)={0x104, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x104}}, 0x0) 00:57:08 executing program 3: sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_ABORT_SCAN(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000014c0), 0xffffffffffffffff) 00:57:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffffff000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x19, &(0x7f0000000080)=@assoc_value, 0x8) 00:57:08 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8982, &(0x7f0000000000)="06") 00:57:08 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, 0x0, 0x0) [ 3421.345900][T14930] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 00:57:08 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, 0x0, &(0x7f0000000300)) 00:57:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000001f400000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x33fe0}}, 0x0) 00:57:08 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) getsockopt$inet_tcp_int(r0, 0x6, 0x24, 0x0, &(0x7f00000001c0)) 00:57:08 executing program 2: r0 = socket(0x2, 0x3, 0x7) syz_genetlink_get_family_id$tipc(&(0x7f0000000300), r0) 00:57:08 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000040)=0xfffffffffffffdee) 00:57:08 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x1d, &(0x7f0000000140), 0x4) 00:57:08 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0xf000}, 0x0) 00:57:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffffff600000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000800)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}}, 0x24}}, 0x0) 00:57:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}}) 00:57:08 executing program 2: socketpair(0x28, 0x0, 0x7ff, &(0x7f0000000780)) 00:57:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001480)={'ip6gre0\x00', 0x0}) 00:57:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000002f900000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:08 executing program 4: socketpair(0x11, 0xa, 0x0, &(0x7f0000000240)) 00:57:08 executing program 0: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x15, 0x0, &(0x7f0000000140)) 00:57:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x14, 0xf, 0x6, 0x101}, 0x14}}, 0x0) 00:57:08 executing program 5: r0 = socket(0x1, 0x5, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x7ffffffff000}}, 0x0) 00:57:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) 00:57:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89a0, &(0x7f0000000440)={'gre0\x00', 0x0}) 00:57:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffffdf900000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:08 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x401c5820, &(0x7f0000000040)) 00:57:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000480)={&(0x7f0000000000)=@in={0x2, 0x4e23, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x45}}], 0x30}, 0x0) 00:57:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x34, r1, 0x1, 0x0, 0x0, {0x8}, [@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) 00:57:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x10021) 00:57:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffffffb00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:08 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) 00:57:08 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) 00:57:08 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0, 0xf0ff7f}}, 0x0) 00:57:08 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8916, &(0x7f0000000040)) 00:57:09 executing program 4: syz_emit_ethernet(0x96, &(0x7f0000000080)={@broadcast, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x5c, 0x2c, 0x0, @remote, @private2, {[@hopopts={0x0, 0x1, '\x00', [@generic={0x0, 0x8, "9377143464d0a15c"}]}]}}}}}, 0x0) 00:57:09 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000600), r1) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="11000000", @ANYRES16=r2, @ANYBLOB="01"], 0x14}}, 0x0) 00:57:09 executing program 2: setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffffdfd00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:09 executing program 0: r0 = socket(0xa, 0x3, 0x8) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000000c0)={@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x0, @loopback}}}, {0x0}, 0x0}, 0xa0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x890c, &(0x7f0000000080)={'batadv_slave_1\x00'}) 00:57:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x1002}, 0x4) syz_genetlink_get_family_id$mptcp(&(0x7f0000001100), 0xffffffffffffffff) 00:57:09 executing program 5: socketpair(0x10, 0x0, 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$team(&(0x7f0000001600), 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000001f80), 0xffffffffffffffff) 00:57:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x8916, &(0x7f0000000040)) 00:57:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r0, 0x0, 0x0, 0x80c00) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffffffe00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:09 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) 00:57:09 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000600)={'ip6tnl0\x00', &(0x7f0000000580)={'syztnl0\x00', 0x0, 0x0, 0xe5, 0x1, 0x4, 0x10, @mcast1, @mcast1, 0x1, 0x8, 0x6884, 0x6}}) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000fff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:09 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x6, 0x3f800, &(0x7f0000000f80)=@framed={{}, [@ldst, @func, @btf_id]}, &(0x7f0000000940)='GPL\x00', 0x0, 0xfffffffffffffeda, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:09 executing program 3: r0 = socket(0x25, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000400)={'ip6gre0\x00', &(0x7f0000000380)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @mcast2}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) 00:57:09 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @dccp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @empty, @empty, {[@ssrr={0x89, 0x2}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "65aa1f", 0x0, "964434"}}}}}}, 0x0) 00:57:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000000080)) 00:57:09 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000240)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "896999", 0x18, 0x3a, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}}}}, 0x0) 00:57:09 executing program 2: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x32, 0x0, &(0x7f0000000140)) 00:57:09 executing program 3: socketpair(0x0, 0x4, 0x2dad, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, 0x0, &(0x7f0000000680)) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000e80), r0) 00:57:09 executing program 0: r0 = socket(0x2, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@rdma_dest={0x18}, @mask_fadd={0x58, 0x114, 0x8, {{}, 0x0, 0x0}}], 0x70}, 0x0) 00:57:09 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x19, 0x0, &(0x7f0000000040)) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffffefff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000002a09b"], 0x28}}, 0x0) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffffbff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:09 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff}, 0x6) bind$bt_hci(r0, &(0x7f0000000040), 0x6) 00:57:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x6, 0x4) 00:57:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00100006"]}) 00:57:09 executing program 3: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x31, 0x0, &(0x7f0000000140)) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000003ffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:09 executing program 2: socketpair(0x10, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$team(0x0, r1) syz_genetlink_get_family_id$team(&(0x7f0000001f80), r0) 00:57:09 executing program 3: r0 = socket(0xa, 0x3, 0x8) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000000c0)={@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x0, @loopback}}}, {0x0}, 0x0}, 0xa0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x890b, &(0x7f0000000080)={'batadv_slave_1\x00'}) 00:57:09 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$tipc(&(0x7f0000001240), 0xffffffffffffffff) 00:57:09 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x89e1, 0x0) 00:57:09 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x36}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00001fffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:09 executing program 3: syz_emit_ethernet(0xfc0, &(0x7f00000003c0)={@link_local, @local, @void, {@mpls_mc={0x8848, {[], @ipv4=@igmp={{0x5, 0x4, 0x0, 0x0, 0xfb2, 0x0, 0x0, 0x0, 0x2, 0x0, @multicast1, @empty}, {0x0, 0x0, 0x0, @loopback, "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"}}}}}}, 0x0) 00:57:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x83, &(0x7f0000000080)=@assoc_value, 0x8) 00:57:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x1, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8}]}]}, 0x20}}, 0x0) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0055aaffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:09 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0x11, 0x0, 0x0) 00:57:09 executing program 0: r0 = socket(0x1, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000040)={0x0}}, 0x0) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0007eeffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:09 executing program 3: r0 = socket(0x2a, 0x2, 0x0) bind$l2tp6(r0, 0x0, 0x0) 00:57:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8946, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @empty}}}}) 00:57:09 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x33fe0}}, 0x0) 00:57:09 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x1, &(0x7f0000000480)=@raw=[@kfunc], &(0x7f0000000500)='GPL\x00', 0x6, 0x93, &(0x7f0000000540)=""/147, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffefffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:09 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8922, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}, @rand_addr=' \x01\x00'}}) 00:57:09 executing program 4: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3, 0x1c) r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8903, &(0x7f0000000040)) 00:57:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x894b, &(0x7f0000000040)) 00:57:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x19, 0x0, &(0x7f00000001c0)) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffbffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:09 executing program 2: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@random="652ab45efa6d", @empty, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "df07af", 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @local}}}}}, 0x0) 00:57:09 executing program 5: r0 = socket(0x2, 0xa, 0x0) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 00:57:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000480)={&(0x7f0000000000)=@in={0x2, 0x4e23, @loopback}, 0x80, 0x0}, 0x4000000) 00:57:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000600)={'wlan1\x00'}) 00:57:09 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x22, 0x0, &(0x7f0000000040)) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00f9fdffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:09 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x3}}, 0x0) [ 3422.703681][T15117] ip6tnl0: mtu greater than device maximum 00:57:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}, 0x300}, 0x0) 00:57:09 executing program 5: socketpair(0x1a, 0x0, 0x0, &(0x7f00000000c0)) socket$inet6_udplite(0xa, 0x2, 0x88) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fdfdffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:09 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x2c) 00:57:09 executing program 3: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x21, 0x0, &(0x7f0000000140)) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f007fffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:09 executing program 2: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@local, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x44, 0x2f, 0x0, @remote, @private2, {[], {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0xff}}}}}}}}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, 0x0, 0x800) socket$nl_generic(0x10, 0x3, 0x10) 00:57:09 executing program 5: r0 = socket$isdn_base(0x22, 0x3, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0xfffffffffffffe68) 00:57:09 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r2, 0x1}, 0x18) 00:57:09 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@link_local, @dev, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "d22528", 0x8, 0x0, 0x0, @remote, @private1, {[@routing={0x2c}]}}}}}, 0x0) 00:57:09 executing program 4: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast1, 0x700}}) 00:57:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x34, r1, 0x1, 0x0, 0x0, {}, [@nsim={{0xe}, {0x3, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) 00:57:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f008cffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x39, 0x0, &(0x7f00000007c0)) 00:57:09 executing program 5: r0 = socket(0x2, 0x2, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:57:09 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x9, 0x800}, 0x1c) 00:57:09 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x8, 0x8002}, 0x48) 00:57:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="0000a86bed61c013b91fde338c2f617b331f2a19e9db9b"]}) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00c9ffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:09 executing program 2: r0 = socket(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)) 00:57:09 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 00:57:09 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) 00:57:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000002a09be2c0bd"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x20004080) 00:57:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00daffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 3422.881718][T15168] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 00:57:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000900)={0x54, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x7fff}, {0xc}}]}, 0x54}}, 0x0) 00:57:10 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x401c5820, &(0x7f0000000040)="ec") 00:57:10 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000100)={&(0x7f0000000000), 0x4, &(0x7f00000000c0)={&(0x7f0000000040)={0x64, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev}, @NLBL_UNLABEL_A_IPV4ADDR={0x8}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:auditctl_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}]}, 0x64}}, 0x0) 00:57:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x15, 0x0, &(0x7f00000007c0)) 00:57:10 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:10 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000600), r1) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x101, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00e2ffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 3422.931527][T15185] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15185 comm=syz-executor.3 00:57:10 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x6, 0x92f5e, &(0x7f0000000f80)=@framed={{}, [@ldst, @func, @btf_id]}, &(0x7f0000000940)='GPL\x00', 0x0, 0xfffffffffffffeda, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x34, r1, 0x1, 0x0, 0x0, {}, [@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0, 0x2}}}]}, 0x34}}, 0x0) 00:57:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000140)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) 00:57:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000940), 0xffffffffffffffff) 00:57:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x541b, 0x0) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00f0ffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8906, 0x0) 00:57:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'batadv_slave_1\x00', {0x2, 0x0, @multicast2}}) 00:57:10 executing program 2: r0 = socket(0x11, 0x2, 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00f6ffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[{0x10}, {0x10, 0x84, 0xb7b1}], 0x20}, 0x0) 00:57:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x890d, 0x0) 00:57:10 executing program 0: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000400)={'ip6gre0\x00', &(0x7f0000000380)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @mcast2, 0x0, 0x300}}) 00:57:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000480)={'veth0_vlan\x00', {0x2, 0x0, @broadcast}}) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fbffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000300)={@multicast1, @multicast2}, &(0x7f0000000340)=0xc) 00:57:10 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000025c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2c, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}]}, 0x2c}}, 0x0) 00:57:10 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x29, 0x0, &(0x7f0000000040)) 00:57:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000800)={0x24, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8, 0x3, r3}, @void}}}, 0x24}}, 0x0) 00:57:10 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x40, 0x8, 0x8001}, 0x48) 00:57:10 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00feffffff00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[], 0x40}}, 0x0) 00:57:10 executing program 0: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, 0x0, 0x0) 00:57:10 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8903, &(0x7f0000000040)) 00:57:10 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000140)=@raw=[@map_idx], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000002000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 2: r0 = socket(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x541b, &(0x7f0000000080)={'batadv_slave_1\x00'}) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000003000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x9, 0x0, 0x0) 00:57:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x3c, r1, 0x19, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}]}, 0x3c}}, 0x0) 00:57:10 executing program 3: setsockopt$MRT_ADD_VIF(0xffffffffffffffff, 0x0, 0xca, 0x0, 0x0) 00:57:10 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) 00:57:10 executing program 5: syz_emit_ethernet(0x574, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffffffffffffffff8100000086dd62e6b3ea053a2f00fe80000000000000000000000000003eff01"], 0x0) 00:57:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x2, 0x3, 0x3, 0x0, 0x0, {}, [@NFQA_CFG_PARAMS={0x9}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x28}}, 0x0) 00:57:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x1ca, 0x1, 0xfff, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000004000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 5: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000640)) 00:57:10 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x23, 0x0, &(0x7f0000000040)) 00:57:10 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 00:57:10 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x46, &(0x7f0000000140), 0x4) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000005000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f0000000500), 0xffffffffffffffff) 00:57:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', 0x0}) 00:57:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x401c5820, &(0x7f0000000440)={'gre0\x00', 0x0}) 00:57:10 executing program 3: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0xc, 0x0, &(0x7f0000000140)) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000006000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20}, 0x20}}, 0x4010) 00:57:10 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x89a1, &(0x7f0000000040)) 00:57:10 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) sendmsg$AUDIT_TRIM(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:57:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x5, &(0x7f0000000780), &(0x7f00000007c0)=0xc) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000007000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 5: r0 = socket(0x2, 0x3, 0x7) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:57:10 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x40086602, &(0x7f0000000040)="95") 00:57:10 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x7, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x24}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:10 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0xe000, 0x0, 0x21, 0x0, @empty, @empty}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "65aa1f", 0x0, "964434"}}}}}}, 0x0) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000008000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 4: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x77) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000009000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 5: socketpair(0x10, 0x0, 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) 00:57:10 executing program 4: sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 00:57:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x4, 0x0, &(0x7f0000000180)) 00:57:10 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x7, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x24}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x19, 0x0, 0x0, 0x2}, 0x48) [ 3423.436818][ T25] audit: type=1400 audit(3430.466:783): avc: denied { setattr } for pid=15315 comm="syz-executor.2" path="socket:[504712]" dev="sockfs" ino=504712 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 00:57:10 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000340)={r1, 0x1, 0x6, @multicast}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000380)={'batadv0\x00', 0x0}) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f00000003c0)={r2, 0x1, 0x6, @multicast}, 0x10) 00:57:10 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x7, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x24}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000000a000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 3: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0xa) 00:57:10 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x2b, 0x0, &(0x7f0000000040)) 00:57:10 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000000540)={&(0x7f0000000500), 0xc, &(0x7f0000000580)={&(0x7f00000005c0)={0x10, 0x3f2, 0x0, 0x0, 0x0, "", ["", "", "", "", "", "", "", ""]}, 0x26}}, 0x0) 00:57:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380), r0) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="83439cae000001000000050001be0800", @ANYRES32], 0x1c}}, 0x0) [ 3423.440508][T15322] syz-executor.0[15322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 00:57:10 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x50, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:udev_var_run_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x50}}, 0x0) 00:57:10 executing program 3: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x890b, &(0x7f0000000080)={'batadv_slave_1\x00'}) 00:57:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x300}, 0x4) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000000b000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x7, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x24}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:10 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x5, 0x0, 0x0) 00:57:10 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x0) 00:57:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000680)={0x5}, 0x4) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000740), 0x4) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000000c000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 3423.489353][T15328] syz-executor.0[15328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3423.542965][T15346] device batadv0 entered promiscuous mode 00:57:10 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0x14, 0x0, 0x0) 00:57:10 executing program 0: syz_emit_ethernet(0xce, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffffffffffffff8100000086dd600151f00094ea"], 0x0) 00:57:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1}, 0x48) 00:57:10 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)='D', 0x1}, {&(0x7f0000000100)="bd", 0x1}], 0x2}, 0x0) 00:57:10 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xa, 0x6, 0x0, 0x7000000}, 0x48) 00:57:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="83439cae000001000000050001be08000300", @ANYRES32], 0x1c}}, 0x0) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000000d000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 5: unshare(0x4020400) bpf$OBJ_PIN_MAP(0x2, 0x0, 0x0) 00:57:10 executing program 2: ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f00000000c0)="532711939ca9e94b87795ac3b0") r0 = socket(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x890b, &(0x7f0000000080)={'batadv_slave_1\x00'}) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000000f000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value, 0x8) [ 3423.543232][T15346] device batadv0 left promiscuous mode [ 3423.548925][T15348] syz-executor.0[15348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 3423.597479][T15361] syz-executor.0[15361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 00:57:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x1c, r1, 0xf61a8130615d217f, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x1}]}, 0x1c}}, 0x0) 00:57:10 executing program 0: bpf$OBJ_GET_PROG(0xb, &(0x7f00000001c0)={0x0, 0x0, 0x28}, 0x10) 00:57:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x14, 0x0, 0x0) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000020f000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000880)) 00:57:10 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) 00:57:10 executing program 4: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x82) [ 3423.632766][T15367] sctp: [Deprecated]: syz-executor.3 (pid 15367) Use of int in max_burst socket option deprecated. [ 3423.632766][T15367] Use struct sctp_assoc_value instead 00:57:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000600)={'ip6tnl0\x00', 0x0}) 00:57:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0xc, 0x0, 0x0) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000011000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) 00:57:10 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x11}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:10 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1d, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:57:10 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e24, 0x0, @private0}], 0x2c) [ 3423.731243][T15387] sctp: [Deprecated]: syz-executor.3 (pid 15387) Use of struct sctp_assoc_value in delayed_ack socket option. [ 3423.731243][T15387] Use struct sctp_sack_info instead 00:57:10 executing program 2: socketpair(0x21, 0x0, 0x0, &(0x7f0000000740)) 00:57:10 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x8, 0x3, &(0x7f0000000f80)=@framed, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000014000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0x2, 0x0, 0x0) 00:57:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, {0x2, 0x0, @dev}, 0x84}) 00:57:10 executing program 3: r0 = socket(0x1d, 0x2, 0x2) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 00:57:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000480)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x18, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @multicast1}}]}]}, 0x2c}}, 0x0) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000020000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 4: r0 = socket$phonet(0x23, 0x2, 0x1) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x40) 00:57:10 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0), &(0x7f0000000080)=0xfffffffffffffd1b) 00:57:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x891b, &(0x7f0000000440)={'gre0\x00', 0x0}) 00:57:10 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x10, 0x2, &(0x7f0000000180)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:10 executing program 0: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x7d) 00:57:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000025000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0xc0189436, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @empty}}}}) 00:57:10 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e24, 0x0, @private0}, @in={0x2, 0x4e24, @multicast2}], 0x4c) 00:57:10 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 00:57:10 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) 00:57:10 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000200)={@broadcast, @broadcast, @val={@void}, {@ipv6={0x86dd, @udp={0x0, 0x6, "e88569", 0x10, 0x11, 0x0, @local, @mcast1, {[], {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}}, 0x0) 00:57:10 executing program 2: bpf$PROG_LOAD(0x8, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000026000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x0, 0x0, 0x0, 0x840, 0x1}, 0x48) 00:57:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000003680)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_NAN_FUNC={0x9c, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_SERVICE_ID={0xa, 0x2, "57eb5abebf55"}, @NL80211_NAN_FUNC_TERM_REASON={0x5}, @NL80211_NAN_FUNC_SERVICE_ID={0xa, 0x2, "844776634e3a"}, @NL80211_NAN_FUNC_TYPE={0x5}, @NL80211_NAN_FUNC_SERVICE_INFO={0x6d, 0xb, "e332361632c96cf3e6bd92fb2070767a1e9ceebc2109df991d756d21942b1f3bedcfc8874e048088cf9cbe5e1ae012595facc60d14836f7e79005d4132b9eb173d741b649e573909f04f427451c4ed3cad72192d19fc161e7d45d72f2940ab158d6e52ad68637e4b30"}]}, @NL80211_ATTR_NAN_FUNC={0x180, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_RX_MATCH_FILTER={0x178, 0xd, 0x0, 0x1, [{0x59, 0x0, "de512e2a071e81a28ef4d121eccc2dcd241db3c811fcd5cbf54c2b66be531b069df01cbed2bc55491deb46e0ff5e371a284ced89b402af9ee536ccd0c1022635d5bab10523cdc0bfc6f30ef384a0f4e162aad56f0f"}, {0x55, 0x0, "a09d87c0cd61c94cb9ba6909d9d7057077ebdfe50d6357ab7143c8beccb3944a34a61bdae98b13c8a8db35d7b7932c160ce835acb5bb7dc9263e37a44923a10175d0b481d5469e27c803a3bfd5a629de81"}, {0xbd, 0x0, "b680a41cab82f8345c7961718d6ee5d7d0f931ac9bba923e87d9d8d11828191b51b41308c8a263435b8d9075328a5ab013ac7ae83a31ee42b2b9dea9da3b7ea54415c5fb8cedddd5b253e5513ad51ca5eaf252e9a625a21252526dfc0cd1f744e3e7e270bfd1ab783cc4cfc34b57bbda358eda35ff4d432b60dcb51a74825cb9c5a7388449cc0243ec410efff1f09b1ad1cef03ebf47bba1a54e96698fb51c5c2d942edcb7d3e10ac73fed59d2b89ece606cc77538a75a6424"}]}, @NL80211_NAN_FUNC_PUBLISH_BCAST={0x4}]}, @NL80211_ATTR_NAN_FUNC={0x190, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_TTL={0x8}, @NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID={0x5}, @NL80211_NAN_FUNC_PUBLISH_TYPE={0x5}, @NL80211_NAN_FUNC_SUBSCRIBE_ACTIVE={0x4}, @NL80211_NAN_FUNC_FOLLOW_UP_ID={0x5}, @NL80211_NAN_FUNC_PUBLISH_BCAST={0x4}, @NL80211_NAN_FUNC_RX_MATCH_FILTER={0x100, 0xd, 0x0, 0x1, [{0x7d, 0x0, "37e48c835f19ff626ed4e61f49ca090798532871e39c20734ded9822e63b724e97acb423614a788d116bfb3b223e5251e30e65d18e993b9d006edc75958568148f1340ef9a226ccd66b77243d2acecc5145b96c29aa03db6d12b18fbc921da697616f5d1e43c8f7cdf833850b38d44b6c8864107c7a8c849a2"}, {0x79, 0x0, "812c1eb32a7664126899636873433a49b4ff4565a80f1e7fcbe7117f5efc65c5f1f9074c838c1262a76451e8ff37f6fb3d4640a213293e140760e41b0a57199ea521f26bb23e8611a158a5daa3af03670aa24a1826fa9d7e6a15a33141a600a7497ad82b976daf5c72368eb3f619bd4152a2cbf628"}]}, @NL80211_NAN_FUNC_SUBSCRIBE_ACTIVE={0x4}, @NL80211_NAN_FUNC_SERVICE_INFO={0x5d, 0xb, "85d42d6615e9e26a8a3f9a4f4ce75adec62913130d9dd9649931835ef95859ff1dfb23edfaab4021dbc7401f450ae3020a418ddf43be15135de1c18e7e785dfd56ff4b65907dc91c65cb29c45fd9ca11be2d264a3c90970801"}]}, @NL80211_ATTR_NAN_FUNC={0x24, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_TERM_REASON={0x5}, @NL80211_NAN_FUNC_TTL={0x8}, @NL80211_NAN_FUNC_FOLLOW_UP_ID={0x5}, @NL80211_NAN_FUNC_FOLLOW_UP_ID={0x5}]}, @NL80211_ATTR_NAN_FUNC={0xc, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_TERM_REASON={0x5}]}, @NL80211_ATTR_NAN_FUNC={0x1220, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_SERVICE_ID={0xa, 0x2, "6d7b09689d07"}, @NL80211_NAN_FUNC_TYPE={0x5}, @NL80211_NAN_FUNC_SRF={0x30, 0xc, 0x0, 0x1, [@NL80211_NAN_SRF_INCLUDE={0x4}, @NL80211_NAN_SRF_MAC_ADDRS={0x28, 0x4, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}, {0xa, 0x6, @device_b}]}]}, @NL80211_NAN_FUNC_SERVICE_INFO={0xfd, 0xb, "00671ba387e522cfba61f9b9380dd02d2496442595c22a08fba96feef6ad16ac6bdafa19526ea0044cfba9fbd8f45734a0b16b63f644415cb9aaae5425a0133b9fbcb6eeb804330cbacb5c6e0fe3bab03e10b1cc6681c4bcd02f6eb2a84900b0413470e119c9b2b771ede89f31bb0285911d737f37d68d22c9a575654d51a2c81b40e99dbd3b2456e4dc25112d2316afe6a93599402672cfb1aba45ebdca0b05be78fbabe50da2aa024079a7ff0bc4ab0bb670199ecbc816ef279de9f1ca2a65693e5d01a2b95f477a45eca7abfa1aa547147b57a79d5171bcfd1838fbae41f016d39a48b238aa25aa422eb7dd0c459e20d013c91561676047"}, @NL80211_NAN_FUNC_TX_MATCH_FILTER={0x1008, 0xe, 0x0, 0x1, [{0x1001, 0x0, "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"}]}, @NL80211_NAN_FUNC_PUBLISH_BCAST={0x4}, @NL80211_NAN_FUNC_TX_MATCH_FILTER={0x54, 0xe, 0x0, 0x1, [{0x4d, 0x0, "344f86369feb5e455e025346a25be6055f604a325330c9a629107b95554717168ed1ae18fc9062fbef1ef3387bdbead7b355811b863d2ae5765ea3c387770c0711bb9d17961de31248"}]}, @NL80211_NAN_FUNC_SERVICE_INFO={0x6d, 0xb, "602abe5f434efd5ff0d03497ea92234c5b7ea6a4734b005ab05b31708f10b3babca7f876a20c1f2b7301990fb00e18b4c28d04f7232a7b4de2aabc1bcc561fee5bf49eed5dff0087989aeba8c67fb15ef1cf2f186561e6cf23fbe5df30e2478fc084ca038981f5bfd3"}, @NL80211_NAN_FUNC_INSTANCE_ID={0x5}]}, @NL80211_ATTR_NAN_FUNC={0x8a8, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_PUBLISH_BCAST={0x4}, @NL80211_NAN_FUNC_PUBLISH_BCAST={0x4}, @NL80211_NAN_FUNC_TX_MATCH_FILTER={0x4}, @NL80211_NAN_FUNC_TERM_REASON={0x5}, @NL80211_NAN_FUNC_TX_MATCH_FILTER={0x64, 0xe, 0x0, 0x1, [{0x5d, 0x0, "d7485bed511fa05230db4913701d372f38b59021bdb62693165722a61786de44caf9ae8301724999f9b8addc4de31d026c72221d9ad21e7358b564b9f840729e57a4909be92a35e00a3f871262d3abcc4ad4b2e1c5c81781af"}]}, @NL80211_NAN_FUNC_TX_MATCH_FILTER={0x82c, 0xe, 0x0, 0x1, [{0xf5, 0x0, "4e2f82915fb0f8749beb578a503eebafb1ff5edc68ab358468512f399e41f959b25ab3ca57422429e67cda1096741346f75e156ac15a6c7eaef2714b69f7f658b0aa1dd1a2e2261e2144adb77be5e8d345e7947a804baa4655836b64a699e9ff9c046f9abf99169d3b22efb43f3e3256271bf78206d32ae272256138b9b8b83288578bad61372489697c6e244f667c8e59f53a0d75eaa10a89a9e89dca652d639fdd03c8bd40749fb9514686423abf5d2667fe663f14578150d10c2c12279d460e52d7475bb64210767edf5669205ed922dff18e3db47d4877fd7a5f319ac1e136d81af1d74f69bf3eaa57b35fac8ee84a"}, {0x72d, 0x0, "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"}]}]}]}, 0x1ec4}}, 0x0) 00:57:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000580)={'sit0\x00', 0x0}) 00:57:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}]}, 0x1c}}, 0x0) 00:57:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000032000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:11 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x6, 0x4, &(0x7f0000000f80)=@framed={{}, [@ldst]}, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x2c, r1, 0x201, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_LEVEL={0xc, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8}]}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x2c}}, 0x0) 00:57:11 executing program 4: socketpair(0x1d, 0x0, 0x2, &(0x7f0000000640)) 00:57:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x891e, &(0x7f0000000100)={'gre0\x00', 0x0}) 00:57:11 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f0000001240), 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f00000014c0), 0xffffffffffffffff) 00:57:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8924, &(0x7f0000000100)={'gre0\x00', 0x0}) 00:57:11 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000001780)=@framed={{}, [@exit, @map_fd, @ldst]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:11 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x2, &(0x7f0000000000)=@raw=[@cb_func], &(0x7f0000000080)='syzkaller\x00', 0x5, 0xd4, &(0x7f0000000180)=""/212, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000033000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:11 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x89a0, &(0x7f0000000040)) 00:57:11 executing program 0: r0 = socket(0x2, 0x5, 0x0) connect$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="a4c8ad91d1b5"}, 0x14) 00:57:11 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x4001}, 0x6) 00:57:11 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x28, 0x14, 0x25dff9be9e260e29, 0x0, 0x0, {0x28}, [@INET_DIAG_REQ_BYTECODE={0x11, 0x1, "4569b5d07c7f7f7080dc836951"}]}, 0x28}}, 0x0) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f00000078c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001040)=ANY=[@ANYBLOB="bc0400003200120017d0571fa6498e1277aaec0eef7fd22e6e40902b96987e1009f2ec0fe8e8ce96e65fb0520ea5b15b59c775435516f26f93ee46359339ef30e5bbadec1ab8aa3b35c28bfe5d506fc5edfe476192e46c99a80606fd82a5b0f0a45c2244773b76b6e7b03118346f7930e0a0bec40b59eceedde09b484a982f4299ea8587dfd92260cc95d1e997db361886c1cbaacd00559eb310d9ce795972bf85d4000000caef225beb16cdd936e2b24f2a541cb63ed37efecb9c20df66f487a05cef40a4c054c0f88c26ce3cf18b3aafe85c90898d46edbbbd6632c8f39cc6505b2f27e1e66cd6409c459b0dceca3e8a842f11c1e5f9b8240000000000000066cc2a601487c68079146ed5ba5f952975"], 0xbc}, {&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES64, @ANYRES32=r1, @ANYRESHEX], 0x2484}], 0x2, 0x0, 0x0, 0x10}, 0x20004801) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x30, 0x1402, 0x200, 0x70bd26, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x30}}, 0x2801) 00:57:11 executing program 4: r0 = socket(0x2, 0x5, 0x0) connect$packet(r0, 0x0, 0x0) 00:57:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000000003f000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:11 executing program 2: sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, 0x0, 0x0) 00:57:11 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x1, &(0x7f0000000480)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000500)='GPL\x00', 0x6, 0x93, &(0x7f0000000540)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000040000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000280), 0x4) 00:57:11 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x5411, &(0x7f0000000080)={'batadv_slave_1\x00'}) 00:57:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x3c, r1, 0xe614334425ba6589, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x58}, @val={0x8}, @val={0xc}}}, [@mon_options=[@NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}]]}, 0x3c}}, 0x0) 00:57:11 executing program 2: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x16, 0x0, &(0x7f0000000140)) 00:57:11 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_mreq(r0, 0x0, 0x22, &(0x7f0000000000)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8) 00:57:11 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000025c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000a80)={0x20, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x20}}, 0x0) 00:57:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000046000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x18}, 0x0) 00:57:11 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0xf0ff7f) 00:57:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000051000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x6, 0x0, 0x0, 0x8}, 0x48) 00:57:11 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 00:57:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x20}, 0x8}], 0x1c) 00:57:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000300)={'sit0\x00', 0x0}) 00:57:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x7, 0x0, 0x0) 00:57:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000054000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@datasec={0x4, 0x0, 0x0, 0xf, 0x2, [], "47ee"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "951f"}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x387c0c819b8052ae]}}, &(0x7f0000000180)=""/145, 0x3b, 0x91, 0x1}, 0x20) 00:57:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 00:57:11 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0) 00:57:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000056000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:11 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0xd00, 0x8001}, 0x48) 00:57:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001480)={'ip6gre0\x00', &(0x7f0000001400)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @remote}}) 00:57:11 executing program 2: r0 = socket(0x22, 0x2, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 00:57:11 executing program 2: syz_emit_ethernet(0xfffffdef, &(0x7f0000000080)={@random="652ab45efa6d", @empty, @val={@void}, {@x25}}, 0x0) [ 3424.274606][ T25] audit: type=1400 audit(3431.306:784): avc: denied { getopt } for pid=15551 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 00:57:12 executing program 0: r0 = socket(0x2, 0x5, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 00:57:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x88, 0x66, 0x0, 0xfffffffffffffffd) 00:57:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000064000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:12 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x64, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}], 0x10) 00:57:12 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 00:57:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8946, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @private}}}}) 00:57:12 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, 0x0, 0x0) 00:57:12 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x3e, &(0x7f0000000140), 0x4) 00:57:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f270000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) 00:57:12 executing program 2: r0 = socket(0x22, 0x2, 0x3) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20000000) 00:57:12 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1c, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:57:12 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8941, &(0x7f0000000040)) 00:57:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f271000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:12 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8982, &(0x7f0000000040)) 00:57:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x2, 0x3, 0x3, 0x0, 0x0, {}, [@NFQA_CFG_PARAMS={0x9, 0x2, {0x0, 0x2}}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x28}}, 0x0) 00:57:12 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000380)) 00:57:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f272000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000080)=ANY=[@ANYBLOB="080000000000000002004e23ac1e01010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000082bfb98338c05b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x210) 00:57:12 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001380)={0x24, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x24}}, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_GET(0xffffffffffffffff, 0x0, 0x0) 00:57:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, 0x0) socketpair(0x1a, 0x0, 0x0, &(0x7f00000000c0)) syz_genetlink_get_family_id$batadv(&(0x7f0000000140), 0xffffffffffffffff) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000e80), 0xffffffffffffffff) 00:57:12 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x19, 0x0, 0xf) 00:57:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f273000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x30, 0x0, &(0x7f0000000100)) 00:57:12 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @dccp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @empty, @empty, {[@ssrr={0x89, 0x6}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "65aa1f", 0x0, "964434"}}}}}}, 0x0) 00:57:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000280)) 00:57:12 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8902, &(0x7f0000000040)) 00:57:13 executing program 3: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 00:57:13 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[], 0xa8}, 0x20008051) 00:57:13 executing program 0: socketpair(0x0, 0x80002, 0x0, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 00:57:13 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000140)={@broadcast, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x44, 0x2f, 0x0, @remote, @mcast2}}}}, 0x0) 00:57:13 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000100)="bd", 0x1}], 0x2}, 0x0) 00:57:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f274000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:13 executing program 4: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x53, 0x0, &(0x7f0000000140)) 00:57:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000480)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) 00:57:13 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x2, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x9a}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f275000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x34, r1, 0x1, 0x0, 0x0, {}, [@nsim={{0xe, 0x3}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) 00:57:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x13, 0xa, 0x201}, 0x14}}, 0x0) 00:57:13 executing program 3: r0 = socket(0xa, 0x3, 0x8) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000000c0)={@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, {0x0}, 0x0}, 0xa0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x890c, &(0x7f0000000080)={'batadv_slave_1\x00'}) 00:57:13 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x40086602, &(0x7f0000000040)) 00:57:13 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x89a0, &(0x7f0000000000)='%') 00:57:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f276000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6}, 0x10) 00:57:13 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, 0x0, 0x0) 00:57:13 executing program 2: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x72) 00:57:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f277000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xa, 0x0, &(0x7f00000001c0)) 00:57:13 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, 0x0, &(0x7f00000001c0)) 00:57:13 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x1, &(0x7f0000000000)=@raw=[@func], &(0x7f0000000040)='syzkaller\x00', 0x2, 0xbf, &(0x7f0000000080)=""/191, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) accept4$packet(r0, 0x0, 0x0, 0x0) 00:57:13 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000180), r1) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r2, 0x1, 0x0, 0x0, {}, [""]}, 0x14}}, 0x800) 00:57:13 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x93a4f493}, 0x0) [ 3426.060824][T15638] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 3426.078861][ T25] audit: type=1400 audit(3433.106:785): avc: denied { setattr } for pid=15641 comm="syz-executor.5" path="socket:[506369]" dev="sockfs" ino=506369 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 00:57:13 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f00000013c0)={0x2, 0x0, 0x0, @loopback}, 0x20) 00:57:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x88, 0x68, 0x0, &(0x7f0000000100)) 00:57:13 executing program 3: r0 = socket(0x22, 0x2, 0x4) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 00:57:13 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1e, 0x0, &(0x7f00000001c0)) 00:57:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f278000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:13 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_PAN_ID(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 00:57:13 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x89a0, &(0x7f0000000000)='\n') 00:57:13 executing program 3: syz_genetlink_get_family_id$fou(&(0x7f0000000e80), 0xffffffffffffffff) 00:57:13 executing program 5: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x71) 00:57:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000003c0)={'wg1\x00'}) 00:57:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f279000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:13 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x16, 0x2, &(0x7f0000000180)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x20, 0x1, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_ZONE={0x6}, @CTA_TUPLE_ORIG={0x4}]}, 0x20}}, 0x0) 00:57:13 executing program 4: r0 = socket(0x2, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000002140)={&(0x7f00000001c0)={0x2, 0x0, @private}, 0x10, &(0x7f0000001840)=[{&(0x7f0000000340)=""/189, 0xbd}], 0x1}, 0x0) 00:57:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f27a000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:13 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r2) 00:57:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) 00:57:13 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x7, &(0x7f0000000140)=@framed={{}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, @map_idx_val]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:13 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x7, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x94}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:13 executing program 0: socketpair(0x1d, 0x0, 0x0, &(0x7f0000000640)) 00:57:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f27c000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f27d000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:13 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8934, &(0x7f0000000040)) 00:57:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x229}, 0x14}}, 0x0) 00:57:13 executing program 5: socketpair(0x1d, 0x0, 0xc2, &(0x7f0000000000)) 00:57:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f27e000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:13 executing program 2: r0 = socket(0x2, 0x5, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) sendmsg$rds(r0, &(0x7f0000002140)={&(0x7f00000001c0)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000001840)=[{0x0}, {0x0}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x3, &(0x7f0000001f00)=[@mask_fadd={0x58, 0x114, 0x8, {{0x0, 0x200}, 0x0, 0x0}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0}}], 0xa0}, 0x0) [ 3426.283707][ T25] audit: type=1400 audit(3433.316:786): avc: denied { read } for pid=15699 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 3426.336477][T15706] can: request_module (can-proto-0) failed. 00:57:14 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, 0x0) 00:57:14 executing program 0: r0 = socket(0x22, 0x2, 0x3) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, 0x0, 0x0) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f27f000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @remote, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @multicast, @multicast2, @dev, @remote}}}}, 0x0) 00:57:14 executing program 4: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@empty, @random="7c48061e71dc", @val, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @local, @mcast1, @empty, @dev}}}}, 0x0) 00:57:14 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x7b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) 00:57:14 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000000c0), 0x4) 00:57:14 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x7, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f280000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="ffffffff00000000000003"], 0x1c}}, 0x0) 00:57:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x541b, &(0x7f0000000040)={'wlan1\x00'}) 00:57:14 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000180)={0x0, {{0x2, 0x0, @dev}}, {{0x2, 0x0, @remote}}}, 0x108) 00:57:14 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x6, 0x0, &(0x7f0000000180)=0x300) 00:57:14 executing program 0: sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair(0x27, 0x0, 0x0, &(0x7f0000000880)) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000081000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x10000}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x2c) 00:57:14 executing program 2: syz_emit_ethernet(0x96, &(0x7f0000000140)={@broadcast, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x5c, 0x2f, 0x0, @remote, @mcast2, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast1]}]}}}}}, 0x0) 00:57:14 executing program 5: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x83) 00:57:14 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8982, &(0x7f0000000000)='\n') 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f281000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x0, 0x0, 0xfff}, 0x48) 00:57:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x30, 0x3, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_REQUEST={0x8}]}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}]}, 0x30}}, 0x0) 00:57:14 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002940)=@migrate={0xcc, 0x21, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@empty}}, [@user_kmaddress={0x2c, 0x13, {@in=@remote, @in6=@mcast2}}, @migrate={0x50, 0x11, [{@in6=@empty, @in=@multicast2, @in=@broadcast, @in=@multicast1}]}]}, 0xcc}}, 0x0) 00:57:14 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000100)=0x8, 0x4) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) 00:57:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000000)=0x700, 0x4) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f282000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 0: syz_emit_ethernet(0x7a, &(0x7f00000014c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "d574ed", 0x44, 0x2f, 0x0, @dev, @empty}}}}, 0x0) 00:57:14 executing program 4: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0xd, 0x0, &(0x7f0000000140)) 00:57:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x11, &(0x7f0000000000), 0x4) 00:57:14 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8912, &(0x7f0000000080)) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f283000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 3: socketpair(0xa, 0x3, 0x0, &(0x7f00000003c0)) 00:57:14 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vxcan1\x00'}) 00:57:14 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) connect$inet(r0, &(0x7f0000000800)={0x2, 0x0, @local}, 0x10) 00:57:14 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x1b, 0x1, &(0x7f0000000180)=@raw=[@exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:14 executing program 5: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0xf0ff7f) 00:57:14 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f284000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r1) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x903, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 00:57:14 executing program 5: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@random="652ab45efa6d", @empty, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "df07af", 0x0, 0x4, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @local}}}}}, 0x0) 00:57:14 executing program 4: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x7, 0x0, &(0x7f0000000140)) 00:57:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x19}, 0x48) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f285000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt(r0, 0x1, 0x8, &(0x7f0000000040)=""/179, &(0x7f0000000100)=0xb3) 00:57:14 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x5, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x43}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:14 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast1}}) 00:57:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 00:57:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = geteuid() getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setreuid(r1, r2) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f287000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 5: socketpair(0x23, 0x0, 0x80000000, &(0x7f0000000200)) 00:57:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4, 0x80, 0x800}, 0x48) 00:57:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x3c, r1, 0x19, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x3c}}, 0x0) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f289000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000900)={0x14}, 0x33fe0}}, 0x0) 00:57:14 executing program 2: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "f072d3", 0x0, 0xc, 0x0, @empty, @local}}}}, 0x0) [ 3427.408621][ T25] audit: type=1400 audit(3434.436:787): avc: denied { getopt } for pid=15813 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 00:57:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x16, 0x0, 0x0, 0x7000000}, 0x48) 00:57:14 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "e804434cf476748d4df66ded49a895d6d5882ad6beae123dcb5c2fede6b3989e6ad9f32398ce5750fb06d9d2564ca1618a241b652ac5a425e9414047aff36a"}, 0x60) 00:57:14 executing program 0: unshare(0x4020400) bpf$OBJ_PIN_MAP(0xf, 0x0, 0x0) 00:57:14 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, 0x24) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f28b000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 3: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000400)={'ip6gre0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @mcast2, 0x0, 0x0, 0x3}}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r0, 0x3, 0x0, 0x2}) 00:57:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x70bd2d, 0x25dfdbff, {}, ["", "", ""]}, 0x14}}, 0x0) 00:57:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8917, &(0x7f0000000440)={'gre0\x00', 0x0}) 00:57:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x541b, 0x0) 00:57:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000100)=@req={0x1000, 0x6, 0x100}, 0x10) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f28d000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x7ff, 0x4) 00:57:14 executing program 4: r0 = socket(0x22, 0x2, 0x3) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xf0ff7f00000000}}, 0x0) 00:57:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x1, 0x1, 0x301, 0x0, 0x0, {0xa}, [@CTA_MARK_MASK={0x8}]}, 0x1c}}, 0x0) 00:57:14 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 00:57:14 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000005c0), r0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x14, r2, 0xc21, 0x0, 0x0, {0x2e}}, 0x14}}, 0x0) 00:57:14 executing program 4: r0 = socket(0x2, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000002140)={&(0x7f00000001c0)={0x2, 0x0, @private}, 0x10, &(0x7f0000001840)=[{&(0x7f0000000340)=""/189, 0x7ffff000}], 0x1}, 0x0) 00:57:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x1ca, 0x1, 0xfff, 0x1}, 0x48) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f28f000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_mreq(r0, 0x0, 0x17, &(0x7f0000000000)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8) 00:57:14 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f00000001c0)) 00:57:14 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f0000000180)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x7, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000d40)={&(0x7f0000000d00)={0x14, r1, 0x1}, 0x14}}, 0x0) 00:57:14 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f291000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 5: sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_ABORT_SCAN(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) 00:57:14 executing program 0: unshare(0x4020400) bpf$OBJ_PIN_MAP(0x3, 0x0, 0x0) 00:57:14 executing program 4: r0 = socket(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8930, &(0x7f0000000080)={'batadv_slave_1\x00'}) 00:57:14 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x5, &(0x7f0000000140)=@framed={{}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f292000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, 0x0, &(0x7f00000001c0)) 00:57:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x9}, 0x48) 00:57:14 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000140)={0x0, {{0x2, 0x0, @broadcast}}}, 0x90) 00:57:14 executing program 4: syz_emit_ethernet(0x15, &(0x7f0000000080)={@random="652ab45efa6d", @empty, @val={@void}, {@x25}}, 0x0) 00:57:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f00000001c0)=""/158, 0x2a, 0x9e, 0x1}, 0x20) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f293000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x2}, 0x0) 00:57:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x14, 0x0, &(0x7f0000000100)) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f294000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 3: socketpair(0x14, 0x0, 0x0, &(0x7f0000000780)) 00:57:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, r1, 0x1, 0x0, 0x0, {0x0}}, 0x14}}, 0x0) 00:57:14 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000100)=0xffffffff, 0x4) 00:57:14 executing program 5: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x19, 0x0, &(0x7f0000000140)) 00:57:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x18, 0x0, 0x2, 0x801, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f295000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}, 0x80) 00:57:14 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000340), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_VERSION(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20000}, 0x24008080) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000740)={0x20, r0, 0x1, 0x0, 0x0, {0x5}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000180), r3) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r5, 0x431}, 0x14}}, 0x0) 00:57:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000040)) 00:57:14 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x7, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x2d}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:14 executing program 4: r0 = socket(0xa, 0x3, 0x8) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000000c0)={@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, {0x0}, 0x0}, 0xa0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x890b, &(0x7f0000000080)={'batadv_slave_1\x00'}) [ 3427.767692][ T25] audit: type=1400 audit(3434.796:788): avc: denied { create } for pid=15915 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 00:57:14 executing program 2: r0 = socket(0x22, 0x2, 0x3) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:57:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 00:57:14 executing program 4: syz_emit_ethernet(0x574, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffffffffffffffff8100000086dd"], 0x0) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f296000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 0: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x80040000) 00:57:14 executing program 5: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000300)={'nat\x00', 0x2, [{}, {}]}, 0x48) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f297000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:57:14 executing program 0: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000400)={'ip6gre0\x00', &(0x7f0000000380)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @mcast2, 0x2}}) 00:57:14 executing program 2: ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', 0x0}) socketpair(0x0, 0x4, 0x0, &(0x7f00000000c0)) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000c80)={0xffffffffffffffff, 0x0, 0xffffffffffffc021}) syz_genetlink_get_family_id$fou(&(0x7f0000000e80), 0xffffffffffffffff) 00:57:14 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x401c5820, &(0x7f0000000000)="0ab8") 00:57:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x0, 0x0, 0x0, 0x2}, 0x48) 00:57:14 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x44, 0xa, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc}}]}]}, 0x44}}, 0x0) 00:57:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x20, 0x3, 0x1, 0x301, 0x0, 0x0, {}, [@CTA_ZONE={0x6}, @CTA_FILTER={0x4}]}, 0x20}}, 0x0) 00:57:14 executing program 3: socketpair(0x3bca6345c92b21b3, 0x0, 0x0, &(0x7f00000001c0)) 00:57:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffff88813a117798000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:14 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r0, 0x0, 0x1d) 00:57:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00ffff888139768198000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:15 executing program 4: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000040)=0xfff, 0x4) connect$caif(r0, &(0x7f0000000500)=@dgm, 0x18) 00:57:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000002a09b"], 0x28}}, 0x0) 00:57:15 executing program 3: socketpair(0x10, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001600), 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000001f80), 0xffffffffffffffff) 00:57:15 executing program 3: r0 = socket(0x29, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 00:57:15 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$rds(r0, &(0x7f00000002c0), 0x10) 00:57:15 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8940, &(0x7f0000000040)) 00:57:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000600), r1) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x101, 0x0, 0x0, {0x21}}, 0x14}}, 0x0) 00:57:15 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000005c0), r0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x14, r2, 0xc21, 0x0, 0x0, {0x9}}, 0x14}}, 0x0) 00:57:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f298000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:15 executing program 5: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000400)={'sit0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}) 00:57:15 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x541b, &(0x7f0000000080)={'batadv_slave_0\x00'}) 00:57:15 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001480)={'ip6gre0\x00', &(0x7f0000001400)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @empty, @remote}}) 00:57:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f299000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000900)={0xfffffffffffffffd, 0x0, 0x0}, 0x0) 00:57:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x23, &(0x7f0000000080)=@assoc_value, 0x8) 00:57:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000800)=ANY=[@ANYBLOB="30000000010701"], 0x30}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), r0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @local}]}, 0x1c}}, 0x0) 00:57:15 executing program 3: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "f072d3", 0x0, 0x0, 0x0, @empty, @local}}}}, 0x0) 00:57:15 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f0000000000)={&(0x7f0000000340)=@name={0x1e, 0x2, 0x0, {{0x1}}}, 0x10, 0x0}, 0x0) 00:57:15 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000600), r1) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x101, 0x0, 0x0, {0x24}}, 0x14}}, 0x0) 00:57:15 executing program 4: r0 = socket(0xa, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x541b, 0x0) 00:57:15 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x1ca, 0x1, 0xfff}, 0x48) 00:57:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00100006"]}) 00:57:15 executing program 2: r0 = socket(0x2, 0x3, 0x7) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x415) 00:57:15 executing program 5: syz_genetlink_get_family_id$team(&(0x7f0000000a40), 0xffffffffffffffff) 00:57:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f29a000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:15 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x7, 0x4, &(0x7f0000000180)=@framed={{}, [@ldst]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 3428.125497][T16006] netlink: 'syz-executor.4': attribute type 25 has an invalid length. 00:57:15 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f00000002c0), 0x4) 00:57:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0xb, &(0x7f0000000040)=[@in], 0x10) 00:57:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x15, 0x0, &(0x7f0000000100)) 00:57:15 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x3f00}, 0x0) 00:57:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f29b000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:15 executing program 5: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x2, 0x0, &(0x7f0000000140)) 00:57:15 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0x0, @loopback}, @in6={0xa, 0x4e21, 0x0, @loopback}], 0x38) 00:57:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'tunl0\x00', &(0x7f0000000300)=ANY=[]}) 00:57:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}], 0x1c) 00:57:15 executing program 5: r0 = socket(0x11, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000380)={&(0x7f0000000240), 0x4c, &(0x7f0000000340)={0x0}}, 0x0) 00:57:15 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x7, 0x0, 0x21, 0x0, @empty, @empty}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "65aa1f", 0x0, "964434"}}}}}}, 0x0) 00:57:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f29c000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000000340)) 00:57:15 executing program 4: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x6e) 00:57:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f29d000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:15 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void}, {@ipv4={0x6000, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @empty, @empty}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "65aa1f", 0x0, "964434"}}}}}}, 0x0) 00:57:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x2c) 00:57:15 executing program 3: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@broadcast, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x44, 0x2f, 0x0, @remote, @local}}}}, 0x0) 00:57:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f29e000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:15 executing program 4: syz_emit_ethernet(0x12, &(0x7f0000000240)={@remote, @local, @val={@void}}, 0x0) 00:57:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 00:57:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) 00:57:16 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x1e, 0x42, 0x0, 0x0) 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f29f000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) 00:57:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000600), r1) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x28, r2, 0x101, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_LLSEC_SECLEVEL={0x5}]}, 0x28}}, 0x0) 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f2a0000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000800)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, 0x0}, 0x0) 00:57:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8a002, 0x0) write$tun(r0, 0x0, 0x0) 00:57:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x541b, &(0x7f0000000440)={'gre0\x00', 0x0}) 00:57:16 executing program 2: socketpair(0x0, 0xee738b65f77b8c5d, 0x0, 0x0) 00:57:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000740), 0x4) 00:57:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x300}, 0x0) 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f2a1000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 2: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x7ffffffff000}}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'vcan0\x00', {}, 0x8000}) 00:57:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000002f2a2000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x9, 0x0, &(0x7f0000000180)=0x9b) 00:57:16 executing program 5: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x6, 0x0, &(0x7f0000000140)) 00:57:16 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8982, 0x0) 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000fffffff0000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 5: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 00:57:16 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x1600, 0x8001}, 0x48) 00:57:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000001100), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0xfffffffffffffd4b}]}, 0x1c}}, 0x0) 00:57:16 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x18}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x2, 0x0, 0xfffffffffffffffc) [ 3429.183104][T16094] sctp: [Deprecated]: syz-executor.0 (pid 16094) Use of int in max_burst socket option deprecated. [ 3429.183104][T16094] Use struct sctp_assoc_value instead 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000ffa000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 5: syz_emit_ethernet(0x86, &(0x7f0000000140)={@broadcast, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x4c, 0x2f, 0x0, @remote, @mcast2, {[@srh]}}}}}, 0x0) 00:57:16 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x890b, &(0x7f0000000000)={'batadv_slave_1\x00'}) 00:57:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000480), &(0x7f00000004c0)=0x4) 00:57:16 executing program 4: socketpair(0x1d, 0x0, 0xa4, &(0x7f0000000100)) 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00fffffffffffffffe000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x38, 0x0, &(0x7f0000000040)) 00:57:16 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xd, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x90}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 3429.264852][T16115] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 00:57:16 executing program 3: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0xf, 0x0, &(0x7f0000000140)) 00:57:16 executing program 0: getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) 00:57:16 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000200)={@link_local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @multicast2}}}}}}, 0x0) 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000007fff000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 2: syz_emit_ethernet(0xce, &(0x7f0000000080)={@broadcast, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x7, 0x2f, 0x0, @remote, @private2, {[@hopopts={0x0, 0x9, '\x00', [@generic={0x0, 0x13, "9377143464d0a15c42775a4d2407445169bcde"}, @enc_lim, @ra, @hao={0xc9, 0x10, @remote}, @hao={0xc9, 0x10, @mcast2}, @padn, @jumbo]}]}}}}}, 0x0) 00:57:16 executing program 5: syz_genetlink_get_family_id$tipc(&(0x7f0000001240), 0xffffffffffffffff) 00:57:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x21, 0x0, &(0x7f0000000100)) 00:57:16 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet6_dccp_int(r0, 0x21, 0x29, 0x0, 0x0) 00:57:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x77, &(0x7f0000000080)=@assoc_value, 0x8) 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000007fffffff000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 4: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_IMPORTANCE(r0, 0x6, 0x7f, 0x0, 0x0) 00:57:16 executing program 0: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, &(0x7f0000000140)) 00:57:16 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5}, 0x48) 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000ffffffff000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 2: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @empty}}) 00:57:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000580), 0xffffffffffffffff) 00:57:16 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f0000000340)={&(0x7f0000000040)=@id, 0x10, 0x0}, 0x0) 00:57:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000001e00)={0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000000a80)={0x14, 0x29, 0x201, 0x0, 0x0, "", [@nested={0x4}]}, 0x14}, {0x0}], 0x2}, 0x0) 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000007ffffffffffff000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x7d, &(0x7f0000000040)=[@in], 0x10) 00:57:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000002000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 4: syz_emit_ethernet(0x172, &(0x7f0000000340)={@multicast, @remote, @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "e79033", 0x138, 0x0, 0x0, @private0, @private0, {[@dstopts={0x0, 0x25, '\x00', [@hao={0xc9, 0x10, @remote}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x0, 0xef, "5a788a1bbf9544f1f07b2ff876ff4794f854e61c6db7c142438dd75392be7b4b7e119d4bc233a60379055b94531420780ee2b0ecf6780e962784afd0cc500649b70a37896006cb07d876d83f801f2669b14fa0470ae860f4c8fccb50fd279ce46b102125248e3d56433a6860c48e50b2bd7530aba52464ba02da9bf3ae3d882d2a4993810cf1985bdab2aa86957709f3bcce5339a3e0dc24f78bb3e1ee41cd12d660534b5488a7b5ac5be37040cc2baa9e9aa655829996ee1448c89fa42c25bc7a847907666317d2851744b1d0952414328c3fa8101bfc6d393c6d02cd60c351faa5357c3cf6a3d076864ec96e443e"}, @hao={0xc9, 0x10, @private1}, @enc_lim, @jumbo, @enc_lim]}]}}}}}, 0x0) 00:57:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000001000)={'sit0\x00', &(0x7f0000000f80)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x12}, @local}}) 00:57:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000040)={{0x14}, [@NFT_MSG_NEWSET={0x14, 0x9, 0xa, 0x201}, @NFT_MSG_DELRULE={0x14, 0x8, 0xa, 0x3}, @NFT_MSG_NEWSETELEM={0x14, 0xc, 0xa, 0x301}, @NFT_MSG_DELOBJ={0x14, 0x14, 0xa, 0x3}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x101}], {0x14}}, 0x8c}}, 0x0) 00:57:16 executing program 3: r0 = socket(0xa, 0x3, 0x8) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x3a, 0x7, 0x0, 0x0) 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000003000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @in={0x2, 0x4e24, @private}], 0x2c) 00:57:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x34, r1, 0x1, 0x0, 0x0, {}, [@nsim={{0xe, 0x7}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) 00:57:16 executing program 3: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3, 0x1c) r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8902, &(0x7f0000000040)) 00:57:16 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_ABORT_SCAN(0xffffffffffffffff, 0x0, 0x0) 00:57:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000004000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={&(0x7f00000003c0)=@newtfilter={0x1ec4, 0x2c, 0x0, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}, @filter_kind_options=@f_basic={{0xa}, {0x1e8c, 0x2, [@TCA_BASIC_ACT={0x1610, 0x3, [@m_skbmod={0x150, 0xf, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x7}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x101}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x0, 0x0, 0x2, 0x6}, 0x4}}, @TCA_SKBMOD_ETYPE={0x6}]}, {0xe6, 0x6, "6b19569c0d15a554d0d04e513972ea140c93c97c40591b52534189a8e470c23e87270da663e394b1bb17ec37f4a428c43f8a7146f9deda0854e1794b7f0c94606425878071b5b18583aec3412edd0390c0f4d5e9583eaaeb274e035627120576c2d6bb05f5ea9c44cce4e6d586da495fd809d540b92fe24886136e7b2a4ca1a19dadb06cb50ff415bfb364b74b476b533abd335d7883b8fb05847f46a770a342e100c6c7e644fda89957009c419741b8942c0ad1f6b781ba3eeeb12440cecd56f38aeed995779046e601770dc982994034b2bb41c59451e04b77cb0380137bb070bb"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_tunnel_key={0xc0, 0x7, 0x0, 0x0, {{0xf}, {0x4c, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @private0}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x6}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x0, 0x0, 0x5, 0x1}}}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e23}]}, {0x48, 0x6, "b4569c4fc66814b7ac89a235a9cd07c1556537a9f6d779a46fe37258683bac1a7c7614e21f838864332564d763d8eecb95f15315937c7a7db4298b86b8199fe92182dc4d"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_ct={0x78, 0x8, 0x0, 0x0, {{0x7}, {0x14, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e20}, @TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e22}]}, {0x3d, 0x6, "11ca410f1a9b2f2a0fdd7d9d4ba0ab36289f09197854ab46d8885aae79a642f4c75e865699ccaee41908f48d4ee1516f25847f3c32bdad2cc2"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_skbedit={0x1030, 0x15, 0x0, 0x0, {{0xc}, {0x4}, {0x1002, 0x6, "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"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_vlan={0x114, 0x18, 0x0, 0x0, {{0x9}, {0x70, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x0, 0x8, 0xffffffffffffffff, 0x1, 0x5}, 0x1}}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0xb5, 0x4, 0x0, 0x0, 0x3}, 0x2}}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x0, 0x3ff, 0x10000000, 0x0, 0x9}}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}]}, {0x79, 0x6, "a721b0d0084d61889c10f3b8f5243ecaba7b66d5dff2dc9695e0faee5ecf2f2aa4fe8e3a692fa676b26d62c5d798ff682852dfaabe6afc9eeb88f0c552b74adac2d8078b02467e6374e21f7dfd638a3d138f25cd94d68e4cd12ee634fe9956bb08f2ee490e2e574eac4fa578ec85c5cb4d966276de"}, {0xc}, {0xc, 0x8, {0x0, 0x3}}}}, @m_vlan={0x128, 0x0, 0x0, 0x0, {{0x9}, {0x44, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{0x0, 0x0, 0x0, 0x4850d62f, 0xffff}, 0x2}}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x0, 0x0, 0x8, 0x3, 0x3}}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}]}, {0xbc, 0x6, "6ef45c0ed75ba3598d149fa5b436202891c27269de07843906e7d873fc5f6660ccbf2bf9a61487fb3ecb7fa021e4c75fc0915102c8b293979b34c7e69dd829d356387ea3cb256dcd806a291740949caaeca43f15f156394d88007998d7ea1c26d60a5eec93421f7e677f02b54fdf5e514df4927d382aa562daa45aa335f7a90a54182d25273cb18ebfef0304d9064382f3115594191300d2566eb61c6015eb5fadea1aa4ea6c3f95802ad0c163f04bc4b33ab251451481c8"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_bpf={0x118, 0x0, 0x0, 0x0, {{0x8}, {0x8c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS={0x44, 0x4, [{0x0, 0x81, 0x0, 0x8001}, {0x4c4, 0x0, 0x3f, 0x8}, {0x2, 0x0, 0x0, 0x6}, {}, {0x2, 0x1, 0x0, 0x80}, {0x8, 0x0, 0x7, 0x81}, {0x40, 0x8e, 0x0, 0x401}, {0x8001, 0x8f, 0x40}]}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x10001, 0x0, 0x5, 0x4, 0x7fff}}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}]}, {0x68, 0x6, "b10fc5b0eb7fd88690ffae04dd6651a5dcd82efb5c24314ba25b5d5fff765631903d103b470566ea647dbc4f67e0ec7253865d2b9391f5054f5498758ff2b26222c52b7026958954aa63de76737324445e330255357ab5978205d15b9d019b3e2a26df13"}, {0xc}, {0xc, 0x8, {0x1}}}}]}, @TCA_BASIC_ACT={0x67c, 0x3, [@m_mpls={0x10c, 0x3, 0x0, 0x0, {{0x9}, {0x4}, {0xde, 0x6, "486e73c7949d81e16b0d701ecdf3bbd34c39f580a073ae9692e0e6e1f22036323db3271856c3b98967d6aa329bcbdcb3596ae17faf6328c0b5845080fbad0d8291fcab4de406a89754b2d796123965cb40b61d7d7296f1724d25079916ddc15707f67e38e29e10d0789e59c288ad5e2021986931f08668a6e3fa741a7f55fa32f080ff035752629f4fa21a8c572d1d437d25699d1fce888a191ce05ae96fc749a191f71e7c430380e299d03f45ecee9866d2ad461f2814fcef5b854d18e73820ace5a29ed0d9cc771e823c5f46af67b24b7641b9f94d2f0997c1"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_ipt={0x1bc, 0x0, 0x0, 0x0, {{0x8}, {0x190, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0xc1, 0x6, {0x0, 'mangle\x00', 0x0, 0x0, "6360c28c2355166b4a24feab41f16f31df066755a7c0f63ff98bb1d657f43f06901db4f5cf1074e206c16f80b78e11a8ade1aa5646e12ec98833f207258c8fa98f2ffffe02f698830423ada6feb42429b1d7693c8d06fa10ade4cd7b7aa0ce3483c61fc61f59963594bfc77976be62505c0f48c429f121d6b9f8c87186563d5c599a73a33d990598f404c53007ea6f915546771fe694cc"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x3}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_TARG={0x51, 0x6, {0x5, 'security\x00', 0x0, 0x2, "193775aac4d67dc2e41456ac2e80eef2a36d9c8e59af4a3afa4918d4d10054a320a68da630cbf5"}}, @TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}]}, {0x8, 0x6, "eb663ecf"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2}}}}, @m_sample={0x10c, 0x0, 0x0, 0x0, {{0xb}, {0x1c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x1a3}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x7}, @TCA_SAMPLE_RATE={0x8}]}, {0xc7, 0x6, "1563b600fbbc43063e401b0d301c3dc592dee9d78ba33a55eb5a25cd7bec6a60d012383896dc899826e55b1f7d97ac87d54a70d992e3a2425976210b475704a69d760188330f1fc30927a3d4aff24a0cc0c945321b75b55bcc278522522f6516efbe40575497e2742e4c145cfd9db65603aa373a3f8d571087a49f88c485001e2d4cf8fc7f4755b827ea401ae1b39de1c64b6148dc1335e530eaa768b73d4d99b66bd193e80c94250d03783c4ab743a5c915590be9cce4899f08145f92deb7de5d5147"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_gact={0x15c, 0x7, 0x0, 0x0, {{0x9}, {0x34, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x20000000}}, @TCA_GACT_PARMS={0x18, 0x2, {0x7, 0x9, 0x10000000}}]}, {0xfe, 0x6, "e787cab829025aec7fa5ca10660227e896b74c63dff2480fb661c8373f235c5a814baed32999a2a4f6b8510439655deece1a48dfc4bc7c765d406ccfff55d0874607efe4d3cec4481f6dceb5770fc73e7e279c747b26411e6051fa3ce0d866ec1a5a38bdfdb56d7f4b37bb173b1948d137108f8afad8f368e8d59068c7630829247547fc11bc61bcce796018571b5ca50b364ae2ef852f8d31ead87625d441f139cef26c9851c5ce698e0ee5c9cbcd8fa9cf48e77309c610b76bc1ea82ff5cec794c697565f5ca3fc95f45d761c131020c5e81c889a2146fd9d31e3d4eff0edf6073693c1e3e99eb08f59e54ac63215f76969436086f80da5f6e"}, {0xc}, {0xc, 0x8, {0x1}}}}, @m_csum={0x148, 0x15, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x8, 0x40, 0x3, 0x0, 0x5}, 0x50}}]}, {0xfd, 0x6, "b04895e5930e2d4150dc9d9f23141ec0d8ebacc8ac39cdfd2feaaeb4caf9a76e104246e62618fe80d04b7bef7ac6ebac0b052c98a2852fb93208309ffc771b79efd8d008e619002a19d2dc69c2548dcf0b9f6501d9de472d43531c87aa41b56f3050a669daf659c895e50ca3e25d64268feea1d782f3e62feb5385da4731c3f07116c6182f61c34245681ab69d889ff04a5b32ce7d90c9fd81cc7c48a952cdf4f0e7cb081dc324ee34ededea08379451d17690d8b61477496b8e6d1b4eb09d0f582ceb7fd6fb48f0fe92fbbe556070baedc1a668ac9e322c2ea27785391726a3933c95cf730a77494365ebe014b807e0fc24afa62eb7b68108"}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}]}, @TCA_BASIC_EMATCHES={0x1ec, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x40, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x401, 0x1, 0x5}, {0xffffff63, 0x0, 0x0, 0x7, 0x6, 0x1, 0x1}}}, @TCF_EM_IPSET={0x10, 0x1, 0x0, 0x0, {{0x3}, {0x0, 0x0, 0x4}}}, @TCF_EM_CANID={0x14, 0x0, 0x0, 0x0, {{0x0, 0x7, 0x865}, {{0x4, 0x1}, {0x0, 0x1}}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7f}}, @TCA_EMATCH_TREE_LIST={0x198, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x68, 0x3, 0x0, 0x0, {{}, "5b062f912c59993c41a1041675a1bc4f5f6b7a95ca333e3598449ae806470fff1e7b85ae70b15c635521d8098202fe7a8608fcc2b1bc6155acd124301545115a1c0bcb533f3a58a8e369a1695d32398397895272f5f4ae0d63"}}, @TCF_EM_META={0x3c, 0x0, 0x0, 0x0, {{}, [@TCA_EM_META_RVALUE={0x8, 0x3, [@TCF_META_TYPE_INT]}, @TCA_EM_META_HDR={0xc, 0x1, {{}, {0x401, 0x3}}}, @TCA_EM_META_RVALUE={0x19, 0x3, [@TCF_META_TYPE_INT=0x6, @TCF_META_TYPE_VAR="58173db238ae", @TCF_META_TYPE_VAR="12e448401d42f0", @TCF_META_TYPE_INT=0x4]}]}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0xff, 0x7, 0x7}, {{0x2, 0x0, 0x0, 0x1}, {0x3, 0x1, 0x0, 0x1}}}}, @TCF_EM_IPT={0xb8, 0x1, 0x0, 0x0, {{0x6e3, 0x9, 0x5}, [@TCA_EM_IPT_MATCH_REVISION={0x5}, @TCA_EM_IPT_MATCH_DATA={0xa1, 0x5, "a77c8d7a47beebf3dcd769c34152d081ca5fccfb9362b4a9388009e7ebf6798f7c896f083b494f2436839dbb6765019506d517c2af712cef992ed0da8b7d520d39b50121b39598f859376c004867f8d5813f1d88d7fea7d640fb47632b18855f1aea2a79ddcf70928db5cc3e3968ab7870a117c43b60705997ba0df4f6304c018d81844e84b038347a3103b613bcba3ba8118b07c2a505c206c301a2a5"}]}}, @TCF_EM_CONTAINER={0xc, 0x3, 0x0, 0x0, {{0x0, 0x0, 0x7ff}}}, @TCF_EM_CONTAINER={0x18, 0x0, 0x0, 0x0, {{0x6}, "76595b0abe700fe06bc0c5"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x5}}]}, @TCA_BASIC_EMATCHES={0x4}, @TCA_BASIC_CLASSID={0x8, 0x1, {0x0, 0x1}}, @TCA_BASIC_ACT={0x4}]}}]}, 0x1ec4}, 0x1, 0x0, 0x0, 0x40}, 0x20000004) 00:57:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000480)={&(0x7f0000000000)=@in={0x2, 0x4e23, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000380)=[@mark={{0x14}}, @timestamping={{0x14}}], 0x30}, 0x4000000) 00:57:16 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @dev}}}, 0x88) 00:57:16 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000680)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000280)=0x27fe, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000480)='nv\x00', 0x3) sendmsg$inet(r2, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) mmap$xdp(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) 00:57:16 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r2}, 0x18) 00:57:16 executing program 4: syz_emit_ethernet(0x52, &(0x7f00000001c0)={@remote, @dev, @val={@void, {0x8906}}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "9a6999", 0x18, 0x3a, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}}}}, 0x0) 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000005000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xf, 0x0, 0x0, 0x7000000}, 0x48) 00:57:16 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x4, 0x0, &(0x7f00000001c0)) 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000006000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) 00:57:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x73}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:16 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000600)={'ip6tnl0\x00', &(0x7f0000000580)={'syztnl0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @mcast1, @mcast1}}) 00:57:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000007000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:16 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$SO_TIMESTAMPING(r0, 0x300, 0x0, 0x0, 0x0) 00:57:17 executing program 2: r0 = socket(0x22, 0x2, 0x3) accept4$tipc(r0, 0x0, 0x0, 0x0) 00:57:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000a00), r1) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r2, 0x1}, 0x14}}, 0x0) 00:57:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000008000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:17 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)) 00:57:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) 00:57:17 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001a80)={0x6, 0x2000000000000271, &(0x7f0000000900)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x4, 0x100b, &(0x7f0000001b00)=""/4107, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8919, &(0x7f0000000440)={'gre0\x00', 0x0}) 00:57:17 executing program 4: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x14) 00:57:17 executing program 0: r0 = socket(0x2, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}, 0x44011) 00:57:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000009000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000300)=""/170, 0x26, 0xaa, 0x1}, 0x20) 00:57:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000a000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$sock(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x20000881) 00:57:17 executing program 3: socket(0x15, 0x5, 0x1ff) 00:57:17 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000000000010806"], 0x0) 00:57:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001c00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000180a010400000000000000000a0000000c0005400000000000000000080007400000000008000740000000000c000380080002400000000030000000060a010200000000000000000700000008000a400000004008000a40000000000900020073797a31000000002c0e00000e0a01"], 0xec0}}, 0x0) 00:57:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000b000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8916, &(0x7f0000000440)={'gre0\x00', 0x0}) 00:57:17 executing program 3: socket(0x764b481c31c03bf4, 0x0, 0x0) 00:57:17 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @empty, @empty}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "65aa1f", 0x0, "964434"}}}}}}, 0x0) 00:57:17 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x12, 0x3, &(0x7f0000000f80)=@framed, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:17 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2b, 0x0, @empty, @empty}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "65aa1f", 0x0, "964434"}}}}}}, 0x0) 00:57:17 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_mreq(r0, 0x0, 0x1a, 0x0, 0x0) 00:57:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000c000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x3a, 0x0, @empty, @empty}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "65aa1f", 0x0, "964434"}}}}}}, 0x0) 00:57:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x0) 00:57:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x24, r1, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @empty}]}, 0x24}}, 0x0) 00:57:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000c80)={&(0x7f0000000b80)={0x10, 0x0, 0x8000000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x14}, 0x14}}, 0x0) [ 3430.668739][T16269] netlink: 3608 bytes leftover after parsing attributes in process `syz-executor.4'. 00:57:17 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x7, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x50}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:17 executing program 4: r0 = socket(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x89b0, &(0x7f0000000080)={'batadv_slave_1\x00'}) 00:57:17 executing program 3: r0 = socket(0x2a, 0x2, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={0x0}}, 0x0) 00:57:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000d000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:17 executing program 0: ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000e80), 0xffffffffffffffff) 00:57:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000005c0), r0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x14, r2, 0xc21, 0x0, 0x0, {0x24}}, 0x14}}, 0x0) 00:57:17 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000040)={@broadcast, @link_local, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "870668", 0x10, 0x3a, 0x0, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {[], @ni}}}}}, 0x0) 00:57:17 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x15}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:17 executing program 4: socketpair(0x22, 0x0, 0x4, &(0x7f0000000800)) 00:57:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000e000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:17 executing program 0: bind$802154_raw(0xffffffffffffffff, 0x0, 0x0) 00:57:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x88, 0x42, 0x0, &(0x7f0000000100)) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f0000000080)=0x1e) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'vlan1\x00', 0x3}, 0x18) 00:57:17 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000ac0), 0x10) 00:57:17 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000200)=@newqdisc={0x158, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x128, 0x2, {{}, [@TCA_NETEM_DELAY_DIST={0x52, 0x2, "5e90a986c0ed69aa393e1b3798b89a17a70b8b22453d2b1d3145be838ed4af95f8987165aae2a7c7154e040399145500396d5308d3c2b1264dfab77ee682b25b76e116a90b96554f93403911b1f3"}, @TCA_NETEM_SLOT={0x2c}, @TCA_NETEM_REORDER={0xc}, @TCA_NETEM_JITTER64={0xc}, @TCA_NETEM_LOSS={0x74, 0x5, 0x0, 0x1, [@NETEM_LOSS_GE={0x13}, @NETEM_LOSS_GE={0x14}, @NETEM_LOSS_GI={0x18}, @NETEM_LOSS_GI={0x18}, @NETEM_LOSS_GI={0x7}]}]}}}]}, 0x158}}, 0x0) 00:57:17 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xf, 0x2, &(0x7f0000000180)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000f000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x34, r1, 0x1, 0x0, 0x0, {}, [@nsim={{0xe, 0xae}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) 00:57:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x2046, 0x1}, 0x48) 00:57:17 executing program 3: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x78) 00:57:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000040)=0x20000000, 0x4) 00:57:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000010000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:17 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 00:57:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg0\x00'}) 00:57:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000011000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:17 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x5452, &(0x7f0000000040)) 00:57:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x7d, &(0x7f0000000080)=@assoc_value, 0x8) [ 3430.840940][T16320] netem: incorrect ge model size [ 3430.840949][T16320] netem: change failed [ 3430.857382][T16317] IPVS: Unknown mcast interface: vlan1 00:57:17 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f0000000200)="5d6f6aa572c60af2020497211b033cecb55d09d7ebd2b260a4b8aa823a1ab23ffed9a67c358b2f80d138179619116de311ee753adc5e7466260103617a62af78e58eacdb2423c9922e3e33bc8c70da3ecda79f85a91f82485895f5729b1e3f1f4c1dd762052745952f156c0ae71d0e3e2a6287f44bb9314cccb84d67ddc89f30d2b5fcc787d004e6", 0x88) 00:57:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x9, 0x0, &(0x7f0000000100)) 00:57:17 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x1e, 0x3, &(0x7f0000000f80)=@framed, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000012000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, 0x0, 0x0) 00:57:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, 0x0, &(0x7f00000004c0)) 00:57:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x19, 0x0, &(0x7f0000000100)) 00:57:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8922, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @empty}}}}) 00:57:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_buf(r0, 0x107, 0x16, 0x0, 0x0) 00:57:18 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0xc, &(0x7f0000000140), 0x4) 00:57:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000018000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:18 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000240)={0x2, 0x0, @initdev={0xac, 0x1e, 0x3, 0x0}}, 0x10) 00:57:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x18, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@crypto_settings=[@NL80211_ATTR_CONTROL_PORT_NO_PREAUTH={0x4}]]}, 0x18}}, 0x0) 00:57:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000000), 0x4) 00:57:18 executing program 0: syz_emit_ethernet(0x14, &(0x7f0000000240)={@remote, @local, @val={@void}, {@generic={0x0, "cff7"}}}, 0x0) 00:57:18 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000180)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) 00:57:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000140)={0x0, {{0x2, 0x0, @broadcast}}, 0x0, 0x2, [{{0x2, 0x0, @multicast2}}, {}]}, 0x190) 00:57:18 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, 0x3, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @fccp}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x28}}, 0x0) 00:57:18 executing program 0: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x7b) 00:57:18 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x2, 0x2, &(0x7f0000000180)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00001a000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:18 executing program 5: r0 = socket(0x2, 0x3, 0x7) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000140)) [ 3431.009305][T16370] RDS: rds_bind could not find a transport for ::ffff:172.30.3.4, load rds_tcp or rds_rdma? 00:57:18 executing program 4: r0 = socket(0x2, 0x5, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(0xffffffffffffffff, 0x0, 0x4000010) sendmsg$rds(r0, &(0x7f0000002140)={&(0x7f00000001c0)={0x2, 0x4e22, @private=0xa010101}, 0x10, &(0x7f0000001840)=[{0x0}, {0x0}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x3, &(0x7f0000001f00)=[@rdma_dest={0x18}, @mask_fadd={0x58, 0x114, 0x8, {{}, 0x0, 0x0, 0x100, 0x0, 0x9, 0x7}}], 0x70}, 0x0) 00:57:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000022000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:18 executing program 2: mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x90fc442c4a4ed6fd, 0xffffffffffffffff, 0x0) 00:57:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x34, 0xa, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_ADT={0x4}]}, 0x34}}, 0x0) 00:57:18 executing program 5: r0 = socket(0x1d, 0x2, 0x2) connect$packet(r0, 0x0, 0x0) 00:57:18 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) 00:57:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000025000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:18 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8941, 0x0) 00:57:18 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xd, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x39}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:18 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x1, &(0x7f0000000480)=@raw=[@call], &(0x7f0000000500)='GPL\x00', 0x6, 0x93, &(0x7f0000000540)=""/147, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:18 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x7, &(0x7f0000000140), 0x4) 00:57:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000026000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:18 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'tunl0\x00'}, 0x18) 00:57:18 executing program 2: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x77, @local, @private0}}) 00:57:18 executing program 3: r0 = socket(0x2, 0x3, 0x7) sendmsg(r0, &(0x7f0000000180)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0xb8}, 0x0) 00:57:18 executing program 5: accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000005c0), 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 00:57:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000032000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:18 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 00:57:18 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000280)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000100)=[{}], 0x0}, &(0x7f0000000300)=0x78) 00:57:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00003e000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:18 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x2, 0x5, &(0x7f00000001c0)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0x92, &(0x7f0000000100)=""/146, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:19 executing program 5: syz_emit_ethernet(0xce, &(0x7f0000000080)={@broadcast, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x94, 0x33, 0x0, @remote, @private2, {[@hopopts={0x0, 0x8, '\x00', [@generic={0x0, 0x13, "9377143464d0a15c42775a4d2407445169bcde"}, @enc_lim, @hao={0xc9, 0x10, @remote}, @hao={0xc9, 0x10, @mcast2}, @padn, @jumbo]}]}}}}}, 0x0) 00:57:19 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x7, &(0x7f0000000000), 0x4) 00:57:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000046000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:19 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$rds(r0, 0x0, 0x0) 00:57:19 executing program 2: socket$inet(0x2, 0x0, 0x80000000) 00:57:19 executing program 3: r0 = socket(0xa, 0x3, 0x8) recvmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x1) 00:57:19 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x541b, &(0x7f0000000080)={'batadv_slave_0\x00'}) 00:57:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000900)={0x14, r1, 0x1, 0x0, 0x0, {0x2e}}, 0x14}}, 0x0) 00:57:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000140)) 00:57:19 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8912, &(0x7f0000000040)) [ 3431.964433][T16426] IPVS: sync thread started: state = BACKUP, mcast_ifn = tunl0, syncid = 0, id = 0 00:57:19 executing program 2: r0 = socket(0x2, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000002140)={&(0x7f00000001c0)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000001840)=[{&(0x7f00000004c0)=""/243, 0xf3}], 0x1}, 0x0) 00:57:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000048000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:19 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3, 0x1c) r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 00:57:19 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x100004, 0x4, 0x9, 0x1, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x7, 0x5, &(0x7f0000000040)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x98, &(0x7f00000000c0)=""/152, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:19 executing program 4: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000400)={'ip6gre0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @mcast2}}) 00:57:19 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) 00:57:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00004c000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9}, 0x48) 00:57:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8915, &(0x7f0000000440)={'gre0\x00', 0x0}) 00:57:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000180), r1) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r3, 0x1}, 0x14}}, 0x0) 00:57:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000051000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:19 executing program 4: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x89a0, 0x0) 00:57:19 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)="9a89abfb87144634f76825dba1", 0xd}, {&(0x7f00000000c0)="bce04a232cad74d148d60f7d13bf49566e2df924f4bbe48f0c5bff93a4e40c88d6b9de143d0285163a27dfd33d4aa3eb5bb5cfe680c5b2a74c3bf6ca03f8baedca89e458b10fbb23bbd3f65cea959bb60911e83c30bbddddf3a423cbae30ec148dd870a923f4ab8a64c3f5d2d0b95ce159a5586aeba17544405635b237490fbab5f34781c2eb5bc28e1bb428a65fd6917ae591ba3dc4e7f8778931e19ac242ded55aafd8b56e2857a18f5d317e0de1929d6b854a4a444c6b60fe2abead2c02141440016176db7ca4817b7840c1", 0xcd}, {&(0x7f00000004c0)="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", 0xf26}], 0x3}, 0x0) recvmsg$kcm(r1, &(0x7f0000002980)={&(0x7f0000001640)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000002900)=[{&(0x7f00000016c0)=""/4096, 0x1000}], 0x1}, 0x14061) 00:57:19 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000001e80)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000a80)={0x20, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x20}}, 0x0) 00:57:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000025c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000a40)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000a00)={&(0x7f0000000a80)={0x20c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x71, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000a00)={&(0x7f0000000c80)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="1400018008000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0800030000000000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x200}}, 0x0) 00:57:19 executing program 5: syz_clone(0x2a020480, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000055000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x895d, &(0x7f0000000440)={'gre0\x00', 0x0}) 00:57:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:auditd_unit_file_t:s0\x00'}]}, 0x40}}, 0x0) 00:57:19 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8b01, &(0x7f0000000080)) 00:57:19 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8906, 0x0) 00:57:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x1c, 0xf, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 00:57:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000060000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:20 executing program 2: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x60, 0x0, &(0x7f0000000140)) 00:57:20 executing program 3: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x84) 00:57:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0xffffffffffffff3a}]}, 0x1c}}, 0x0) 00:57:20 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) [ 3432.916604][T16485] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 00:57:20 executing program 3: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x2c, r0, 0x1, 0x0, 0x0, {{}, {}, {0x10, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) 00:57:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000068000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0), 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) 00:57:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x2c, 0x3, 0x1, 0x301, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x4}, @CTA_ZONE={0x6}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0xd}]}]}, 0x2c}}, 0x0) 00:57:20 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) 00:57:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x9, 0x0, 0x0, 0x0, 0x720}, 0x48) 00:57:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00006c000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:20 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x9, 0x3, &(0x7f0000000f80)=@framed, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:20 executing program 3: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}, @rand_addr=' \x01\x00'}}) 00:57:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8914, &(0x7f0000000440)={'gre0\x00', 0x0}) 00:57:20 executing program 4: syz_emit_ethernet(0xfc0, &(0x7f0000000040)={@empty, @multicast, @void, {@mpls_mc={0x8848, {[], @ipv6=@gre_packet={0x0, 0x6, "d13a14", 0xf8a, 0x2f, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0xe0d, 0x0, [], "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"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "264d8baad5924235e4419dc1a695e530152c0dc6f6f1039680a65651de684d7f8c05a7de42d898b433c023e0d6f38a107469cf83f37cf092e5"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0, 0x0, 0x0], "68adec4b708d2bea1fa57c739f6cb7e63e474a9af2960dd7f252e2540752eb4643cdafaf996cefe7f47adc8e80384f515df17ce8b7ca15f5899084681b676102b867a7fe2330fee8efbc35fdc214932b9e12e36d3a4d60810c448125bde9e985687c76190b5ef81cf7cc8bbacc1cacd1f54188d162c15aa5440b0dc4415d8d15ceaa2302b126ecbfa1cb0801784c1a4cea036ea125047e3537416e0eedb7d39a0672781f71110b71615bc8a5e9727b9540e089ee4b98f9414e5e38e820ddce473531cb9ee89a648352273e1135975f8546dce30796dc722af47302af506b9716259c683b24e0217ef9149bed70"}, {}, {}, {0x8, 0x6558, 0x0, "b0c6f3427a9df9bdbeff4ecb27"}}}}}}}}, 0x0) 00:57:20 executing program 2: socketpair(0xa, 0x3, 0xa1, &(0x7f00000003c0)) [ 3432.998918][T16509] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 00:57:20 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void}, {@ipv4={0x8864, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x21, 0x0, 0x21, 0x0, @empty, @empty}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "65aa1f", 0x0, "964434"}}}}}}, 0x0) 00:57:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000074000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x35, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, r1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:57:20 executing program 2: syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) 00:57:20 executing program 5: r0 = socket$phonet(0x23, 0x2, 0x1) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8910, &(0x7f0000000040)={'wlan0\x00'}) 00:57:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x0, @rand_addr=0x64010100}, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}}) 00:57:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00007a000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:20 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x2}, 0xc, &(0x7f0000000100)={0x0}}, 0x0) 00:57:20 executing program 2: r0 = socket(0x2a, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_PMK(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 00:57:20 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x890d, 0x0) 00:57:20 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) 00:57:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000084000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:20 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x7, 0x4, &(0x7f0000000180)=@framed={{}, [@ldst={0x2, 0x0, 0x3}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:20 executing program 3: syz_genetlink_get_family_id$gtp(&(0x7f00000004c0), 0xffffffffffffffff) 00:57:20 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x2e, &(0x7f0000000140), 0x4) 00:57:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4, 0x80, 0x800, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 00:57:20 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5421, &(0x7f0000000080)) 00:57:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@int={0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x12, 0x6}]}, {0x0, [0x0, 0x0]}}, &(0x7f00000001c0)=""/158, 0x2c, 0x9e, 0x1}, 0x20) 00:57:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000090000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000180), r1) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r2, 0x1}, 0x14}}, 0x0) 00:57:20 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0x9, 0x0, 0x0) 00:57:20 executing program 3: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x76) 00:57:20 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0x16, 0x0, 0x0) 00:57:20 executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) 00:57:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000b1000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000fe000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:20 executing program 2: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x8, 0x0, &(0x7f0000000140)) 00:57:20 executing program 4: bpf$BPF_LINK_UPDATE(0x10, &(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff, 0x757ee68106d3f84e}, 0x10) 00:57:20 executing program 0: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x401c5820, &(0x7f0000000040)={'wlan0\x00'}) 00:57:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x0, 0x0, 0x1, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast2}}}}) 00:57:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="83439cae00000100000005", @ANYRES32], 0x1c}}, 0x0) 00:57:20 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x3, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0xa0}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @mcast1}}) 00:57:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001c00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a"], 0xec0}}, 0x0) 00:57:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8914, &(0x7f0000000040)={'syztnl2\x00', 0x0}) 00:57:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000006010000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:20 executing program 2: r0 = socket(0x2a, 0x2, 0x0) bind$l2tp6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x20) 00:57:20 executing program 0: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x18, 0x0, &(0x7f0000000140)) 00:57:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000010010000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:20 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmsg$802154_raw(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:57:20 executing program 3: r0 = socket(0x2, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000002140)={&(0x7f00000001c0)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000001840)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1, &(0x7f0000001f00)=[@rdma_dest={0x18}, @mask_fadd={0x58, 0x114, 0x8, {{}, 0x0, 0x0}}], 0x70}, 0x0) 00:57:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x7c, &(0x7f0000000080)=@assoc_value, 0x8) 00:57:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x5450, 0x0) 00:57:20 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000540)={0x1f, 0xffffffffffffffff}, 0x6) 00:57:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xa, 0x0, 0x0, 0x0, 0x69}, 0x48) 00:57:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8934, &(0x7f0000000440)={'gre0\x00', 0x0}) 00:57:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000016010000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:20 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x2, 0x0, 0x56) 00:57:20 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @local}}}}) 00:57:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000018010000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:20 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000100), 0x4) 00:57:20 executing program 5: bpf$BPF_PROG_GET_FD_BY_ID(0x3, 0x0, 0x0) 00:57:21 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000000)={0xa}, 0xc, &(0x7f0000000100)={0x0}}, 0x0) 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000019010000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:21 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x6, 0xf4240, &(0x7f0000000f80)=@framed={{}, [@ldst, @func, @btf_id]}, &(0x7f0000000940)='GPL\x00', 0x0, 0xfffffffffffffeda, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x8, 0x8001, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xe000000}, 0x48) 00:57:21 executing program 0: syz_emit_ethernet(0x8e, &(0x7f0000000080)={@broadcast, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x54, 0x2c, 0x0, @remote, @private2, {[@hopopts={0x0, 0x0, '\x00', [@generic={0x0, 0x1, "93"}]}]}}}}}, 0x0) 00:57:21 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void}, {@ipv4={0x8864, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x1e, 0x0, 0x0, 0x21, 0x0, @empty, @empty}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "65aa1f", 0x0, "964434"}}}}}}, 0x0) 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00001a010000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x8901, &(0x7f0000000040)) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'macsec0\x00', {0x2}, 0x40}) 00:57:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x0, 0x7a8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80000001}, @in6={0xa, 0x0, 0x0, @empty}], 0x58) 00:57:21 executing program 3: socket(0x1, 0x0, 0xfff) 00:57:21 executing program 0: ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'sit0\x00', 0x0}) socketpair(0x1a, 0x4, 0x2dad, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000640), &(0x7f0000000680)=0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000e80), r0) 00:57:21 executing program 0: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x11, 0x0, 0x0, &(0x7f0000000140)) 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00001b010000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x21, &(0x7f0000000080)=@assoc_value, 0x8) 00:57:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0), 0xa0) 00:57:21 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000a80), 0x4) 00:57:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2c, 0x2, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_CFG_MASK={0x8}, @NFQA_CFG_CMD={0x8}, @NFQA_CFG_FLAGS={0x8}]}, 0x2c}}, 0x0) 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000038010000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:21 executing program 0: r0 = socket(0x11, 0x2, 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000440)={&(0x7f0000000380), 0xc, &(0x7f0000000400)={0x0}}, 0x0) 00:57:21 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f00000013c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfdfffe00}, 0x20) 00:57:21 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x8, 0x8001, 0xc}, 0x48) 00:57:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000004a00)={0x0, 0x0, &(0x7f00000049c0)={&(0x7f00000011c0)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}]}, 0x4c}}, 0x0) 00:57:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000001080)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, 0x6}) 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000094010000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:21 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x1e, 0x0, &(0x7f0000000040)) 00:57:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x7, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @empty}}}}) 00:57:21 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x18}, 0x0) 00:57:21 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x0, 0x0, @private1}], 0x3c) 00:57:21 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r1) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x903, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000be010000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x8e}, 0x0) [ 3434.411887][ T25] audit: type=1400 audit(3441.446:789): avc: denied { setopt } for pid=16668 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 00:57:21 executing program 2: r0 = socket(0xa, 0x3, 0x8) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000000c0)={@l2={0x1f, 0x0, @fixed}, {0x0}, 0x0}, 0xa0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x890b, &(0x7f0000000080)={'batadv_slave_1\x00'}) 00:57:21 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8953, 0x0) 00:57:21 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8912, &(0x7f0000000000)='\n') 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000f4010000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:21 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x22}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:21 executing program 0: sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, 0x0, 0x0) 00:57:21 executing program 5: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x89e0, 0x0) 00:57:21 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000040)={0x2c, 0x0, r2}, 0x10) 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000004020000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@int={0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x12}]}, {0x0, [0x0, 0x0]}}, &(0x7f00000001c0)=""/158, 0x2c, 0x9e, 0x1}, 0x20) 00:57:21 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) sendmsg$tipc(r0, &(0x7f0000000080)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10, 0x0}, 0x0) 00:57:21 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$inet_udp_int(r0, 0x11, 0x29, 0x0, 0x0) 00:57:21 executing program 4: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@random="652ab45efa6d", @empty, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "df07af", 0x14, 0x4, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @local}, {[@srh], "756679e42a674cf93c164f3a"}}}}}, 0x0) 00:57:21 executing program 3: syz_emit_ethernet(0xfffffdef, &(0x7f00000001c0)={@remote, @dev, @val={@void}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "9a6999", 0x18, 0x3a, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}}}}, 0x0) 00:57:21 executing program 2: r0 = socket(0x2, 0x3, 0x8) accept4$packet(r0, 0x0, 0x0, 0x0) 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000f020000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x40000040) 00:57:21 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c00)={0x19, 0x3, &(0x7f0000000f80)=@framed, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:21 executing program 5: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x16) 00:57:21 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000180)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x28}}, 0x0) 00:57:21 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x2, 0x6, &(0x7f0000000280)=@framed={{}, [@func, @func, @func]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00006a020000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:21 executing program 2: bpf$OBJ_GET_PROG(0x11, &(0x7f00000001c0)={0x0, 0x0, 0x28}, 0x10) 00:57:21 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x5, 0x2, &(0x7f0000000180)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000e4020000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x100000a, 0x11, r0, 0x0) 00:57:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x2046, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) 00:57:21 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000000)={0xa}, 0x17, &(0x7f0000000100)={0x0}}, 0x0) 00:57:21 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x2, &(0x7f0000000040)) 00:57:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x1, 0x0, 0x0, {0x3}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000e5020000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:21 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast1}}}, 0x108) 00:57:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x4, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x1}, {0x8}, {0x3}, {0x6, 0x2}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000300)=""/170, 0x48, 0xaa, 0x1}, 0x20) 00:57:21 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) 00:57:21 executing program 5: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x70bd25, 0x25dfdbfe}, 0x14}}, 0x0) r0 = socket(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x890b, &(0x7f0000000080)={'batadv_slave_0\x00'}) 00:57:21 executing program 3: syz_emit_ethernet(0x96, &(0x7f0000000080)={@broadcast, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x5c, 0x33, 0x0, @remote, @private2, {[@hopopts={0x0, 0x2, '\x00', [@generic={0x0, 0xe, "9377143464d0a15c42775a4d2407"}]}]}}}}}, 0x0) 00:57:21 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) sendmsg$tipc(r0, &(0x7f0000000080)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x2, 0x4}}, 0x10, 0x0}, 0x0) 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000e6020000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast1}, 0x104, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='ipvlan1\x00'}) 00:57:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[{0x10, 0x84}], 0x10}, 0x0) 00:57:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), r1) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 00:57:21 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x7, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x8d}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_netfilter(r0, &(0x7f00000004c0)={&(0x7f0000000000), 0xc, &(0x7f0000000480)={0x0, 0x3f8}}, 0x0) 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000e7020000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:21 executing program 4: r0 = socket(0xa, 0x3, 0x8) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000000c0)={"7640d3b55800000062b700"}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x890b, &(0x7f0000000080)={'batadv_slave_1\x00'}) 00:57:21 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01022cbd7000fedbdf252b0000000a0001007570616e300000000c0005000203aaaaaaaaaaaa0a0001007770616e31"], 0x38}}, 0x0) 00:57:21 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000140)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r2) 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000f9020000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:21 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000000140)=ANY=[], 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) 00:57:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8927, &(0x7f0000000100)={'gre0\x00', 0x0}) 00:57:21 executing program 2: socketpair(0x1e, 0x801, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$pppoe(r0, 0x0, 0x0) 00:57:21 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000001800)) 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000030000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:21 executing program 3: r0 = socket(0xa, 0x3, 0x8) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, &(0x7f0000000040)={0x0, 0x0, 0x6, 0x7}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x890b, &(0x7f0000000000)={'batadv_slave_1\x00'}) 00:57:21 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xe, 0x2, &(0x7f0000000180)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000ac0)={'syztnl1\x00', 0x0}) 00:57:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x13, 0x0, 0x0) 00:57:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000079030000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x4000) 00:57:22 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x7b, &(0x7f0000000040)=[@in={0x2, 0x0, @rand_addr=0x80}], 0x10) 00:57:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000094030000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x24, 0x0, 0x0) 00:57:22 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x64, 0x0, 0x20, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_DURATION={0x8, 0x57, 0x6}, @NL80211_ATTR_DURATION={0x8, 0x57, 0x3f}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xffffffff}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x3ff}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x15b8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x9}], @NL80211_ATTR_DURATION={0x8, 0x57, 0xfffffff8}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x4004) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000000)={0x0, 'dummy0\x00', {}, 0x200}) getsockopt$inet_tcp_int(r0, 0x11e, 0x0, 0x0, &(0x7f00000001c0)) getsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000180), &(0x7f0000000200)=0x4) 00:57:22 executing program 5: socket$inet6(0xa, 0x5, 0x76) 00:57:22 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000025c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000a80)={0x34, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}]}]}, 0x34}}, 0x0) 00:57:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000b1030000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000003c0)={'ip6_vti0\x00', 0x0}) 00:57:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x4, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x1}, {0x8}, {0x3}, {0x0, 0x2}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000300)=""/170, 0x48, 0xaa, 0x1}, 0x20) 00:57:22 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000005c0), r0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x14, r2, 0xc21, 0x0, 0x0, {0x22}}, 0x14}}, 0x0) 00:57:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x891a, &(0x7f0000000040)) 00:57:22 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffb}], &(0x7f0000000080)='syzkaller\x00', 0x5, 0xd4, &(0x7f0000000180)=""/212, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:22 executing program 0: r0 = socket(0x2a, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x7ffffffff000}}, 0x0) 00:57:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000bc030000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000001480)={'ip6gre0\x00', &(0x7f0000001400)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @remote, 0x0, 0x20}}) 00:57:22 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000005c0), r0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x14, r2, 0xc21, 0x0, 0x0, {0x2a}}, 0x14}}, 0x0) 00:57:22 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x8b}, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:22 executing program 0: socketpair(0x2b, 0x0, 0x0, &(0x7f0000000200)) 00:57:22 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14}, 0xf}}, 0x0) 00:57:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000c1030000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:22 executing program 0: r0 = socket(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8971, &(0x7f0000000080)={'batadv_slave_1\x00'}) 00:57:22 executing program 4: r0 = socket(0x25, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 00:57:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x2, 0x3, 0x3, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x1c}}, 0x0) 00:57:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x15) 00:57:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000d0030000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:22 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2a, &(0x7f0000000200)={0x0, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x0, @local}}}, 0x108) 00:57:22 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x541b, &(0x7f0000000080)={'wlan0\x00'}) 00:57:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000200)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @loopback}}) 00:57:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x1002}, 0x4) 00:57:22 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f0000000600)={&(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x3}}, 0x10, 0x0}, 0x0) 00:57:22 executing program 3: syz_emit_ethernet(0x42, &(0x7f0000000200)={@link_local, @remote, @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev, {[@rr={0x7, 0x3, 0x43}]}}, @time_exceeded={0xb, 0x1, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, @dev, @multicast2}}}}}}, 0x0) 00:57:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000002040000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:22 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000600), r1) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x20, r2, 0x101, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x0) 00:57:22 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYRESHEX, @ANYRES32=r0], &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000100)=0x98) 00:57:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) 00:57:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={0x0}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 00:57:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8910, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @empty}}}}) 00:57:22 executing program 3: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x75) 00:57:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000006040000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:22 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x45, &(0x7f0000000140), 0x4) 00:57:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x8, &(0x7f0000000080)=@assoc_value, 0x8) 00:57:22 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x10, 0x0, &(0x7f00000001c0)) 00:57:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000016040000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 00:57:22 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8b00, &(0x7f0000000080)) 00:57:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0xc, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @remote}, @in6={0xa, 0x0, 0x0, @private0}, @in6={0xa, 0x0, 0x0, @loopback}, @in={0x2, 0x0, @dev}, @in6={0xa, 0x0, 0x0, @loopback}, @in6={0xa, 0x0, 0x0, @ipv4}], 0xfef0) 00:57:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRES32=r1, @ANYRES16=r1, @ANYBLOB="01002cbd70000000000001"], 0x34}}, 0x0) 00:57:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00001e040000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:23 executing program 3: r0 = socket(0x2b, 0x1, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 00:57:23 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x34, r1, 0x201, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_LEVEL={0xc, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8}]}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x34}}, 0x0) 00:57:23 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f0000000340)={&(0x7f0000000040)=@id, 0x10, &(0x7f0000000300)=[{&(0x7f0000000100)="9a", 0x1}], 0x1}, 0x0) 00:57:23 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000600)={'sit0\x00', &(0x7f0000000580)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private1}}) 00:57:23 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000000)={0x0, 0x0, 0x1, '\''}, 0x9) 00:57:23 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@broadcast, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x44, 0x2c, 0x0, @remote, @private2}}}}, 0x0) 00:57:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c0000006600010004000000ffdbdf2500000000", @ANYRES32=r2, @ANYBLOB="00000000000000000000100008000b"], 0x2c}}, 0x0) 00:57:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000050000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x34, r1, 0x1, 0x0, 0x0, {}, [@nsim={{0xe, 0x8e}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) 00:57:23 executing program 5: syz_emit_ethernet(0x5a, &(0x7f0000000000)={@link_local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "bb12da", 0x24, 0x6, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev={0xfe, 0x80, '\x00', 0xa}, {[@fragment, @fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:57:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c0000006600010004000000ffdbdf2500000000", @ANYRES32=r2, @ANYBLOB="00000000000000000000100008000b"], 0x2c}}, 0x0) 00:57:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x4, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x1}, {0x8}, {0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000300)=""/170, 0x48, 0xaa, 0x1}, 0x20) 00:57:23 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="18"], 0x18}}, 0x0) 00:57:23 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000380)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "c2c1e3fd602562f9e3f444f015378f9d37a754b08950e197fcc2090101000000000000e5f092ad5d9f6bc9d711228a4e3e1a04c4da87fed8efc1b70400"}, 0x60) 00:57:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000060000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:23 executing program 5: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x50, 0x0, &(0x7f0000000140)) 00:57:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_buf(r0, 0x0, 0x29, 0x0, 0x0) 00:57:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c0000006600010004000000ffdbdf2500000000", @ANYRES32=r2, @ANYBLOB="00000000000000000000100008000b"], 0x2c}}, 0x0) 00:57:23 executing program 4: getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000040)) r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000005c0)) 00:57:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000001060000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:23 executing program 0: syz_emit_ethernet(0xa6, &(0x7f0000000080)={@local, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x6c, 0x2f, 0x0, @remote, @private2, {[@hopopts={0x0, 0x3, '\x00', [@enc_lim, @ra, @hao={0xc9, 0x10, @mcast2}, @padn]}], {{}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0xff}, 0x2, {0x0, 0x0, 0x0, 0x0, 0x1}}}}}}}}}, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000003d00)={&(0x7f0000003c00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000003cc0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0], 0x14}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x3c, 0x0, 0x0, 0x70bd2d, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6tnl0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x410}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000004c0), 0xffffffffffffffff) connect$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @remote}, 0x14) socket$packet(0x11, 0x2, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="1055f8e1f417"}, 0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, 0x0, 0x2, 0x70bd2d, 0x0, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r0}]}, 0x2c}}, 0x4008000) bpf$ITER_CREATE(0x21, 0x0, 0x0) 00:57:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c0000006600010004000000ffdbdf2500000000", @ANYRES32=r2, @ANYBLOB="00000000000000000000100008000b"], 0x2c}}, 0x0) [ 3436.786459][T16942] netlink: 'syz-executor.2': attribute type 142 has an invalid length. [ 3436.814039][T16951] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16951 comm=syz-executor.4 00:57:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0xfffffffffffffde1}}, 0x0) 00:57:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={&(0x7f00000003c0)=@newtfilter={0xec4, 0x2c, 0x0, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}, @filter_kind_options=@f_basic={{0xa}, {0xe8c, 0x2, [@TCA_BASIC_ACT={0xe88, 0x3, [@m_skbmod={0x150, 0x0, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_ETYPE={0x6}, @TCA_SKBMOD_PARMS={0x24}, @TCA_SKBMOD_ETYPE={0x6}]}, {0xe5, 0x6, "6b19569c0d15a554d0d04e513972ea140c93c97c40591b52534189a8e470c23e87270da663e394b1bb17ec37f4a428c43f8a7146f9deda0854e1794b7f0c94606425878071b5b18583aec3412edd0390c0f4d5e9583eaaeb274e035627120576c2d6bb05f5ea9c44cce4e6d586da495fd809d540b92fe24886136e7b2a4ca1a19dadb06cb50ff415bfb364b74b476b533abd335d7883b8fb05847f46a770a342e100c6c7e644fda89957009c419741b8942c0ad1f6b781ba3eeeb12440cecd56f38aeed995779046e601770dc982994034b2bb41c59451e04b77cb0380137bb070"}, {0xc}, {0xc}}}, @m_tunnel_key={0xb8, 0x0, 0x0, 0x0, {{0xf}, {0x44, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @private0}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6}, @TCA_TUNNEL_KEY_PARMS={0x1c}]}, {0x45, 0x6, "b4569c4fc66814b7ac89a235a9cd07c1556537a9f6d779a46fe37258683bac1a7c7614e21f838864332564d763d8eecb95f15315937c7a7db4298b86b8199fe921"}, {0xc}, {0xc}}}, @m_ct={0x78, 0x0, 0x0, 0x0, {{0x7}, {0x14, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MAX={0x6}, @TCA_CT_NAT_PORT_MAX={0x6}]}, {0x3d, 0x6, "11ca410f1a9b2f2a0fdd7d9d4ba0ab36289f09197854ab46d8885aae79a642f4c75e865699ccaee41908f48d4ee1516f25847f3c32bdad2cc2"}, {0xc}, {0xc}}}, @m_skbedit={0xc04, 0x0, 0x0, 0x0, {{0xc}, {0x4}, {0xbd5, 0x6, "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"}, {0xc}, {0xc}}}]}]}}]}, 0xec4}}, 0x0) 00:57:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000004060000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:23 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[@ANYBLOB="e4010000130001"], 0x1e4}}, 0x0) 00:57:23 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r1) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x903, 0x0, 0x0, {0x31}}, 0x14}}, 0x0) 00:57:23 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f00000006c0), &(0x7f0000000700)=0x4) 00:57:23 executing program 2: bpf$OBJ_GET_PROG(0x9, &(0x7f00000001c0)={0x0, 0x0, 0x28}, 0x10) 00:57:23 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8915, &(0x7f0000000040)) 00:57:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000070000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:23 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x64, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}, @in6={0xa, 0x0, 0x0, @local}], 0x2c) 00:57:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@private2, @in=@initdev}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f0000000380)=0x2ad850099f910939) 00:57:23 executing program 3: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wg2\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x18882020}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@delneigh={0x64, 0x1d, 0x100, 0x0, 0x25dfdbfe, {0xf, 0x0, 0x0, r0, 0x20, 0x0, 0x4}, [@NDA_CACHEINFO={0x14, 0x3, {0xffffffbf, 0x7, 0x0, 0xfffffffd}}, @NDA_VLAN={0x6}, @NDA_IFINDEX={0x8}, @NDA_FLAGS_EXT={0x8}, @NDA_FLAGS_EXT={0x8, 0xf, 0x1}, @NDA_DST_IPV6={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}]}, 0x64}}, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)}, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000004c0), 0xffffffffffffffff) 00:57:24 executing program 2: setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, 0x0, 0x0, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xff}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8848}, 0x20040014) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'batadv_slave_1\x00'}) syz_genetlink_get_family_id$team(&(0x7f0000000a40), 0xffffffffffffffff) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) 00:57:24 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void}, {@ipv4={0x800, @dccp={{0x9, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x21, 0x0, @empty, @empty, {[@generic={0x86, 0x9, "954d3b34d34624"}, @timestamp={0x44, 0x4}]}}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "65aa1f", 0x0, "964434"}}}}}}, 0x0) 00:57:24 executing program 3: r0 = socket(0x2, 0x5, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x84, 0x7c) 00:57:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000090000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "ec"}]}}, &(0x7f0000000280)=""/250, 0x2a, 0xfa, 0x1}, 0x20) 00:57:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x18, 0x1, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_FILTER={0x4}]}, 0x18}}, 0x0) 00:57:24 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001600), 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000001f80), 0xffffffffffffffff) 00:57:24 executing program 4: unshare(0x20000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 00:57:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)={0x268, 0x0, 0x5, 0x401, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "e15d4e854d00ef810b6ceca86e98341ed7d294c869b85333147279d503dc0303", "c656109b4738e9de879f04c4701399457f826300ae9b6852bf7c911f9db678ea"}}}]}, 0x268}}, 0x0) 00:57:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000a0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x400000, 0x8001}, 0x48) 00:57:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x8}, {}]}]}}, &(0x7f0000000300)=""/170, 0x36, 0xaa, 0x1}, 0x20) 00:57:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000b0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x2, 0x2, &(0x7f0000000140)=@raw=[@initr0], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:24 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x541b, 0x0) 00:57:24 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r2) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r2) 00:57:24 executing program 4: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void}, {@ipv4={0x8100, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @empty, @empty}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "65aa1f", 0x0, "964434"}}}}}}, 0x0) 00:57:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e24, 0x0, @private0}, @in={0x2, 0x4e24, @multicast2}], 0x3c) 00:57:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000c0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:24 executing program 5: r0 = socket(0x25, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000400)={'ip6gre0\x00', &(0x7f0000000380)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @mcast2}}) sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 00:57:24 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x13, 0x2, &(0x7f0000000180)=@raw=[@call, @exit], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x9d, &(0x7f0000000080)=""/157, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:24 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, 0x0) 00:57:24 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000000)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}}}, &(0x7f00000000c0)=0x98) 00:57:24 executing program 5: r0 = socket(0x2, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)="c2478a304e2c196834c3e33e16c167d5", 0x10}, 0x0) 00:57:24 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000600), r1) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x101, 0x0, 0x0, {0x23}}, 0x14}}, 0x0) 00:57:24 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@random="652ab45efa6d", @empty, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "df07af", 0x8, 0x4, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @local}, {[@srh]}}}}}, 0x0) 00:57:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000d0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:24 executing program 2: socketpair(0x0, 0x4, 0x0, &(0x7f00000000c0)) 00:57:24 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c}, 0x1c}}, 0x0) 00:57:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000000400)={&(0x7f00000000c0)=@nl=@proc={0x10, 0x0, 0x25dfdbfe}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)="15", 0x1}], 0x1}, 0x0) 00:57:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x27, 0x0, &(0x7f00000007c0)) 00:57:24 executing program 4: syz_emit_ethernet(0x86, &(0x7f0000000080)={@broadcast, @broadcast, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "0151f0", 0x4c, 0x2c, 0x0, @remote, @private2, {[@hopopts]}}}}}, 0x0) 00:57:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000e0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:24 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r1) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x903, 0x0, 0x0, {0x30}}, 0x14}}, 0x0) 00:57:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000f0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000180)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) 00:57:24 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) syz_genetlink_get_family_id$mptcp(&(0x7f0000001100), 0xffffffffffffffff) 00:57:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, 0x0, 0x0) 00:57:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000020f0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:25 executing program 2: syz_emit_ethernet(0x52, &(0x7f00000001c0)={@remote, @dev, @val={@void, {0x8100, 0x1}}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "9a6999", 0x18, 0x3a, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}}}}, 0x0) 00:57:25 executing program 4: r0 = socket(0xa, 0x3, 0x8) socket$key(0xf, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x890c, &(0x7f0000000080)={'batadv_slave_1\x00'}) 00:57:25 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x4c049) 00:57:25 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r1) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01022cbd7000fedbdf252b0000000a0001007570616e300000000c0005000203aaaaaaaaaaaa0a0001"], 0x38}}, 0x0) 00:57:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000001100000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:25 executing program 3: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x88, 0x0, 0x0, &(0x7f0000000140)) 00:57:25 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000540)={0x1f, 0xffffffffffffffff, 0x1}, 0x6) 00:57:25 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000000c0)=0x10000, 0x4) 00:57:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x1, 0x1, 0x201, 0x0, 0x0, {0xa}, [@CTA_STATUS_MASK={0x8}, @CTA_LABELS={0x4}]}, 0x20}}, 0x0) 00:57:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000380)) 00:57:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000020100000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @in], 0x2c) 00:57:25 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @link_local}, 0x10) 00:57:25 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0xffffffffffffffa9) 00:57:25 executing program 2: r0 = gettid() rt_sigqueueinfo(r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x5638a3c3}) 00:57:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000110000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:25 executing program 3: syz_clone(0x90001900, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:25 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) accept$inet6(r0, 0x0, 0x0) 00:57:25 executing program 0: r0 = socket(0xa, 0x3, 0x8) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 00:57:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, &(0x7f0000000700)) 00:57:25 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="10fb"], 0x30}}, 0x0) 00:57:25 executing program 3: syz_io_uring_setup(0x0, &(0x7f0000000180), &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 00:57:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @loopback}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x47, 0x2}) 00:57:25 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) syz_genetlink_get_family_id$tipc(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x0) 00:57:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000120000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 3438.831570][T17100] device batadv_slave_0 entered promiscuous mode [ 3438.836324][T17098] device batadv_slave_0 left promiscuous mode 00:57:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xa, 0x0, 0x0, 0x0, 0x1000, 0x1}, 0x48) 00:57:25 executing program 4: syz_open_procfs(0x0, &(0x7f0000000840)='attr/keycreate\x00') 00:57:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x4, &(0x7f0000000040), 0x4) 00:57:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000001160000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:25 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000600), 0x0, 0x0) syz_io_uring_setup(0x3741, &(0x7f0000000140)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 00:57:25 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) 00:57:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8936, 0x0) 00:57:26 executing program 0: bpf$ENABLE_STATS(0x20, 0x0, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x2fffffd, 0x8d071, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='mm_page_free_batched\x00', r0}, 0xf) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca31, 0xffffffffffffffff, 0x0) 00:57:26 executing program 5: sigaltstack(&(0x7f0000000180)={0x0, 0x23be8ec5216be82c}, 0x0) 00:57:26 executing program 3: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x1a, &(0x7f0000000240)=ANY=[], 0x0) 00:57:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f5, &(0x7f0000000280)={'sit0\x00', 0x0}) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000004160000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x20}, @NFQA_CFG_MASK={0x8}]}, 0x24}}, 0x0) 00:57:26 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x5, r0, 0x0) 00:57:26 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x2, 0xfff, 0x4, 0x8}, 0xa1) 00:57:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001180)=@base={0x16, 0x0, 0x1f, 0x5, 0x48, 0x1}, 0x48) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000180000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2042, 0x0) 00:57:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) 00:57:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 00:57:26 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/user\x00') 00:57:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x10e, 0x0, 0x0, 0x4) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000001180000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x4020940d, &(0x7f0000000500)={'wg1\x00'}) 00:57:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x10e, 0xc, 0x0, 0x0) 00:57:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) 00:57:26 executing program 4: keyctl$unlink(0xa, 0x0, 0x0) 00:57:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000140)="9b23", 0x2, 0x0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x20000110) 00:57:26 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, r1) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000001190000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000001a0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0xd04, 0xd, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xcd4, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}]}, {0x30, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x81}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x3}]}, {0x6e0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0x89, 0x6, 0x1, 0x0, "c8fe8401277fbbec14210f2d0e16773a34da2cde62b752b7fe856e9d1c914aeea2c35b8e95011e778d848a6e8a7928126bdb06c268a4630e8850ca37c9122cb673f2a9eb48d9fac777191cd9e26ceb55235d50f1ad7cf98fac0820812af1d4dcb6e3c81e03da83d17e2a20fe2249a44c64ce1c83bb11d2d05de2ad4a4480f1a4bdc67d2efb"}, @NFTA_SET_ELEM_KEY={0x24c, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x1f, 0x1, "f4b27f6ece9166b701dd789542d7c32a95792eefbaf77ba62e2956"}, @NFTA_DATA_VALUE={0x87, 0x1, "c00c202dae8ea77c4a57b481cd6a9916bb71498713cdf881d84ef1570753b5bd6d4db88eeb5d008ce888f43c826b3197a634070fac99ceabbe084b20a8fae0626fbb9b6f27362734dd92956794b84152d0c17c328b5f436f8b4ced11d2e0bf18cf9aac7be7e72b2afc4b6c0f425eb83270fb7744fc5cd9d2b73a435e2386fb193d0952"}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1f}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1f}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x4}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x8d, 0x1, "9ceb7cc0c5ed91865b986e4f810ec3483ee30b5c8d59c47d98dc545359a3036c9855377659372eca4050a7ea007c50573e92bed4c695835a26cdf632f193936e5afaea5fd5c0e14582d3bbc674ceefed1b7c7cc8125d825b32f68afec7ebabcb3588b4c321fe72f06478a0bdd0f63d5a5cd2c52ed2808324f2afcb0431208e65219483b845356c8596"}, @NFTA_DATA_VALUE={0x51, 0x1, "e3918bd9fdd7ff185951af62543f08b82fceb0a1e7e5019376d338b59ceaab930e6c90b2cddb5ab8b8efb1957cd2f08e655aac020e7626809c2e76db3ef51771430720d7a679c123357c60520a"}, @NFTA_DATA_VALUE={0x15, 0x1, "4bcdd63755dfa1f2a95870535574cff97b"}, @NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_SET_ELEM_KEY={0x32c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0xec, 0x1, "df1ecee627dda991a6d049eedfa1b0d38056484f88d510328c2d9973b67ff49864d704952a384af8aa04a1fed8918cc35c19e639385690c173e9c675e4a8f6929b6121924000bd93a67471dc4b4e3c0391dfedcc442ae367a9d0b72b6d7e400286c40bb9c2c950c7f8305bd7bb832261a94f5f78acbf1a124224f10a5caf58482ab00a0d1ae451ccde6b6d937d2171361fcb7df1bf4c0922aff60fc149840dec405d3cbffbcabaa7bded1ee7133f5bd0091e94b0308ebf7d793d119c1b7b3fe861afba950d323ca5880cb07df0487832eb463c791f1b2ab784f5cb8a2dc4b3833d4a914cbc23ed45"}, @NFTA_DATA_VALUE={0x2a, 0x1, "2d5bab1e73b98b2a4ff0d74125ca3f0f632d41ec062fdeac1943da6f0d806b1a2e7e8fca1f4b"}, @NFTA_DATA_VALUE={0x7e, 0x1, "97de7239c87dc9b248dce2f7300a1deb025955fb02c8532b4bd2841854c6747317ff8134c4824e5ae0d1e5048c1976360ac5e7d50d6e33583218cf9b5c8f59d447f25f7040ecce95100d5ba94c77ea6115ed98f315208443a052acb3209fab8abc35d593823bbafbfec1cdecc7d24111d493f142b1ebbefde8bf"}, @NFTA_DATA_VALUE={0x4d, 0x1, "fc2060587c29ef0f7d126e923d98870aa312d0c0ab8e886fd317fef0e22beac50ef58e8c017f05857fe6bb00722b3c139e49af67491520b78e5b88b68bacf9de807f776bf0aa966678"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x8000000000000004}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0xf1, 0x1, "693736c5046cf180596b2b55f3dd8a1f212ed1d941398e3fd5df2d3de3b9ff4b31a22c1839d1b9fef22ee292e4395ee6edaacad2215c30da362152d2a785cdbf735ab315bdec8d023f59f5792d0360a3c326941043c14316e499e36bdcd8a484d5cc6d8c8c7af788d8cb8af6abcba44d8995c76156df54a03537185dad3abb0886b83ce8d44c4de08f29bf679936584d28476e9d5b0d09dcdcc13d51fae7683f35119111c23253942996e04eb7db5b469cca79b0eeabce65fe2ca6d513b54f2e1efaf907af73c52ac4a83fda836a186671fda1e8a20f761358386476aca02dc8fad5dbdcf1fd09a5454a9250f1"}]}, @NFTA_SET_ELEM_USERDATA={0xd5, 0x6, 0x1, 0x0, "806a3789d9ab2a3dbd91fab2be0ff5102cee1c226fc56b6adc4c6b597faef7f0b32efa7987550d77d356aa4ef3855d7e83208b92031a834c02ba6708c95974e4ef2db87e593182bb7a84b02dba2eff6249370a14ce6c1582f5da40de74e2934cb7ad4d76d911b67d7df78236605c8d0d738bf2c7911375fac4a7de2ac77054e0a5435b5de3debd203ebc4c0aca8be4a53a34721a3ba5772471c6ce6e8e495607a580f85fc41cf6f30a9f4088b8af892aa219e9376b89c8e5487e2dcd04a6314775f4e7d54901ee6365187b715dfbeba8a6"}]}, {0x5b8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x5b4, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x4f5, 0x1, "cc7546f54a0a4301410ede98723eefc7171c062c6616dcebe8147f7055c4ede22b44e3e42181834b35e409e5daeed8f2205696cec6d498fc70cc4187b2cda348616d691e4a9b5a902129d04ebf71ccf5cc93b0efae42d3b4db4049db044029c6a9635d4ddcfdf711f7414e01d7aad6470617abdd5cf46fb22b1b6dfcb56318c5897774e0e16cdc58b9be0f95739e92f350d721793a06e593332abd572cf8c89d0126956e56d4b2c87beb418c64897e5c648acbb9596ecb687fcfa2b064aaddaf18ba8fab35895544ac3b6c491d7b72cc74f294b01f89c7db663db6a2d3524f555a6e9415c284913078d822057fe358461a1afddab991259b6902b2c78aa0ceda44c29747ed19d96c201a3dd8db6e3b88c1cf2fadfe1364b7e5313c9716cc70728391a0b75a2044dc4e314c8a8424310365201f24c395641697ed91575cb3008f6f9d4e180426312609e358344e43e0184226154848120bae70c66d2baca2508a150b4ffcfa78cdb8591575bbf53fe5a1ea1a292cbb6a464e199cc247609bc7cc3a11b7ec6614a4f8dcce34573320ece1aad2f5a1aee6120d9f2fb2f66bbda08056b6ef9dea9802d13cdaf7e42344676ff3c849567e937ea636ec992bfb12593dba1a9f518bb08cddfa9fc3c8772f4dece4c38b6a76ca10c0be18182a8d58f1eea8516321e4c4122333bf3d08955d9e26bcaac970c0dc8cb7473f936baa58ddcbab6277cabd7e017f29c12ef82e8d185ba1f42244c040c80b3325ed25fab6cbcb84cbd6319787a62003517ab43b41e921759da266389588f00f388fbf1d5fd36eb4d580319b660fb29b65ffaad02980efcf0c3c746c13c8c842562cc35453b8ad8d881c5f528c134cbd4f5fdf699c6968a61b37b613d664b6cdd985cb80e22210e6ceff4bae3fb57c3323819c35398ee723d0df7ec0fe1114c51d55e725d6684e4e13f03f3d087634366f7e726838b26d1306a59ddfbe4cdd1185b5fc244d0a10d35015265475a575e884ee71d6d159605566f8fb46fb62b7f8679b782c8ff4d66358a46dd65222ca7fceae8cc91f4b42c5caca9e27c957454ef11769005dfba04c5119204472a408a288cbf7f529b44255761cd13888e7814fcb7192a30c3d311631a057ce16857447a06f0aa16d833fbd197bf6ba5e630d5eb9f44d068b97438f0ab365ebc9c501c9313e0ea276a5ed88b2b039c2c10279b44e2d8a4b9e03c4b267532a8d4680e9e27f2e07328fdb7a7cbc361a73b744f87ef9e676abd90fedfa47d292d658b2b3e819630aefb1e5873105f2c2e112554d6ac57bdd5035c8fd8571e8e3a4f2241af81e51a32b05efaa75645b395148b7e7faa39b2b14b9c2c7786303a016ad76a6f38641ab3b0aeef42bfd7dd1919bc4bf12aacc4e0d9d9d93710c525e10eaf33e852dbfcf9819709ea958fa5353e95fc2fa31c41a49699fa1f8b567b537299a942046d63bae68cdee6996a897b3c318dbf43cb4c70a4f676f5df4c8a881c465e1211294e8c1f1f822f5a19c1622dfd6448d60cafc63935b2c91213a60bacc8297cd9bc189aaa5b153ee587a734178810d405c9de96780415050ff7c6db7c4402c3ae2475c1863faa5b8d5ab146b5551b30ecfa529befd5a604553eecea11ad8474af8ad22b894fb848b9cad0b275f49c2eb77d9816ac21f9a5cb1368e29f0c4f1b369704b06d0259809c1e555f76dba677024e1a6f7e4b37d3391c3aec5649575365a8305c87e2168e3b01917767a6443807851c18d5e1ad4c22b482b104717f7e3944601889b84c164"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}]}]}]}]}, 0xd04}, 0x1, 0x0, 0x0, 0x800}, 0x200c014) 00:57:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x11, 0x0, 0x0, 0x0) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000011a0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x0, 0x0, 0x0, 0x0, 0x1008, 0x1}, 0x48) 00:57:26 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x4, &(0x7f0000000180)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xa8, &(0x7f0000000200)=""/168, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x18, 0x3, 0x1, 0x3, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}}, 0x0) 00:57:26 executing program 2: io_setup(0x8f, &(0x7f0000000000)=0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) io_submit(r0, 0x1, &(0x7f0000000900)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x7, 0x0, r1, 0x0}]) 00:57:26 executing program 3: prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000011b0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x4, &(0x7f0000000180)=@framed={{}, [@func]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xa8, &(0x7f0000000200)=""/168, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:26 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000500), 0x20040, 0x0) 00:57:26 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_to_hsr\x00', 0x0}) 00:57:26 executing program 4: syz_open_procfs(0x0, &(0x7f0000000180)='mountstats\x00') select(0x40, &(0x7f00000006c0)={0x8}, &(0x7f0000000700)={0x1}, &(0x7f0000000740), &(0x7f0000000780)={0x77359400}) 00:57:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, &(0x7f0000000700)=""/241, 0x0, 0xf1, 0x1f}, 0x20) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000041e0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001180)=@base={0x16, 0x0, 0x1f, 0x5, 0x0, 0x1}, 0x48) 00:57:26 executing program 0: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc1}, &(0x7f0000000480)={0x0, "724fa14c065edb67b094201c1c7543221e281b610d20c8d5cad4ce025342b17c35bb537702436d1f18f40e661fcbf0ddc42e501596270eca772e7e1e9baef4b7"}, 0x48, r0) keyctl$clear(0x7, r0) 00:57:26 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000600), 0x5, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 00:57:26 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x10040, 0x0) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000001f0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) 00:57:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0xf32217aeb99c87bb}, 0x14}}, 0x0) 00:57:26 executing program 3: syz_open_dev$vcsa(&(0x7f0000000600), 0x5, 0x86042) 00:57:26 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x30}}, 0x0) 00:57:26 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}]}) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000200000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 4: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "6c05e52778934fd07026710000000000d1bee047a47943a366750e344e4e09fa88b9804b025ba5427000d62969be00"}, 0x48, r1) keyctl$unlink(0x4, r2, r0) 00:57:26 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x890b, &(0x7f0000000500)={'wg1\x00'}) 00:57:26 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x378}, 0x0) 00:57:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x1600bd80, &(0x7f0000000000), 0x4) 00:57:26 executing program 3: keyctl$unlink(0xb, 0x0, 0x0) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000010200000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'sit0\x00', 0x0}) 00:57:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001180)=@base={0x16, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:57:26 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000002440)={0x0, 0x0, &(0x7f0000002400)={&(0x7f00000023c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000220000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x8982, &(0x7f0000002600)={'ip6gre0\x00', {0x2, 0x0, @remote}}) 00:57:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x1, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x20}}, 0x0) 00:57:26 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x70, 0x0, &(0x7f0000000180)=0x300) 00:57:26 executing program 0: socket(0x0, 0x0, 0x0) r0 = shmget$private(0x0, 0x10000, 0x0, &(0x7f0000ff0000/0x10000)=nil) shmat(r0, &(0x7f0000ff6000/0x1000)=nil, 0x5000) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000250000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x22, 0x0, &(0x7f0000000040)) 00:57:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x8918, &(0x7f0000002600)={'ip6gre0\x00', {0x2, 0x0, @remote}}) 00:57:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x8922, &(0x7f0000000480)={'ip6tnl0\x00', 0x0}) 00:57:26 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendto(r0, &(0x7f0000000000)="179addcc98a3c9f27c55e6f3f8cd3921f22e3dd5", 0x14, 0x0, &(0x7f00000000c0)=@qipcrtr={0x2a, 0x2}, 0x80) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000260000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 00:57:26 executing program 5: set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0x7) 00:57:26 executing program 0: syz_open_dev$vcsa(0x0, 0x0, 0x0) syz_clone(0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x0, 0x70, 0x3897, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x0, 0xc}, 0x48) 00:57:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5452, &(0x7f0000000500)={'wg1\x00'}) 00:57:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x8, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000320000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002340)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000002dc0)={0x77359400}) 00:57:26 executing program 5: add_key$keyring(&(0x7f0000000080), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 00:57:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind(r0, 0x0, 0x0) 00:57:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x0, 0x5, 0x8}, 0x48) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000001380000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 3439.466855][T17285] ip6tnl0: mtu less than device minimum 00:57:26 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, 0x0) 00:57:26 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000600), 0x0, 0x0) syz_io_uring_setup(0xa80, &(0x7f0000000dc0)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000e40), &(0x7f0000000e80)) 00:57:26 executing program 0: r0 = mq_open(&(0x7f0000000300)='.request_key_auth\x00', 0x0, 0x0, 0x0) mq_timedreceive(r0, 0x0, 0x0, 0x0, 0x0) 00:57:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x890b, &(0x7f0000002600)={'ip6gre0\x00', {0x2, 0x0, @remote}}) 00:57:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r1, 0x733}, 0x14}}, 0x0) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000003e0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(r0, 0x0) 00:57:26 executing program 5: syz_open_dev$vcsa(&(0x7f0000000040), 0x4, 0x121181) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000003f0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x15, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:26 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/power/pm_test', 0x101000, 0x0) 00:57:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f00000002c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 00:57:26 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0xb, r0, 0x0) 00:57:26 executing program 4: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={0x0}, 0x10) 00:57:26 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000400000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 3: syz_emit_ethernet(0x6e, &(0x7f00000002c0)={@broadcast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x38, 0x3a, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast2, {[], @dest_unreach={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, '\x00', 0x0, 0x2c, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], "23e96155d1c0b7ac"}}}}}}}, 0x0) 00:57:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x8910, &(0x7f0000000480)={'ip6tnl0\x00', 0x0}) 00:57:26 executing program 2: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) pidfd_send_signal(r0, 0x0, &(0x7f0000000200)={0x12}, 0x0) 00:57:26 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000460000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x8901, &(0x7f0000002600)={'ip6gre0\x00', {0x2, 0x0, @remote}}) 00:57:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x8921, &(0x7f0000000480)={'ip6tnl0\x00', 0x0}) 00:57:26 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x4}, 0x48) 00:57:26 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1a}, @mcast2}}) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000480000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000004c0)={0x10}, 0x10}}, 0x0) 00:57:26 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "6c05e52778934fd07026710000000000d1bee047a47943a366750e344e4e09fa88b9804b025ba5427000d62969be00"}, 0x48, r1) keyctl$unlink(0x3, r2, 0x0) 00:57:26 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_setup(0x51c1, &(0x7f0000000180), &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000000200), &(0x7f0000000240)) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 00:57:26 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{0x0}], 0x1000, &(0x7f0000000100)) 00:57:26 executing program 0: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000004c0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 5: syz_open_dev$vcsa(&(0x7f0000000600), 0x0, 0x48201) 00:57:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000200)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 00:57:26 executing program 4: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x1, 0x0) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000510000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x3, 0x2, 0x301}, 0x14}}, 0x0) 00:57:26 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x0) write$P9_RFLUSH(r0, 0x0, 0x0) 00:57:26 executing program 2: socket$inet6(0xa, 0x2, 0x4) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000550000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 4: syz_open_procfs(0x0, &(0x7f0000000180)='mountstats\x00') select(0x40, &(0x7f00000006c0)={0x8}, &(0x7f0000000700)={0x1}, &(0x7f0000000740)={0x4}, &(0x7f0000000780)={0x77359400}) 00:57:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountstats\x00') setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000600000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 4: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "6c05e52778934fd07026710000000000d1bee047a47943a366750e344e4e09fa88b9804b025ba5427000d62969be00"}, 0x48, r1) keyctl$unlink(0x6, r2, 0x0) 00:57:26 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000040)=0x8, 0x4) 00:57:26 executing program 3: set_mempolicy(0x0, &(0x7f0000000000)=0x9, 0x7) 00:57:26 executing program 0: arch_prctl$ARCH_GET_FS(0x1003, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='schedstat\x00') 00:57:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMP(r0, 0x10e, 0x0, 0x0, 0x0) 00:57:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000680000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:26 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x26}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:27 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x1000, 0x145003) 00:57:27 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0xc0189436, &(0x7f0000002600)={'ip6gre0\x00', {0x2, 0x0, @remote}}) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000026a0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8918, 0x0) 00:57:27 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 00:57:27 executing program 5: keyctl$unlink(0xe, 0x0, 0x0) 00:57:27 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/nf_conntrack_expect\x00') 00:57:27 executing program 2: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000006c0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 5: syz_open_procfs(0x0, &(0x7f0000000580)='fdinfo\x00') 00:57:27 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000140)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "6b4804421a50bfefb66afd01e1c04866116f75f2da1665cd6d52abdf0ef40348e36c2435ee61cf18b35c1c1803d2e1ac9ee4ce9643529c87377ce1d0963d5f0e"}, 0x48, r0) keyctl$get_persistent(0x16, 0xee01, r1) 00:57:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8983, 0x0) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000740000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0xa, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 00:57:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x8932, &(0x7f0000000480)={'ip6tnl0\x00', 0x0}) 00:57:27 executing program 0: socketpair(0x0, 0x1006, 0x0, 0x0) 00:57:27 executing program 3: syz_io_uring_setup(0x42bb, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000080), 0x0) syz_io_uring_setup(0x51c1, &(0x7f0000000180), &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000003790000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000006640)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 00:57:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x4, 0x0, 0x0) 00:57:27 executing program 5: socket(0x1, 0x0, 0x2) 00:57:27 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), r0) 00:57:27 executing program 0: utime(&(0x7f00000002c0)='./file0\x00', 0x0) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000007a0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@NFQA_CFG_FLAGS={0x8}, @NFQA_CFG_MASK={0x8}]}, 0x24}}, 0x0) 00:57:27 executing program 5: keyctl$unlink(0xc, 0x0, 0x0) 00:57:27 executing program 3: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "6c05e52778934fd07026710000000000d1bee047a47943a366750e344e4e09fa88b9804b025ba5427000d62969be00"}, 0x48, r1) keyctl$unlink(0xf, r2, 0x0) 00:57:27 executing program 4: io_uring_setup(0x0, &(0x7f0000000000)) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000840000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x1c, r1, 0x101, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_USE_CQE_MODE_TX={0x5}]}, 0x1c}}, 0x0) 00:57:27 executing program 3: syz_open_dev$vcsa(&(0x7f0000000600), 0x0, 0x210001) 00:57:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000680), r1) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0), r0) 00:57:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5451, 0x0) 00:57:27 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0, 0x0, 0x30}, 0x10) 00:57:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x5411, &(0x7f0000002600)={'ip6gre0\x00', {0x2, 0x0, @remote}}) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000900000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000600), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 00:57:27 executing program 3: mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x140830, 0xffffffffffffffff, 0x10000000) 00:57:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0xd04, 0xd, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xcac, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}]}, {0x30, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x81}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x3}]}, {0x6ec, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0x89, 0x6, 0x1, 0x0, "c8fe8401277fbbec14210f2d0e16773a34da2cde62b752b7fe856e9d1c914aeea2c35b8e95011e778d848a6e8a7928126bdb06c268a4630e8850ca37c9122cb673f2a9eb48d9fac777191cd9e26ceb55235d50f1ad7cf98fac0820812af1d4dcb6e3c81e03da83d17e2a20fe2249a44c64ce1c83bb11d2d05de2ad4a4480f1a4bdc67d2efb"}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x7}, @NFTA_SET_ELEM_KEY={0x24c, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x1f, 0x1, "f4b27f6ece9166b701dd789542d7c32a95792eefbaf77ba62e2956"}, @NFTA_DATA_VALUE={0x87, 0x1, "c00c202dae8ea77c4a57b481cd6a9916bb71498713cdf881d84ef1570753b5bd6d4db88eeb5d008ce888f43c826b3197a634070fac99ceabbe084b20a8fae0626fbb9b6f27362734dd92956794b84152d0c17c328b5f436f8b4ced11d2e0bf18cf9aac7be7e72b2afc4b6c0f425eb83270fb7744fc5cd9d2b73a435e2386fb193d0952"}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1f}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1f}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x4}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x90, 0x1, "9ceb7cc0c5ed91865b986e4f810ec3483ee30b5c8d59c47d98dc545359a3036c9855377659372eca4050a7ea007c50573e92bed4c695835a26cdf632f193936e5afaea5fd5c0e14582d3bbc674ceefed1b7c7cc8125d825b32f68afec7ebabcb3588b4c321fe72f06478a0bdd0f63d5a5cd2c52ed2808324f2afcb0431208e65219483b845356c8596df82bd"}, @NFTA_DATA_VALUE={0x53, 0x1, "e3918bd9fdd7ff185951af62543f08b82fceb0a1e7e5019376d338b59ceaab930e6c90b2cddb5ab8b8efb1957cd2f08e655aac020e7626809c2e76db3ef51771430720d7a679c123357c60520ad0e4"}, @NFTA_DATA_VALUE={0x17, 0x1, "4bcdd63755dfa1f2a95870535574cff97ba732"}, @NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x80000001}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x6dbe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}, @NFTA_SET_ELEM_KEY={0x32c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0xe9, 0x1, "df1ecee627dda991a6d049eedfa1b0d38056484f88d510328c2d9973b67ff49864d704952a384af8aa04a1fed8918cc35c19e639385690c173e9c675e4a8f6929b6121924000bd93a67471dc4b4e3c0391dfedcc442ae367a9d0b72b6d7e400286c40bb9c2c950c7f8305bd7bb832261a94f5f78acbf1a124224f10a5caf58482ab00a0d1ae451ccde6b6d937d2171361fcb7df1bf4c0922aff60fc149840dec405d3cbffbcabaa7bded1ee7133f5bd0091e94b0308ebf7d793d119c1b7b3fe861afba950d323ca5880cb07df0487832eb463c791f1b2ab784f5cb8a2dc4b3833d4a914cbc"}, @NFTA_DATA_VALUE={0x2a, 0x1, "2d5bab1e73b98b2a4ff0d74125ca3f0f632d41ec062fdeac1943da6f0d806b1a2e7e8fca1f4b"}, @NFTA_DATA_VALUE={0x7e, 0x1, "97de7239c87dc9b248dce2f7300a1deb025955fb02c8532b4bd2841854c6747317ff8134c4824e5ae0d1e5048c1976360ac5e7d50d6e33583218cf9b5c8f59d447f25f7040ecce95100d5ba94c77ea6115ed98f315208443a052acb3209fab8abc35d593823bbafbfec1cdecc7d24111d493f142b1ebbefde8bf"}, @NFTA_DATA_VALUE={0x4f, 0x1, "fc2060587c29ef0f7d126e923d98870aa312d0c0ab8e886fd317fef0e22beac50ef58e8c017f05857fe6bb00722b3c139e49af67491520b78e5b88b68bacf9de807f776bf0aa966678176c"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0xf1, 0x1, "693736c5046cf180596b2b55f3dd8a1f212ed1d941398e3fd5df2d3de3b9ff4b31a22c1839d1b9fef22ee292e4395ee6edaacad2215c30da362152d2a785cdbf735ab315bdec8d023f59f5792d0360a3c326941043c14316e499e36bdcd8a484d5cc6d8c8c7af788d8cb8af6abcba44d8995c76156df54a03537185dad3abb0886b83ce8d44c4de08f29bf679936584d28476e9d5b0d09dcdcc13d51fae7683f35119111c23253942996e04eb7db5b469cca79b0eeabce65fe2ca6d513b54f2e1efaf907af73c52ac4a83fda836a186671fda1e8a20f761358386476aca02dc8fad5dbdcf1fd09a5454a9250f1"}]}, @NFTA_SET_ELEM_USERDATA={0xd7, 0x6, 0x1, 0x0, "806a3789d9ab2a3dbd91fab2be0ff5102cee1c226fc56b6adc4c6b597faef7f0b32efa7987550d77d356aa4ef3855d7e83208b92031a834c02ba6708c95974e4ef2db87e593182bb7a84b02dba2eff6249370a14ce6c1582f5da40de74e2934cb7ad4d76d911b67d7df78236605c8d0d738bf2c7911375fac4a7de2ac77054e0a5435b5de3debd203ebc4c0aca8be4a53a34721a3ba5772471c6ce6e8e495607a580f85fc41cf6f30a9f4088b8af892aa219e9376b89c8e5487e2dcd04a6314775f4e7d54901ee6365187b715dfbeba8a6cc27"}]}, {0x584, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x580, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xffff}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x10000}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfe4}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1ff}]}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x4cd, 0x1, "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"}]}]}]}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}]}, 0xd04}, 0x1, 0x0, 0x0, 0x800}, 0x200c014) 00:57:27 executing program 2: bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000001940000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, 0xfffffffffffffffd, &(0x7f00000005c0)=':?\xe6\xca\xef\xce!%\x00\x17\xe2lm%0Q\r$\xe3\x91\x9d5\xc9\x88\xc7\x13\xceIr\xeb\"\xbcH\xe3\x92y\x1a;}o\xbc\x11h<\xd3\x04+\xa09j\xae\xe1\xad\xf7\xf7\\\x1c\xeb\xe6\xc3\a\x92W\xd3\xf7?!\a\xe7\xdf\xd1L\x10\xe8_Q\xaay\n\x9cg\xecD\vixCO\xcb\xfbh\xdb\xb1\x82\xdcJp\xb9\xd1O6\xb3\xd6IA\x8c\x01\xc4\xbcP3\r\x87\xff\x10\x17\xb8x\xc9t\xa84\xcds\xb9D\xecDK\xabG\x1f\x92\x89+\xc0\x80\xe7\x9f\xe4dJ\x14\v\xa9\f\x0fF7\xa1Q\xc6\xa1\x87\\\x86\x8b&!\x88\xe1\xba\xcf4X\x1b\xaa\x84\xfbJ\xc4\xc5\xfc\xafp\x1e\xab\xc6i\xc8m\t\r\xed\xa2\x98\xee\xa7W\x9c\xbe\xaeU\xbc\xc3\'\xb0\x82\x91\xb4\xa8\x9a\xf1y=X\v\xc8qf\xaa(\xa1\x03f?\x7f\xb7\v\x97D\xd0tE\xd6%\bD\x94Y1C\x9a\xdba\x92|\xd3\x85\xe4\x02\xe1\x903\xb8\xbf\xf0\xe9\xa5\x1c\xe7\xe0\xd3}\xc0\x06\xaeF\xe8\xd9F\xaa\x7f\xc6_\x01Qt\xa2E\x02\xf8\xfe\xa4\x0f2&k\xfa{\xa2?\xfe\xe8\xff\x02_\xb0\x8d\xeeCiX\x0e\xd6fEN\xbf\x8c\n\x0f\xa9T\x18\x9f\xbd&\xcd\xaa\x97\x93Sd\xf2$}\xa6\xb5\xb4\xf9Y\xa4\xf3\xc3\xdf9wRK\x188\x9cm,\xe6n@\xf8\x03\xac\x8amC\x8e\xb1\xb7\x14U\xf5,@d\xb2\x903\x9a\xc9') 00:57:27 executing program 5: keyctl$unlink(0xf, 0x0, 0x0) 00:57:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x1600bd74, &(0x7f0000000000), 0x4) 00:57:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x8943, &(0x7f0000000480)={'ip6tnl0\x00', 0x0}) 00:57:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x10e, 0x4, 0x0, 0x0) 00:57:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x16}, @private1={0xfc, 0x1, '\x00', 0x1}}}) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000003940000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xa, 0x0, 0x0, 0x0, 0x1004, 0x1}, 0x48) 00:57:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x14, 0x0, 0x1, 0x132c01e4d3f8be31}, 0x14}}, 0x0) 00:57:27 executing program 0: socketpair(0x2, 0x0, 0x0, &(0x7f0000000040)) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000b10000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 4: sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000ec0)) 00:57:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000000), 0x4) 00:57:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0xfffffffffffffffc}}, 0x0) 00:57:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}]}]}, 0x2c}}, 0x0) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000003b10000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x8}, 0x48) 00:57:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x1600bd7d, &(0x7f0000000000), 0x4) 00:57:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f8", 0x16}, {0x0, 0x0, 0x10001}], 0x0, &(0x7f0000000280)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x7f}, 0xeffdffff}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0/../file0/file0\x00'}, 0x32, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 00:57:27 executing program 3: syz_open_dev$vcsa(&(0x7f0000000600), 0x0, 0x10046) 00:57:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0xc0189436, 0x0) 00:57:27 executing program 0: ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x3a}) r0 = syz_io_uring_setup(0x34aa, &(0x7f0000000000)={0x0, 0x4339, 0x10, 0x1}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_enter(r0, 0x7687, 0xafd4, 0x1, &(0x7f0000000100), 0x8) accept$inet6(0xffffffffffffffff, 0x0, 0x0) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000003bc0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)={0x20, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x20}}, 0x0) 00:57:27 executing program 4: sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:27 executing program 5: pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000001be0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x8923, &(0x7f0000000480)={'ip6tnl0\x00', 0x0}) 00:57:27 executing program 2: syz_io_uring_setup(0x78b9, &(0x7f0000000080)={0x0, 0xb8b0}, &(0x7f000043d000/0x1000)=nil, &(0x7f0000756000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000100)) [ 3440.356194][T17538] loop4: detected capacity change from 0 to 256 [ 3440.357229][T17538] FAT-fs (loop4): bogus number of FAT sectors [ 3440.357278][T17538] FAT-fs (loop4): Can't find a valid FAT filesystem 00:57:27 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000600), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000005, 0x12, r0, 0x0) 00:57:27 executing program 0: syz_clone(0x4810c200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 00:57:27 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r0) 00:57:27 executing program 2: syz_io_uring_setup(0x6172, &(0x7f0000000000)={0x0, 0x0, 0x4}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 00:57:27 executing program 3: syz_open_procfs(0x0, &(0x7f0000000340)='net/rt_acct\x00') 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000003c10000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 4: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000180)={0x0, "6c05e52778934fd07026710000000000d1bee047a47943a366750e344e4e09fa88b9804b025ba5427000d62969be00"}, 0x48, r1) keyctl$unlink(0xb, r2, 0x0) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000003d00000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x4, &(0x7f0000000300)=@framed={{}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000380)='GPL\x00', 0x7, 0xaf, &(0x7f00000003c0)=""/175, 0x0, 0xa, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:27 executing program 4: syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x121181) 00:57:27 executing program 2: pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8, 0xffffffffffffffff) syz_io_uring_setup(0x42bb, &(0x7f0000000000)={0x0, 0x82c7, 0x0, 0x0, 0x20}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000300)={0x43, 0x9, 0x2, {0x80, 0x51, 0x8, 0x0, 0x0, 0x5, 0x912c0}}, 0x43) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) [ 3440.467909][ T25] audit: type=1400 audit(3447.496:790): avc: denied { execute } for pid=17564 comm="syz-executor.4" path="/dev/vcsa0" dev="devtmpfs" ino=535 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=file permissive=1 00:57:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0xd04, 0xd, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xcd4, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}]}, {0x30, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x3}]}, {0x6e0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0x89, 0x6, 0x1, 0x0, "c8fe8401277fbbec14210f2d0e16773a34da2cde62b752b7fe856e9d1c914aeea2c35b8e95011e778d848a6e8a7928126bdb06c268a4630e8850ca37c9122cb673f2a9eb48d9fac777191cd9e26ceb55235d50f1ad7cf98fac0820812af1d4dcb6e3c81e03da83d17e2a20fe2249a44c64ce1c83bb11d2d05de2ad4a4480f1a4bdc67d2efb"}, @NFTA_SET_ELEM_KEY={0x24c, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x1f, 0x1, "f4b27f6ece9166b701dd789542d7c32a95792eefbaf77ba62e2956"}, @NFTA_DATA_VALUE={0x87, 0x1, "c00c202dae8ea77c4a57b481cd6a9916bb71498713cdf881d84ef1570753b5bd6d4db88eeb5d008ce888f43c826b3197a634070fac99ceabbe084b20a8fae0626fbb9b6f27362734dd92956794b84152d0c17c328b5f436f8b4ced11d2e0bf18cf9aac7be7e72b2afc4b6c0f425eb83270fb7744fc5cd9d2b73a435e2386fb193d0952"}, @NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1f}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1f}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x4}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x90, 0x1, "9ceb7cc0c5ed91865b986e4f810ec3483ee30b5c8d59c47d98dc545359a3036c9855377659372eca4050a7ea007c50573e92bed4c695835a26cdf632f193936e5afaea5fd5c0e14582d3bbc674ceefed1b7c7cc8125d825b32f68afec7ebabcb3588b4c321fe72f06478a0bdd0f63d5a5cd2c52ed2808324f2afcb0431208e65219483b845356c8596df82bd"}, @NFTA_DATA_VALUE={0x53, 0x1, "e3918bd9fdd7ff185951af62543f08b82fceb0a1e7e5019376d338b59ceaab930e6c90b2cddb5ab8b8efb1957cd2f08e655aac020e7626809c2e76db3ef51771430720d7a679c123357c60520ad0e4"}, @NFTA_DATA_VALUE={0x17, 0x1, "4bcdd63755dfa1f2a95870535574cff97ba732"}, @NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x80000001}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x6dbe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}, @NFTA_SET_ELEM_KEY={0x32c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0xfffffffd}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1000}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0xec, 0x1, "df1ecee627dda991a6d049eedfa1b0d38056484f88d510328c2d9973b67ff49864d704952a384af8aa04a1fed8918cc35c19e639385690c173e9c675e4a8f6929b6121924000bd93a67471dc4b4e3c0391dfedcc442ae367a9d0b72b6d7e400286c40bb9c2c950c7f8305bd7bb832261a94f5f78acbf1a124224f10a5caf58482ab00a0d1ae451ccde6b6d937d2171361fcb7df1bf4c0922aff60fc149840dec405d3cbffbcabaa7bded1ee7133f5bd0091e94b0308ebf7d793d119c1b7b3fe861afba950d323ca5880cb07df0487832eb463c791f1b2ab784f5cb8a2dc4b3833d4a914cbc23ed45"}, @NFTA_DATA_VALUE={0x2a, 0x1, "2d5bab1e73b98b2a4ff0d74125ca3f0f632d41ec062fdeac1943da6f0d806b1a2e7e8fca1f4b"}, @NFTA_DATA_VALUE={0x7e, 0x1, "97de7239c87dc9b248dce2f7300a1deb025955fb02c8532b4bd2841854c6747317ff8134c4824e5ae0d1e5048c1976360ac5e7d50d6e33583218cf9b5c8f59d447f25f7040ecce95100d5ba94c77ea6115ed98f315208443a052acb3209fab8abc35d593823bbafbfec1cdecc7d24111d493f142b1ebbefde8bf"}, @NFTA_DATA_VALUE={0x4f, 0x1, "fc2060587c29ef0f7d126e923d98870aa312d0c0ab8e886fd317fef0e22beac50ef58e8c017f05857fe6bb00722b3c139e49af67491520b78e5b88b68bacf9de807f776bf0aa966678176c"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x8000000000000004}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0xf1, 0x1, "693736c5046cf180596b2b55f3dd8a1f212ed1d941398e3fd5df2d3de3b9ff4b31a22c1839d1b9fef22ee292e4395ee6edaacad2215c30da362152d2a785cdbf735ab315bdec8d023f59f5792d0360a3c326941043c14316e499e36bdcd8a484d5cc6d8c8c7af788d8cb8af6abcba44d8995c76156df54a03537185dad3abb0886b83ce8d44c4de08f29bf679936584d28476e9d5b0d09dcdcc13d51fae7683f35119111c23253942996e04eb7db5b469cca79b0eeabce65fe2ca6d513b54f2e1efaf907af73c52ac4a83fda836a186671fda1e8a20f761358386476aca02dc8fad5dbdcf1fd09a5454a9250f1"}]}, @NFTA_SET_ELEM_USERDATA={0xd5, 0x6, 0x1, 0x0, "806a3789d9ab2a3dbd91fab2be0ff5102cee1c226fc56b6adc4c6b597faef7f0b32efa7987550d77d356aa4ef3855d7e83208b92031a834c02ba6708c95974e4ef2db87e593182bb7a84b02dba2eff6249370a14ce6c1582f5da40de74e2934cb7ad4d76d911b67d7df78236605c8d0d738bf2c7911375fac4a7de2ac77054e0a5435b5de3debd203ebc4c0aca8be4a53a34721a3ba5772471c6ce6e8e495607a580f85fc41cf6f30a9f4088b8af892aa219e9376b89c8e5487e2dcd04a6314775f4e7d54901ee6365187b715dfbeba8a6"}]}, {0x5b8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x5b4, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x4f5, 0x1, "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"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}]}]}]}]}]}, 0xd04}}, 0x0) 00:57:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)={0x14, 0x2, 0x2, 0x101}, 0x14}}, 0x0) 00:57:27 executing program 0: prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x4000)=nil) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000002e40000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={0x0}, 0x10) 00:57:27 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x5}, 0x48) 00:57:27 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff2000/0x4000)=nil, 0x4000, 0x0, 0x2010, r0, 0x10000000) 00:57:27 executing program 4: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140), 0xffffffffffffffff) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) 00:57:27 executing program 2: syz_open_procfs(0x0, &(0x7f00000003c0)='net/hci\x00') 00:57:27 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0xc0045878, 0x0) 00:57:27 executing program 5: syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000002e50000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000100)={0x0, "6fac3fda01882d84db6482b8cb036bf59e1a1ccecff09f42e937f74b94fad14d49e9dad1dc4a04efd655acf35d64b114f7d2812215cb5d92a4367481d41884d8"}, 0x48, r0) keyctl$unlink(0x3, r0, 0x0) 00:57:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000380)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x4, 0x2, 0x8, 0x400, 0x3, @remote, @empty, 0x10, 0x8, 0x9}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000440)={'ip6_vti0\x00', &(0x7f00000003c0)={'sit0\x00', r2, 0x2f, 0x96, 0x7, 0x5, 0x18, @loopback, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20, 0x700, 0x8, 0x6}}) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x138, 0x1, 0x2, 0x401, 0x0, 0x0, {0x7, 0x0, 0x8}, [@CTA_EXPECT_HELP_NAME={0xb, 0x6, 'amanda\x00'}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0xae}, @CTA_EXPECT_MASK={0x7c, 0x3, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}}}}]}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x2}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0xfffffeff}, @CTA_EXPECT_MASK={0x78, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @mcast2}}}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x1}, 0x101) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5421, &(0x7f0000000500)={'wg1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000200)={'syztnl1\x00', r3, 0x2f, 0x0, 0x20, 0x6, 0xd, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x20, 0x2999bbb2f488bee6, 0x1, 0x1}}) 00:57:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3d, &(0x7f00000001c0), 0x8) 00:57:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000380)={'gre0\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast2}}}}) 00:57:27 executing program 5: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0x401) 00:57:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x14, r1, 0x313}, 0x14}}, 0x0) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000002e60000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 0: add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) 00:57:27 executing program 3: utime(0x0, &(0x7f0000000300)) 00:57:27 executing program 2: syz_open_dev$vcsa(&(0x7f0000000600), 0x0, 0x62480) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000002e70000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 0: socketpair(0x450d96c5b79b078a, 0x0, 0x0, &(0x7f0000000080)) 00:57:27 executing program 4: utime(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) 00:57:27 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x3}], 0x0, 0x0) 00:57:27 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000006f40), 0x0, 0x0) 00:57:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6gre0\x00', 0x0}) 00:57:27 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0xb, r2, r1) 00:57:27 executing program 3: io_setup(0x41f7, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) mlockall(0x7) 00:57:27 executing program 2: syz_clone(0x4810c200, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000c0ed0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 4: syz_io_uring_setup(0x22634, &(0x7f0000000080)={0x0, 0x0, 0x10}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000004c0), &(0x7f0000000280)) 00:57:27 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}]}) 00:57:27 executing program 0: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{0x0}], 0x0, 0x0) 00:57:27 executing program 5: msgsnd(0x0, &(0x7f0000000080)={0x2, "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"}, 0xfd1, 0x0) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000001f40000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:27 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_to_hsr\x00', &(0x7f0000001680)=@ethtool_per_queue_op={0x4b, 0xe}}) 00:57:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @remote}, {}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x23}}, 0x44, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='veth1_vlan\x00', 0x4, 0x4, 0x7}) 00:57:27 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[], 0x378}, 0x0) 00:57:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000002f90000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 3440.931353][T17655] tmpfs: Bad value for 'gid' 00:57:28 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 00:57:28 executing program 2: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="a6", 0x1, 0x3}], 0x0, 0x0) 00:57:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_MODES_OURS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}]}]}, 0x1c}}, 0x0) 00:57:28 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0xb, r0, 0x0) 00:57:28 executing program 5: prctl$PR_SCHED_CORE(0x3e, 0x4, 0x0, 0x0, 0x0) 00:57:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000fffe0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:28 executing program 3: pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 00:57:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000fff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x8914, &(0x7f0000000480)={'ip6tnl0\x00', 0x0}) 00:57:28 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f00000001c0)) 00:57:28 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x8917, &(0x7f0000002600)={'ip6gre0\x00', {0x2, 0x0, @remote}}) 00:57:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 00:57:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5450, 0x0) 00:57:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000001900)={&(0x7f00000002c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x18}}, 0x0) 00:57:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000feff0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x8947, &(0x7f0000000480)={'ip6tnl0\x00', 0x0}) 00:57:28 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000380)={'ip6gre0\x00', &(0x7f0000000300)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @empty}}) 00:57:28 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="a6", 0x1}], 0x1000, &(0x7f0000000100)) 00:57:28 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 00:57:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x2, 0x1, 0x301, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) 00:57:28 executing program 2: clock_gettime(0x0, &(0x7f0000000640)) 00:57:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000200000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x12, 0x2f, 0x0, 0x80, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) 00:57:28 executing program 5: syz_io_uring_setup(0x22634, &(0x7f0000000080), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000004c0), &(0x7f0000000280)) 00:57:28 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='net/llc/core\x00') 00:57:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000001300)={0x2, 'vlan0\x00'}) 00:57:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000480)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80) 00:57:28 executing program 4: syz_open_dev$vcsa(&(0x7f0000001b80), 0x0, 0x40) 00:57:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000ffff0300000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:28 executing program 5: syz_clone(0x4810c200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)="bd") 00:57:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8904, &(0x7f0000000500)={'wg1\x00'}) 00:57:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x6, 0x0, 0x0, 0x0, 0x108, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4}, 0x48) 00:57:28 executing program 2: syz_clone(0x1000, 0x0, 0x0, &(0x7f0000001000), 0x0, 0x0) 00:57:28 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f0000000180)='/sw_regions/sw_') 00:57:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000400000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:28 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="10"], 0x30}}, 0x0) 00:57:28 executing program 0: uname(&(0x7f0000002280)) 00:57:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0xc0189436, &(0x7f0000000500)={'wg1\x00'}) 00:57:28 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='children\x00') 00:57:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000ffff1f00000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x6, 0x0, 0x0, 0xe81, 0x108, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4}, 0x48) 00:57:28 executing program 5: socket$inet6(0xa, 0x3, 0x1) socket$inet6(0xa, 0x3, 0x1) 00:57:28 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000600), 0x5, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 00:57:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x8911, &(0x7f0000000480)={'ip6tnl0\x00', 0x0}) 00:57:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x8913, &(0x7f0000000480)={'ip6tnl0\x00', 0x0}) 00:57:28 executing program 4: syz_clone3(&(0x7f0000000600)={0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {}, &(0x7f0000000400)=""/184, 0xb8, &(0x7f00000004c0)=""/211, &(0x7f00000005c0)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x41) 00:57:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000009000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:28 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x1000, &(0x7f0000000100)) 00:57:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000001000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:28 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f00000016c0)={0x28, 0x0, 0x2710}, 0x10) connect$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x0, @local}, 0x10) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r1, &(0x7f00000016c0)={0x28, 0x0, 0x2710}, 0x10) 00:57:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8911, &(0x7f0000000500)={'wg1\x00'}) 00:57:28 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000780)={'ip6gre0\x00', &(0x7f0000000700)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x7800}}) 00:57:28 executing program 5: io_setup(0x8f, &(0x7f0000000000)=0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) io_submit(r0, 0x1, &(0x7f0000000900)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x7, 0x0, r1, &(0x7f0000000040)="e9fe083fffcdb502f162a776524ce1da", 0x10}]) 00:57:28 executing program 3: r0 = mq_open(&(0x7f0000000300)='.request_key_auth\x00', 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 00:57:28 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000000)=0x5, 0x4) 00:57:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000002000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:28 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x5460, 0x0) 00:57:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x30, 0x0, 0x0) 00:57:28 executing program 3: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002dc0)={0x77359400}) 00:57:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000402000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendto(r0, &(0x7f0000000000)="179addcc98a3c9f27c55e6f3f8cd3921f22e3dd537f11995884b862098c2d8bafc4c0b9333841352", 0x28, 0x0, &(0x7f00000000c0)=@qipcrtr={0x2a, 0x2}, 0x80) 00:57:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8990, &(0x7f0000000280)={'sit0\x00', 0x0}) 00:57:28 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_to_hsr\x00', &(0x7f0000001680)=@ethtool_per_queue_op}) 00:57:28 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 00:57:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x10e, 0xb, 0x0, 0x0) 00:57:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000003000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:28 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8927, &(0x7f0000000500)={'wg1\x00'}) 00:57:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x4e20, @remote}, 0x10) 00:57:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x891d, &(0x7f0000000480)={'ip6tnl0\x00', 0x0}) 00:57:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x891e, &(0x7f0000000480)={'ip6tnl0\x00', 0x0}) 00:57:28 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8903, &(0x7f0000000500)={'wg1\x00'}) 00:57:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000004000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:28 executing program 0: keyctl$unlink(0x12, 0x0, 0x0) 00:57:28 executing program 4: syz_io_uring_setup(0x423a, &(0x7f0000000240)={0x0, 0xe697}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) 00:57:28 executing program 2: bpf$MAP_CREATE(0x9, &(0x7f0000000040)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:57:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000005000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:28 executing program 3: mq_open(&(0x7f0000000000)='.\x06\x00queyNauth\x00\x00\x00\x00\x00\x00\xfeFJ\x9e\x1f\x9c\xd76>\x9e\x03\x17N(\xc5\xdf\x19\x11\xec\x93\xcbP\xfaP\xf1i~\x87\x10a\x17\xc1\xdds\x85n\xb1t\xf1\xd3I\xf9!\xce5LZ\xff::E\x8c;l\x99e\x12\xea\';|\x9c\xb6\xee \xf6\x9c\x95\xf2RD&\xc6\v\x01\xe7 )\xc4d\xd5Mg\x02\x8a1\xebs\r\xce-s\x92\xaeS\x90\xe3\xd2I\xb5Y\xa52', 0x0, 0x0, 0x0) 00:57:28 executing program 5: syz_io_uring_setup(0x0, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5, 0xffffffffffffffff) 00:57:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x5, &(0x7f00000001c0)=0x1000000, 0x4) 00:57:28 executing program 0: syz_io_uring_setup(0x42bb, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 00:57:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000002600)={'ip6gre0\x00', {0x2, 0x0, @broadcast}}) 00:57:28 executing program 4: ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) socketpair(0x0, 0x6, 0x0, &(0x7f0000000040)) 00:57:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000006000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:28 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000600), 0x0, 0x0) connect$inet6(r0, 0x0, 0x4d) 00:57:28 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)) 00:57:28 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='projid_map\x00') 00:57:28 executing program 3: pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_setup(0x51c1, &(0x7f0000000180)={0x0, 0x0, 0x20}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff8000/0x2000)=nil, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000600), 0x5, 0x400) 00:57:28 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 00:57:28 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001a80)={0x6, 0x4, &(0x7f0000000900)=@framed={{}, [@jmp={0x5, 0x0, 0x5}]}, &(0x7f0000000980)='GPL\x00', 0x4, 0x1000, &(0x7f00000009c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000106000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891c, &(0x7f0000002600)={'ip6gre0\x00', {0x2, 0x0, @remote}}) 00:57:28 executing program 0: socket$inet6(0xa, 0x2, 0x5b) 00:57:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x8916, &(0x7f0000002600)={'ip6gre0\x00', {0x2, 0x0, @remote}}) 00:57:29 executing program 5: syz_genetlink_get_family_id$batadv(&(0x7f0000000600), 0xffffffffffffffff) 00:57:29 executing program 0: mq_open(&(0x7f0000000300)='.request_key_auth\x00', 0x0, 0x0, 0x0) 00:57:29 executing program 5: clock_gettime(0x0, &(0x7f00000000c0)={0x0}) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x6}, 0x0, &(0x7f0000000100)={r0}, 0x0) 00:57:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={0x0}}, 0x40041) 00:57:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000406000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:29 executing program 3: semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000000)=""/9) r0 = shmget$private(0x0, 0x10000, 0x0, &(0x7f0000ff0000/0x10000)=nil) r1 = shmat(r0, &(0x7f0000ff6000/0x1000)=nil, 0x5000) shmdt(r1) 00:57:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) 00:57:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3e0, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) 00:57:29 executing program 5: syz_mount_image$msdos(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000005c0)={[{@fat=@time_offset}]}) 00:57:29 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000001f40)=[{{&(0x7f0000000000)=@llc={0x1a, 0x0, 0x4, 0x0, 0x0, 0x0, @link_local}, 0x80, 0x0}}], 0x1, 0x0) 00:57:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000007000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:29 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x140d, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 00:57:29 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x18, 0x1411, 0x86e4f9547c8a5e15, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8, 0x4b, 0x13}]}, 0x18}}, 0x0) 00:57:29 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x1a) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 00:57:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3e0, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) 00:57:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000840), &(0x7f0000000a80)='./file0\x00', 0x0, 0x0, &(0x7f0000000f00), 0x0, &(0x7f0000000fc0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-13'}}]}) 00:57:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000ffffee07000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:29 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000011401002cbd7000ffdbdf25040001"], 0x60}}, 0x0) 00:57:29 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)) 00:57:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000008000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x1d, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) [ 3442.081122][T17878] FAT-fs (loop5): bogus number of reserved sectors [ 3442.081136][T17878] FAT-fs (loop5): Can't find a valid FAT filesystem [ 3442.081632][T17879] xt_connbytes: Forcing CT accounting to be enabled 00:57:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3e0, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) 00:57:29 executing program 3: clock_gettime(0x3e08316853dccf0, 0x0) 00:57:29 executing program 2: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0xc020660b, 0x0) 00:57:29 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) 00:57:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3e0, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) 00:57:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000009000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:29 executing program 3: r0 = socket(0x2c, 0x3, 0x0) getpeername$packet(r0, 0x0, 0x0) [ 3442.081667][T17879] xt_nat: multiple ranges no longer supported [ 3442.142658][T17886] xt_nat: multiple ranges no longer supported 00:57:29 executing program 0: r0 = socket(0x2c, 0x3, 0x0) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 00:57:29 executing program 5: syz_mount_image$msdos(&(0x7f0000001940), &(0x7f0000001980)='./file0\x00', 0x0, 0x0, &(0x7f0000001bc0), 0x0, &(0x7f0000001c40)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0xffffffff}}]}) 00:57:29 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg(r0, &(0x7f0000006100)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="ce", 0x1}], 0x1}}, {{&(0x7f0000000600)=@generic={0x0, "bbdd506f0c135ee54a44b63ae942cee798cccb2931db723bed079614a4943a46082dbb44fb1dcb0467c273b57431245fbd8963888c58e9546250ffd04a928f53ec257f6be0e1ccf4ff7d033c4471b168053861f9635c6cbd540ff8aef57f959d34b49cb576597610790079b308ebd0ca4286e5c8eb9a7de6d9b3884e6f51"}, 0x80, &(0x7f0000002e80)=[{&(0x7f0000000680)='<', 0x1}], 0x1, &(0x7f0000002f40)=[{0x10}], 0x10}}], 0x2, 0x0) 00:57:29 executing program 4: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3e0, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) 00:57:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000a000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:29 executing program 2: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:29 executing program 3: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0xc0045878, 0x0) 00:57:29 executing program 0: futex(&(0x7f0000000000)=0x1, 0xd, 0x0, &(0x7f0000000080), 0x0, 0x0) [ 3442.149311][T17896] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 3442.179979][T17904] xt_nat: multiple ranges no longer supported 00:57:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000b000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:29 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x25047400, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 00:57:29 executing program 3: utimensat(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 00:57:29 executing program 2: mount$9p_fd(0x2010000000000000, 0x0, 0x0, 0x0, 0x0) 00:57:29 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x10, 0x86e4f9547c8a5e15}, 0x10}}, 0x0) 00:57:29 executing program 4: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3e0, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) 00:57:29 executing program 3: clock_gettime(0x6e4b896fda51e837, 0x0) [ 3442.226264][T17912] xt_nat: multiple ranges no longer supported 00:57:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f00000002c0)=""/146, 0x26, 0x92, 0x1}, 0x20) 00:57:29 executing program 0: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x5460, 0x0) 00:57:29 executing program 3: r0 = socket(0x2c, 0x3, 0x0) sendmmsg(r0, &(0x7f0000009400)=[{{&(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="61cbbd17008b"}, 0x80, 0x0}}], 0x1, 0x0) 00:57:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000c000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:29 executing program 4: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3e0, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) 00:57:29 executing program 2: mount$9p_fd(0x100000000000000, 0x0, 0x0, 0x0, 0x0) 00:57:29 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x20, 0x1411, 0x86e4f9547c8a5e15, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8, 0x4b, 0x13}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x20}}, 0x0) 00:57:29 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:57:29 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0xc, 0x0, 0x0) 00:57:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000d000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:29 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3e0, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) 00:57:29 executing program 2: syz_clone(0xa0001200, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:29 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3e0, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) 00:57:29 executing program 3: syz_clone(0x8818c080, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x0) 00:57:29 executing program 0: syz_clone(0x25047400, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 00:57:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000e000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:29 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000011401"], 0x60}}, 0x0) 00:57:29 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x18, 0x1404, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 00:57:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000000f000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:29 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg(r0, &(0x7f0000006100)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="ce", 0x1}], 0x1}}, {{&(0x7f0000000600)=@generic={0x0, "bbdd506f0c135ee54a44b63ae942cee798cccb2931db723bed079614a4943a46082dbb44fb1dcb0467c273b57431245fbd8963888c58e9546250ffd04a928f53ec257f6be0e1ccf4ff7d033c4471b168053861f9635c6cbd540ff8aef57f959d34b49cb576597610790079b308ebd0ca4286e5c8eb9a7de6d9b3884e6f51"}, 0x80, &(0x7f0000002e80)=[{&(0x7f0000000680)='<', 0x1}], 0x1, &(0x7f0000002f40)=[{0x28, 0x0, 0x0, "bd8ebcb8c72a437ec236bebdde7bb7163b"}], 0x28}}], 0x2, 0x0) 00:57:29 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3e0, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) 00:57:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000020f000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:29 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg(r0, &(0x7f0000000000), 0x2a, 0x0) 00:57:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x12, 0x0, 0x0, 0x400, 0x0, 0x1}, 0x48) 00:57:29 executing program 3: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001680), 0x0, &(0x7f0000000300)) 00:57:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) [ 3442.562603][T17986] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.3'. 00:57:29 executing program 0: futex(0x0, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000000)=0x1, 0xd, 0x0, 0x0, 0x0, 0x0) 00:57:29 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg(r0, &(0x7f0000006100)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="ce", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002f40)=[{0x28, 0x0, 0x0, "bd8ebcb8c72a437ec236bebdde7bb7163b"}], 0x28}}], 0x2, 0x0) 00:57:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000010000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@mcast1}, 0x14) 00:57:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 00:57:29 executing program 3: syz_clone(0x11200300, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000440)=[{{&(0x7f0000000100)=@l2tp={0x2, 0x0, @multicast2}, 0x80, 0x0}}], 0x1, 0x0) 00:57:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000110000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 00:57:29 executing program 5: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x5421, &(0x7f0000000780)={'ip6_vti0\x00', 0x0}) 00:57:29 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000081401"], 0x60}}, 0x0) 00:57:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3b0, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@ecn={{0x28}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x410) 00:57:30 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg(r0, &(0x7f0000003f00)=[{{0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000002680)="e9", 0x1}], 0x1, &(0x7f0000003a80)=[{0x10, 0x1, 0x2}], 0x10}}], 0x1, 0x0) 00:57:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x9, 0x0, 0x0, 0x0, 0x404, 0x1}, 0x48) 00:57:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000004c0)={{0x2, 0x0, @loopback}, {0x0, @dev}, 0x0, {0x2, 0x0, @multicast1}}) 00:57:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000011000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:30 executing program 5: clock_gettime(0x7, &(0x7f0000000380)) 00:57:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3b0, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@ecn={{0x28}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x410) 00:57:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000012000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:30 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="10000000111415"], 0x10}}, 0x0) 00:57:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f00000016c0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="d5", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000200)="a6", 0x1}], 0x1, &(0x7f0000001740)=ANY=[@ANYBLOB="7000000000ff"], 0x158}}], 0x2, 0x0) 00:57:30 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0xb, 0x0, 0x0, 0x400}, 0x48) 00:57:30 executing program 0: r0 = socket(0x2c, 0x3, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r0) 00:57:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3b0, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@inet=@ecn={{0x28}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x410) 00:57:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000116000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:30 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x1411, 0x86e4f9547c8a5e15}, 0x10}}, 0x0) 00:57:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3b8, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x418) 00:57:30 executing program 0: r0 = socket(0x1, 0x1, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 00:57:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000416000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:30 executing program 2: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x40049409, &(0x7f0000000780)={'ip6_vti0\x00', 0x0}) 00:57:30 executing program 5: sched_rr_get_interval(0x0, &(0x7f0000001500)) 00:57:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3b8, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x418) 00:57:30 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[{@mpol={'mpol', 0x3d, {'interleave', '', @void}}}]}) 00:57:30 executing program 3: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x80086601, 0x0) 00:57:30 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg(r0, &(0x7f000000d880)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000004b40)="e4", 0x1}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="7800000000000000ff000000ff0f000086647ff1ee70c13dc1601a1ca30a3684d9be2eb94ca510a0743b20168a0f159328384ee46fecd2dd7c1ca8985c02f631d6b04dbaf9c3413265d36eca6f4b8c99760f46f6ae04aa3f0119a1db519a78c6f87de70000000000f0000000000000008400000007000000ed93"], 0x168}}], 0x1, 0x0) 00:57:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000018000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:30 executing program 2: syz_clone(0x98009000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:30 executing program 5: mount$9p_fd(0x8cffffff, 0x0, 0x0, 0x0, 0x0) 00:57:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000118000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3b8, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x418) 00:57:30 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="b1", 0x1}], 0x1}}, {{&(0x7f0000000180)=@l2tp={0x2, 0x0, @dev}, 0x80, &(0x7f00000019c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x2, 0x0) 00:57:30 executing program 5: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty}}) 00:57:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000000c0)={@empty}, 0x14) 00:57:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3b8, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x418) 00:57:30 executing program 3: openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0xaa041000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000119000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:30 executing program 5: syz_clone(0xa0001200, 0x0, 0xfffffd7c, 0x0, 0x0, &(0x7f00000000c0)='\x00') 00:57:30 executing program 0: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @empty, 0x1}}) 00:57:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x19, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', r1}, 0x48) 00:57:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3b8, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x418) 00:57:30 executing program 3: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x2, &(0x7f0000000780)={'ip6_vti0\x00', 0x0}) 00:57:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000001a000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:30 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001540)=[{&(0x7f0000000540)="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", 0x1000, 0x100000001}], 0x0, &(0x7f00000015c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x31, 0x32]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x0]}}]}) 00:57:30 executing program 0: futex(0x0, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000000), 0xd, 0x0, &(0x7f0000000080), 0x0, 0x0) 00:57:30 executing program 3: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{@nr_inodes={'nr_inodes', 0x3d, [0x33]}}]}) 00:57:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3b8, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0xa8, 0xe0, 0x0, {0x22e}, [@common=@unspec=@connbytes={{0x38}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x418) 00:57:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000011a000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000001f40)=[{{&(0x7f0000000000)=@llc={0x1a, 0x0, 0x4, 0x0, 0x0, 0x7f, @link_local}, 0x80, 0x0}}], 0x1, 0x0) 00:57:30 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0xb}, 0x48) 00:57:30 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000001f40)=[{{&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, 0x0, 0x0, 0x0, 0x5865}}], 0x1, 0x0) 00:57:30 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg(r0, &(0x7f000000d880)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000004b40)="e4", 0x1}], 0x7, &(0x7f0000000340)=ANY=[@ANYBLOB="78000000000000007ff1ee70c13dc1601a1ca30a3684d9be2eb94ca510a0743b20168a0f159328384ee46fecd2dd7c1ca8985c02f631d6b04dbaf9c3413265d36eca6f4b8c99760f46f6ae04aa3f0119a1db519a78c6f87de70000000000f0000000000000008400000007000000ed93"], 0x168}}], 0x1, 0x0) 00:57:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3a8, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0x70, 0xa8, 0x0, {0x22e}}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x408) 00:57:30 executing program 2: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x421, 0x0) 00:57:30 executing program 0: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0xc0189436, &(0x7f0000000780)={'ip6_vti0\x00', 0x0}) 00:57:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x3, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f00000002c0)=""/146, 0x31, 0x92, 0x1}, 0x20) 00:57:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000011b000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:30 executing program 5: futex(0x0, 0x8d, 0x0, 0x0, 0x0, 0x0) 00:57:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x19, 0x4, 0x0, 0x400, 0x0, 0x1}, 0x48) 00:57:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000041e000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3a8, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0x70, 0xa8, 0x0, {0x22e}}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x408) 00:57:30 executing program 3: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f00000006c0)={[{@fat=@nfs_nostale_ro}]}) 00:57:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, 0x0, 0x0) 00:57:30 executing program 0: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x401c5820, 0x0) 00:57:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x3d0, 0x5, 0x3a8, 0x188, 0xe0, 0x84a019a0, 0x0, 0x0, 0x348, 0x348, 0xffffffff, 0x348, 0x348, 0x5, 0x0, {[{{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'veth0_to_bond\x00', 'wg1\x00'}, 0x0, 0x70, 0xa8, 0x0, {0x22e}}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @icmp_id, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x3dc, {0x0, @private, @remote, @icmp_id, @gre_key}}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_vlan\x00', 'ipvlan0\x00'}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "20af"}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ip={@remote, @dev, 0x0, 0x0, 'netdevsim0\x00', 'netdevsim0\x00'}, 0x0, 0xc8, 0x100, 0x0, {}, [@common=@inet=@ecn={{0x28}}, @common=@addrtype={{0x30}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @remote, @broadcast, @icmp_id, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x408) 00:57:30 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg(r0, &(0x7f000000d880)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000004b40)="e4", 0x1}], 0x7ffff000, &(0x7f0000000340)=ANY=[@ANYBLOB="7800000000000000ff000000ff0f000086647ff1ee70c13dc1601a1ca30a3684d9be2eb94ca510a0743b20168a0f159328384ee46fecd2dd7c1ca8985c02f631d6b04dbaf9c3413265d36eca6f4b8c99760f46f6ae04aa3f0119a1db519a78c6f87de70000000000f0000000000000008400000007000000ed93"], 0x168}}], 0x1, 0x0) 00:57:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000001f000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:30 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg(r0, &(0x7f000000d880)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x5000}}], 0x1, 0x0) 00:57:30 executing program 2: r0 = socket(0x2c, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 00:57:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f00000002c0)=""/146, 0x29, 0x92, 0x1}, 0x20) 00:57:31 executing program 0: set_mempolicy(0x0, &(0x7f0000007680)=0x100000000, 0xe8) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000020000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$binder(&(0x7f0000ff6000/0xa000)=nil, 0xa000, 0x1, 0x11, r0, 0x0) [ 3443.918328][T18146] FAT-fs (loop3): bogus number of reserved sectors [ 3443.918364][T18146] FAT-fs (loop3): Can't find a valid FAT filesystem 00:57:31 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="10000000021401"], 0x60}}, 0x0) 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000041401002cbd7000ffdbdf25040001"], 0x60}}, 0x0) 00:57:31 executing program 0: futex(0x0, 0xd, 0x0, &(0x7f0000000080), 0x0, 0x0) 00:57:31 executing program 2: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f0000001500)) 00:57:31 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffa, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4, 0x0, @loopback={0xfec0ffff00000000}}], 0x1c) sendto$inet6(r0, &(0x7f0000000000)="03", 0x1, 0x40, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x3b}}, 0x1c) 00:57:31 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@mpol={'mpol', 0x3d, {'interleave', '=static', @void}}}, {@mpol={'mpol', 0x3d, {'local', '=relative', @void}}}]}) 00:57:31 executing program 5: syz_clone(0x32205000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000001020000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf25040001"], 0x60}}, 0x0) 00:57:31 executing program 0: syz_clone(0x32205000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) [ 3444.000810][T18165] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 00:57:31 executing program 2: syz_clone(0x88001000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)="b4") 00:57:31 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="b1", 0x1}], 0x1}}, {{&(0x7f0000000180)=@l2tp={0x2, 0x0, @dev}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000200)='C', 0x1}], 0x1}}], 0x2, 0x0) 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf25040001"], 0x60}}, 0x0) [ 3444.048432][T18183] tmpfs: Bad value for 'mpol' 00:57:31 executing program 5: syz_clone(0x88001000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)="b4") pipe2$9p(&(0x7f00000000c0), 0x0) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000022000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ffffff2}, 0x0) 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf25040001"], 0x60}}, 0x0) 00:57:31 executing program 3: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0xc0189436, 0x0) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000025000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 5: syz_clone(0x98001100, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3444.072203][T18189] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 3444.097972][T18195] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf25040001"], 0x60}}, 0x0) 00:57:31 executing program 0: clock_gettime(0xf0b473c14c05dae, 0x0) 00:57:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)={0x30, 0xa, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_ADT={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x30}}, 0x0) 00:57:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x14, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000026000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 4: sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf25040001"], 0x60}}, 0x0) 00:57:31 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbeeb, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x3) [ 3444.143056][T18208] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 3444.174016][T18216] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 00:57:31 executing program 3: socket(0x26, 0x5, 0x36f8) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000032000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[{@mpol={'mpol', 0x3d, {'interleave', '', @void}}}], [{@subj_type={'subj_type', 0x3d, '{'}}]}) 00:57:31 executing program 4: sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf25040001"], 0x60}}, 0x0) 00:57:31 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000138000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 0: futex(0x0, 0xc, 0xffffffff, 0x0, 0x0, 0x0) 00:57:31 executing program 4: sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf25040001"], 0x60}}, 0x0) 00:57:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f00000002c0)=""/146, 0x2e, 0x92, 0x1}, 0x20) 00:57:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000001f40)=[{{&(0x7f0000000000)=@llc={0x1a, 0x0, 0x4, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)="1e", 0x1}], 0x1, &(0x7f0000000280)=[{0x10}, {0x10}], 0x20}}], 0x1, 0x0) 00:57:31 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg(r0, &(0x7f0000001b80)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000080)="5b14067805e6fec4531448c019663bbff8cf1dda4a0f8e27ed9d2662943e50528ca83728a2d5de565ca3a88b231190300bfc4d5508daa329e3d4331a7951157c3738a998c0296e7428539da96df8009145551ba0796df280014eb518d6fdc487a43d9c115835d641a5c98209972605a440222dcaedad73312a927eabd5dc8a733cc4c026b284f00f531db83c4157b279fca49790aca687b00e300a38255270441c58a42f72886bffc2f1df67cfa6671451a4af40150669a78374bea53c629ff2d2ef70bac08879031c01", 0xca}, {&(0x7f0000000180)="3db99ba5105ac9b8802f55858e099cfea00a2056622a46c90a5a7c50396a88d0855afcd87b7c99642f5c058a8137e1ddbc23c7b518c83f3809a1ca23850c126f0f145e8033b8afee60a57dd83d862f452b", 0x51}, {&(0x7f0000000200)="7e429c2103edca76a9a66fc584386e1e283023588942f44d1b840878a8abc21fa3a93dbe1f42cf4a1d74fdbfbdb801f7c3492890535b432df660", 0x3a}, {&(0x7f0000000240)="bbe67b73dbf520de54f06c0044961b1a033f743098f7da358a2abac7f8aa2f48f82fb2f130c25aa7544b2813c5b18b4e1e23c8284474ae5e0b3323b4c447375cfe145525", 0x44}, {&(0x7f0000001c00)="79294512a386373f6d7177bec4d1a443e986b9f00e4fb71208797d63ce63ce3cb5bfaa31030098d8bcb45a79e8717ee75eb13b2293a4eae02d75061bde4d6b59deaa88dcea96bf26c66a4dd361a869132340a85a373266bef702c9c9082af22e55a36f49646999ee64685d8725b0cbbea23be1eddce60df6c86cacc59ff6dc2bd1f7230b8e41469bdba8d047fb7ca01b40a60dbfefcb879b101ea0b564206944b1", 0xa1}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f00000002c0)="afd3dab64b332d2d93455abad8d128095767da008d0cdbb95dde", 0x1a}], 0x7, &(0x7f0000001500), 0xffffffffffffffdf}}, {{&(0x7f0000001540)=@ax25={{0x3, @null}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000001880)=[{&(0x7f00000015c0)="db822e9c1cd3a4350d055204251691133a66525e0c31b861960daaf93e5a447a025e7647639fd6fe4825c03c1ddab5c7ec049714bd23f31e4f088195d5a9b30a86f4d3d4c3657a957e02df6c8df2b58a8c247fa7be5642c162e3f924a6b9480503b5548adf2a96c592c654be86eef6cf8a07", 0x72}, {&(0x7f0000001640)="0c1633674d0fb54d74bdb7", 0xb}, {&(0x7f0000001680)="c37d3a8909274ab8f1cb8ae2109d9dfaac629f41904ff941f6cff60825e24660c467ca1f50faa5153f248e2460f3ae68c0fa97f65b766ede75de1789e10b4696e847892c1d8d4cf763697d7143f5839cfb4ba6347179331c77d828e9de3ad9b8895f0497034d05f2d9e613fcc2b271091f0adf522db58c10033d793ea61b1a27de1bb853b730918a45088626ec54599c9719b955fe86f9cbe129f6a44a028608bc8aabd5e7649f597c172165ed28d87025b205a8d482db338d912d4a4cfa91ab2ea45a8a782bfb4e4167f35c7cbbe92ad6e8801503e4a1b16abc6c20626cd891091abffeda6f2d3fec0eb7", 0xeb}, {&(0x7f0000001780)="106d648970ed874d1c0fd2a7c5ec0890c8d00e2ce9c9934423550ab95b1c6a259c581c5d3ccda07b214f50d747e262730b125051258c3bca38d940dffc585a9ff9351fc70306ce81b1edc897aea32879e56d0d2d05a68ba0c08a54f780477654badda4be469585f817338dad89e2d2e6cdf360cb4995092e59b57d7dbcb72664cb0e9fb23e25e9367722171407c715ebca5cf39f3867617ba85d57578dd86d64a38bca787560f02a1b56628c90a0532300744c6af470a032b3275e2684b07d1b2a905f2364ac63f43f5bb75adb63c4a081c29994f635c701d9d6a7", 0xdb}], 0x4, &(0x7f00000018c0)=[{0xf8, 0x0, 0x0, "ed2ab899d36537ffe98546aa8db5220936a5d7814e805ac9bf379e3bd32094e819277e475332a8ca5158d1035f6e36ad0d582cac5c8dd80c28dd8d322008189bc6b82ab46c66a25ff8701b81d8d24ca35b8ddc438cd26e86f2b3d1a694e7ee1ec35c7ff928015c0ff384144a5ec99994d66f74b68d7e2e2faa6b791944380dd8af76d7c9b5379c3f407d5ade4850bdcfb008ff188f9a8070e07956000cd9e502704f857486e1996dc58f7669d28f208e4cb746a53868bac3538a568b9594decf5a1e3b6fe16fe3b3fb8cd253a492ee3d227fbfdffed496d6c0fcbff29f65ead44e2aff87"}, {0x78, 0x0, 0x0, "bb68f968e6193fca579d1636a9a0cc79e623ea5311dd1420396a0db55b2c32891fa8bb746e33333ec0bfba919b819f00ff8c3c1cd518cfce269882e1d17cc14a10bb843441963ea0ac405b803a770bd7ac33f111e19ae95af7a9876ab85681e8bc9933"}, {0x70, 0x0, 0x0, "9c96dcb6ed55c6494963ef3e4717fbce90a56f561c5eb06b379e95dc6c7d570e8537e616b6a4a8163aa3960ff600b89862e3d77d302db92f33e5205d38975cdb96abe8ccde1f01e047faf20d8c8230cb7b8c47a41ddcb12f81"}, {0xb0, 0x0, 0x0, "11d17c154ff54961e19f3060b85c3120349e59ae15bcb758c49e909f4b19e92a8a0570af2c48c2d1ba63ca20c70888a894438acca8bc3e36c6b66573652e89a49f718bfe2d46916c88e0939d4005e0489f93b16935a2f8a7cfb14025a4a7ea10d2d7cad0bfc4df14e2ba05e8eb9471a0beef43333e537fa3b4ad71309f25f673afc48df8f1190471e1dc43d40b010c7435cbe88895ae4c91ddd581892271739f"}], 0x290}}], 0x2, 0x0) [ 3444.267504][T18228] tmpfs: Unknown parameter 'subj_type' 00:57:31 executing program 5: syz_clone(0x28021000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000003e000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 4: socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf25040001"], 0x60}}, 0x0) 00:57:31 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ptype\x00') r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000002c0)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000280)=""/53, 0x35}], 0x1, 0x1a, 0x0) 00:57:31 executing program 0: syz_clone(0x8c001000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:31 executing program 2: syz_clone(0x88001000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000003f000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 4: socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf25040001"], 0x60}}, 0x0) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000040000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x4}, 0x48) 00:57:31 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg(r0, &(0x7f000000d880)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000004b40)="e4", 0x1}], 0x1, &(0x7f0000000340)=ANY=[], 0xf}}], 0x1, 0x0) 00:57:31 executing program 4: socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf25040001"], 0x60}}, 0x0) 00:57:31 executing program 5: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x4020940d, &(0x7f0000000780)={'ip6_vti0\x00', 0x0}) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000046000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000880)={0x0, @vsock={0x28, 0x0, 0x0, @hyper}, @vsock={0x28, 0x0, 0x0, @local}, @ethernet}) 00:57:31 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in=@dev}, 0x3, @in6=@mcast2, 0x0, 0x4}}, 0xe8) 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, 0x0, 0x0) 00:57:31 executing program 0: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x801c581f, 0x0) 00:57:31 executing program 3: futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f0000000080), 0x2) 00:57:31 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x3c}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000048000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 5: futex(&(0x7f0000000000)=0x2, 0xd, 0x0, 0x0, 0x0, 0x0) 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, 0x0, 0x0) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000004c000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 3: r0 = socket(0x2c, 0x3, 0x0) sendmmsg(r0, &(0x7f0000009400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 00:57:31 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x31, 0x32]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x35, 0x0]}}]}) 00:57:31 executing program 0: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x5450, 0x0) 00:57:31 executing program 5: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x40049409, 0x0) 00:57:31 executing program 0: syz_clone(0x88001000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) 00:57:31 executing program 3: statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x1) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000051000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, 0x0, 0x0) 00:57:31 executing program 2: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x541b, 0x0) 00:57:31 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="10000000011401"], 0x60}}, 0x0) 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 00:57:31 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="b1", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000055000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 2: futex(0x0, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000000), 0xd, 0x0, 0x0, 0x0, 0x0) 00:57:31 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000ffffffee000800000000000000004000ffffffee00000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 00:57:31 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x10, 0x1404, 0x1}, 0x10}}, 0x0) 00:57:31 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x140d, 0x1}, 0x10}}, 0x0) 00:57:31 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="b1", 0x1}], 0x1}}, {{&(0x7f0000000180)=@l2tp={0x2, 0x0, @dev}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000200)='C', 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x2, 0x0) 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000ffffaa55000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 0: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f2, &(0x7f0000000780)={'ip6_vti0\x00', 0x0}) 00:57:31 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg(r0, &(0x7f0000003f00)=[{{0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000002680)="e9", 0x1}], 0x1, &(0x7f0000003a80)=[{0x10}, {0x10, 0x1, 0x2}], 0x20}}], 0x1, 0x0) 00:57:31 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000011401002cbd7000ffdbdf25080001"], 0x60}}, 0x0) 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000060000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 0: openat$vcsu(0xffffffffffffff9c, &(0x7f0000002ac0), 0x12002, 0x0) 00:57:31 executing program 2: syz_clone(0x2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:31 executing program 5: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x401c5820, &(0x7f0000000780)={'ip6_vti0\x00', 0x0}) 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x60}}, 0x0) 00:57:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x14e24, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendto$inet6(r0, &(0x7f0000000880)='b', 0x1, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000100)=""/207, 0xcf, 0x0, 0x0, 0x0) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000068000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 2: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x40086602, 0x0) 00:57:31 executing program 5: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000002980), 0x3, 0x0, 0x0, &(0x7f0000002a00), 0x0) 00:57:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000280)={r2, 0x3}, 0x8) [ 3444.726060][T18353] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.5'. 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x60}}, 0x0) 00:57:31 executing program 3: clock_gettime(0xb, &(0x7f0000000380)) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000026a000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 5: r0 = socket(0x0, 0x5, 0x7) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r0, 0x0, 0x8010) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, 0x0, 0x810) openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x40242, 0x80) 00:57:31 executing program 2: futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f0000000080)=0x2, 0x2) 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x60}}, 0x0) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000006c000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 0: syz_clone(0x40403100, 0x0, 0xfffffffffffffd2f, 0x0, 0x0, 0x0) 00:57:31 executing program 2: futex(0x0, 0x3c, 0x0, 0x0, 0x0, 0x0) 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[], 0x60}}, 0x0) 00:57:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x19, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 00:57:31 executing program 2: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x5421, 0x0) 00:57:31 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x9, 0x0, 0x0, 0x400, 0x0, 0x1}, 0x48) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000074000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 0: syz_clone(0xcb240700, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[], 0x60}}, 0x0) 00:57:31 executing program 2: openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x1fbf5e7828d44939, 0x0) 00:57:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000379000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x19, 0x0, 0x0, 0x400, 0x0, 0x1}, 0x48) 00:57:31 executing program 5: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x2, 0x0) 00:57:31 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[], 0x60}}, 0x0) 00:57:31 executing program 0: futex(0x0, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000000)=0x1, 0xd, 0x0, &(0x7f0000000080), 0x0, 0x0) 00:57:31 executing program 2: mount$9p_fd(0x2010000000000000, 0x0, &(0x7f00000003c0), 0x0, 0x0) 00:57:31 executing program 5: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x5451, 0x0) 00:57:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x60}}, 0x0) 00:57:32 executing program 0: syz_mount_image$msdos(&(0x7f0000001940), &(0x7f0000001980)='./file0\x00', 0x0, 0x0, &(0x7f0000001bc0), 0x0, &(0x7f0000001c40)={[{@fat=@allow_utime}]}) 00:57:32 executing program 3: r0 = socket(0x2c, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast1}}) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000007a000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0xc0}}, 0x0) 00:57:32 executing program 2: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f00000006c0)={[{@fat=@nfs_nostale_ro}, {@fat=@fmask={'fmask', 0x3d, 0x80000001}}]}) 00:57:32 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0, 0x13}}, 0x0) 00:57:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x60}}, 0x0) 00:57:32 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="6000000001140102"], 0x60}}, 0x0) 00:57:32 executing program 2: futex(&(0x7f0000000140)=0x1, 0x8, 0x0, 0x0, 0x0, 0x0) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000084000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ptype\x00') preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/40, 0x28}], 0x1, 0x66000000, 0x0) 00:57:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x60}}, 0x0) 00:57:32 executing program 3: prctl$PR_SET_PDEATHSIG(0x59616d61, 0x20000800023) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000ffffff8c000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 0: prctl$PR_SET_PDEATHSIG(0x59616d61, 0x0) 00:57:32 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000680)={0xa4, 0x0, &(0x7f0000000440)=[@acquire_done, @transaction_sg={0x40486311, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 00:57:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0xa, 0x0, 0x0) 00:57:32 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000740), 0x0, 0x0) 00:57:32 executing program 2: prctl$PR_SET_PDEATHSIG(0x35, 0x20000800023) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000194000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd"], 0x60}}, 0x0) 00:57:32 executing program 5: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x20200, 0x0) 00:57:32 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000680)={0xa4, 0x0, &(0x7f0000000440)=[@acquire_done, @transaction_sg={0x40486311, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000080)={@flat=@binder={0x73622a85, 0x100, 0x2}, @fda={0x66646185, 0x3, 0x0, 0x16}, @flat=@weak_binder={0x77622a85, 0xf0674740d7c4ad93}}, &(0x7f0000000100)={0x0, 0x18, 0x38}}, 0x400}, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0xee, 0x0, &(0x7f0000000580)="9589f29536efe3f971949baecf778ba9f3dece10002c36d07cca0cfa054bd9e580d8350aba172d7a45926159b4fd68b09aa2d185ba382a864433b2432b55b8c18ce13d79c4f4eceae683b9351f09997fc7c295db906699fd51b20d19a00106675ed860a93ba68408a7b209eacdd7ddb06bbacc3e3a8ca69a0f3ac054fb37b819fcac80cfbbdf7168f7b11ccd161b241aa1a21ea409dba66e779e5563ec4ba3fc88d43882305cb91e2a8715d3da5bd31a4f37e0eb71af4026050d8b3e78a120a4620f5025e09036877fb03acdd4f74eed1fb9a46d05f6d1a77ec56f2589c4c459f02964d8d39de34782f225726331"}) 00:57:32 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 00:57:32 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000394000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd"], 0x60}}, 0x0) 00:57:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x13, 0x0, 0x0) 00:57:32 executing program 3: r0 = getpid() process_vm_readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000040)=""/213, 0xd5}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000000980)=[{&(0x7f0000000880)=""/108, 0x6c}, {&(0x7f0000000900)=""/89, 0x59}], 0x2, 0x0) 00:57:32 executing program 0: sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe}, {0x22, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@nsim={{}, {0x0, 0x2, {'netdevsim', 0x0}}}}]}, 0x3c}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000200000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000b1000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x0, 0x0, 0x11, &(0x7f0000000080)="ece288b9263ff325ec7c3bf53a829b7e63"}) [ 3445.119835][T18472] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.4'. 00:57:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd"], 0x60}}, 0x0) 00:57:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xc, &(0x7f0000000680)={@in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x0, 0x0, "7e413012d351536fa5c91774b8cd97c1fc1a9b02f31ae491cf3ea0d441bf1db426dd2eea22fcca494380d65badc9a431f1d175e0e40788b5301b314d11d376a80879e53ac84769dad1253ab69998123a"}, 0xd8) 00:57:32 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000000800), 0x84000, 0x0) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000003b1000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8915, &(0x7f0000000100)={'batadv_slave_0\x00'}) 00:57:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)={0x10}, 0x10}], 0x1, &(0x7f0000000580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}], 0x20}, 0x0) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000003bc000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x5, 0x0, 0x0) 00:57:32 executing program 3: rt_sigaction(0x2f, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000240)) 00:57:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf"], 0x60}}, 0x0) 00:57:32 executing program 0: socket$inet(0x2, 0x802, 0x6) [ 3445.162188][T18483] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3445.209456][T18494] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.4'. 00:57:32 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x5411, &(0x7f0000000000)={'batadv_slave_0\x00'}) 00:57:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x10, 0x0, 0x0) 00:57:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf"], 0x60}}, 0x0) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000001be000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8082}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 00:57:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getpeername$packet(r0, 0x0, 0x0) 00:57:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf"], 0x60}}, 0x0) 00:57:32 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8923, &(0x7f0000000100)={'batadv_slave_0\x00'}) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000000edc0000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x17, 0x0, 0x0) 00:57:32 executing program 3: syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x4, 0x103382) r1 = memfd_create(&(0x7f0000000480)='\x02\a\xc5(\xec[r\xe1:', 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x1c, 0x0, "5d94694241083986867054e249fd8ebe30375e90036cdbf1c6b3bd27b1b6bfa6cdb0d4bb77d1804b5d5cce8f72f9e15c0ad7113bbb67180c1a99261b02acb155", "5645c32599684d8c2356dc055533a9440a2d7f96e1dc319d86c622e89d74efd2", [0x0, 0xa]}) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000580)='?', 0x1}], 0x1, 0x81806, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_CLR_FD(r0, 0x4c01) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x24}}, 0x40000040) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f0000000000)=0x10000, 0xffffffffffffffff, 0x0, 0x0, 0x0) [ 3445.264486][T18512] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3445.299398][T18521] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.4'. 00:57:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000013c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 00:57:32 executing program 2: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000003c1000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf2504"], 0x60}}, 0x0) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000ffffffc9000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 0: syz_clone(0x91044100, 0x0, 0x0, 0x0, 0x0, 0x0) [ 3445.327081][T18529] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3445.361997][T18536] loop4: detected capacity change from 0 to 1036 00:57:32 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 00:57:32 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, 0x0) 00:57:32 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000042000501"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x140, &(0x7f00000002c0)=[{&(0x7f00000004c0)=""/4096, 0x10e0}, {&(0x7f0000001580)=""/238, 0xf0}], 0x4, 0x0, 0x300}}], 0x40000000000002e, 0x0, 0x0) 00:57:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf2504"], 0x60}}, 0x0) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000003d0000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000080)={0x1, @remote_oob_data_neg_reply={{0x433, 0x6}}}, 0xa) 00:57:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x18, 0x0, 0x0, 0x0, 0x808, 0x1}, 0x48) 00:57:32 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000005800)='ns/ipc\x00') 00:57:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf2504"], 0x60}}, 0x0) [ 3445.413829][T18550] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3445.414520][ T3088] I/O error, dev loop4, sector 24 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000ffffffda000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x20}, 0xc) [ 3445.449485][T18557] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.4'. 00:57:32 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x3f, 0x0) creat(0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000080)={0x3800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, "ed0487c01cc2a3938b43aafa78ec38dbd24ef9ef765a13935ed652be575112463ffc8eb13a50475366fae7ab59be7aa741babd99c255275bfb4f8b593f2afa4f", "22b1a1737d063e2ceb03a1249280a063ca5c77a6e516cefc3cd30f411692ff7b43f752b33cd29682334c78a3e9c2c988a43b7b7b34a3daf66c41e9959f1698e8", "de584fc4026527a7064dd11f7cc2744d6d719a250576ee7fefc3a0bb471519f9", [0x9]}) 00:57:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf250400"], 0x60}}, 0x0) 00:57:32 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0xc, &(0x7f0000001d80)=ANY=[@ANYBLOB="181bbd71", @ANYRES32, @ANYBLOB="000000000000000085100000fffffffffd340300030000007fd40500050000001e480700060000006b08f8ff0000000014715000fcffffff18430000fbffffff0000000000000000184a0000fe"], &(0x7f0000000200)='GPL\x00', 0x4, 0x1000, &(0x7f00000005c0)=""/4096, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000ffffffe2000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 2: prctl$PR_SET_PDEATHSIG(0x3, 0x0) 00:57:32 executing program 5: process_vm_readv(0x0, &(0x7f00000007c0)=[{&(0x7f0000000040)=""/213, 0xd5}], 0x1, 0x0, 0x0, 0x0) 00:57:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf250400"], 0x60}}, 0x0) 00:57:32 executing program 2: prctl$PR_SET_PDEATHSIG(0x43724f53, 0x0) 00:57:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x31, 0x0, 0x0) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000002e4000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="60000000021401002cbd7000ffdbdf250400"], 0x60}}, 0x0) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000002e5000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x24000004, &(0x7f0000b63fe4), 0x1c) 00:57:32 executing program 3: inotify_add_watch(0xffffffffffffffff, 0x0, 0xc6f798d24f64c24e) 00:57:32 executing program 2: openat$nvram(0xffffffffffffff9c, 0x0, 0x539182, 0x0) 00:57:32 executing program 5: r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x5000800) 00:57:32 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000100)={0x0, "dc5eb87444f82078b5d77089b7f7713de82ec9f19a9d8ff41d44d0646bd0c5fb8825edbee700000000000000000000600700"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000100)={0x0, "dc5eb87444f82078b5c67089b7f7713de82ee190cfc39c8fac06016b177fedc9f19abd0dfd75bce9f59d8ff41d44d0646bd0bf024166c10100008000000000e7"}, 0x48, 0xfffffffffffffffb) keyctl$link(0x8, r0, r1) 00:57:32 executing program 2: sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x12925524aa5bea65) 00:57:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2b, 0x0, 0x0) 00:57:32 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000002e6000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x51) 00:57:32 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 00:57:32 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xc, 0x1) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80085504, &(0x7f0000000000)) 00:57:32 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @fixed}, 0xe) 00:57:32 executing program 3: clock_gettime(0x271a0c93ab82dc41, 0x0) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000002e7000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet(0x2, 0x0, 0x4800) 00:57:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000002340)='./bus\x00', 0x5a042, 0x0) write(r0, &(0x7f0000004200)="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", 0xffffffff000) pwritev2(r0, &(0x7f0000000540)=[{&(0x7f0000000200)='s', 0x1}], 0x1, 0x0, 0x0, 0x9) 00:57:32 executing program 5: r0 = getpid() process_vm_readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000040)=""/213, 0xd5}], 0x1, &(0x7f0000000980)=[{&(0x7f0000000880)=""/108, 0x6c}, {0x0}], 0x2, 0x0) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000fffffff0000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xc, 0x1) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80085504, &(0x7f0000000000)) 00:57:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x32, 0x0, 0x0) 00:57:32 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 00:57:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="340000001500f59500000000002000000a000000", @ANYRES32, @ANYBLOB="080008001f536bae140002"], 0x34}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x4000000000002bc, 0x0) [ 3445.728326][T18621] usb usb2: usbfs: process 18621 (syz-executor.2) did not claim interface 0 before use [ 3445.741973][T18621] vhci_hcd: default hub control req: 010b v0000 i0000 l0 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000001f4000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x6, 0x0, 0x0) 00:57:32 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xc, 0x1) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80085504, &(0x7f0000000000)) 00:57:32 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x1, 0x0, 0x11, &(0x7f0000000080)="ece288b9263ff325ec7c3bf53a829b7e63"}) 00:57:32 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)) 00:57:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, 0x0, 0x3) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000fffffff6000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 3445.787470][T18637] usb usb2: usbfs: process 18637 (syz-executor.2) did not claim interface 0 before use 00:57:32 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001580)={0x6, 0x3, &(0x7f0000000440)=@framed, &(0x7f00000004c0)='syzkaller\x00', 0x1f, 0x1000, &(0x7f0000000500)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:32 executing program 5: socket(0x0, 0xeb5c723a2a8713c7, 0x0) 00:57:32 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xc, 0x1) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80085504, &(0x7f0000000000)) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000002f9000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 00:57:32 executing program 3: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0xff}, &(0x7f00000000c0)) 00:57:32 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x0, 0x1}], 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_queued\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x28011, r1, 0x0) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 00:57:32 executing program 0: prctl$PR_SET_PDEATHSIG(0x38, 0x20000800023) [ 3445.787531][T18637] vhci_hcd: default hub control req: 010b v0000 i0000 l0 [ 3445.840840][T18648] usb usb2: usbfs: process 18648 (syz-executor.2) did not claim interface 0 before use 00:57:32 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000680)={0x44, 0x0, &(0x7f0000000440)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 00:57:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000fffffdf9000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x18, 0x0, 0x0) 00:57:32 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0xd48c0, 0x0) 00:57:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x4, 0x0, 0x0) 00:57:33 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) connect$netlink(r0, &(0x7f0000000000)=@unspec, 0xc) 00:57:33 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8917, &(0x7f0000000100)={'batadv_slave_0\x00'}) 00:57:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000fffffffb000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:33 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001580)={0x6, 0x3, &(0x7f0000000440)=@framed, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001500), 0x8, 0x10, 0x0}, 0x80) [ 3445.840967][T18648] vhci_hcd: default hub control req: 010b v0000 i0000 l0 [ 3445.899717][T18666] usb usb2: usbfs: process 18666 (syz-executor.2) did not claim interface 0 before use [ 3445.899778][T18666] vhci_hcd: default hub control req: 010b v0000 i0000 l0 00:57:33 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x28d81, 0x0) 00:57:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x11, 0x2, 0x0, 0x300) 00:57:33 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8914, &(0x7f0000000100)={'batadv_slave_0\x00'}) 00:57:33 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x101, 0x0, "88c183efeb000400007e010100005fabcce0c2"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x1) 00:57:33 executing program 0: syz_clone(0x49800400, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:33 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x0, 0x1}], 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_queued\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x28011, r1, 0x0) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 00:57:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000fffffdfd000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 3445.982634][ T25] audit: type=1400 audit(3453.016:791): avc: denied { connect } for pid=18683 comm="syz-executor.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 00:57:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000fffffffe000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:33 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) 00:57:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x81, 0x4) 00:57:33 executing program 3: r0 = getpid() process_vm_readv(r0, &(0x7f0000000480)=[{&(0x7f0000000080)=""/233, 0xe9}], 0x1, &(0x7f0000000600)=[{&(0x7f0000000500)=""/254, 0xfe}], 0x1, 0x0) 00:57:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000fff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:33 executing program 2: mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x7fffffff) [ 3446.063656][T18698] batman_adv: batadv0: Interface deactivated: batadv_slave_0 00:57:33 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000000680), 0x86081, 0x0) 00:57:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x3f, 0x0) creat(0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, "ed0487c01cc2a3938b43aafa78ec38dbd24ef9ef765a13935ed652be575112463ffc8eb13a50475366fae7ab59be7aa741babd99c255275bfb4f8b593f2afa4f", "22b1a1737d063e2ceb03a1249280a063ca5c77a6e516cefc3cd30f411692ff7b43f752b33cd29682334c78a3e9c2c988a43b7b7b34a3daf66c41e9959f1698e8", "de584fc4026527a7064dd11f7cc2744d6d719a250576ee7fefc3a0bb471519f9", [0x9]}) 00:57:33 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000080)=0xeb6, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x107e, 0x21f8}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4dca) splice(r0, 0x0, r2, 0x0, 0x1ffe1, 0x0) recvmmsg(r2, &(0x7f0000006980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x60012140, 0x0) 00:57:33 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), r0) 00:57:33 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x0, 0x1}], 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_queued\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x28011, r1, 0x0) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 00:57:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000ffffefff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:33 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000080)=0xeb6, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x107e, 0x21f8}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4dca) splice(r0, 0x0, r2, 0x0, 0x1ffe1, 0x0) recvmmsg(r2, &(0x7f0000006980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x60012140, 0x0) 00:57:33 executing program 2: socket$unix(0x1, 0x0, 0x0) syz_clone(0x40040000, &(0x7f0000000040), 0x0, 0x0, 0x0, &(0x7f00000001c0)) 00:57:33 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000100)={@local}, &(0x7f0000000140)=0xc) 00:57:33 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x10, 0x0, &(0x7f0000000040)=[@register_looper, @dead_binder_done], 0x0, 0x0, 0x0}) 00:57:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x88, 0x2, 0x0, 0x0) 00:57:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000000)=ANY=[], 0x10}], 0x1}, 0x0) 00:57:33 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000080)=0xeb6, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x107e, 0x21f8}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4dca) splice(r0, 0x0, r2, 0x0, 0x1ffe1, 0x0) recvmmsg(r2, &(0x7f0000006980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x60012140, 0x0) 00:57:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000fffffbff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:33 executing program 0: rt_sigaction(0x2f, 0x0, 0x0, 0x8, &(0x7f0000000240)) 00:57:33 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000080)='|'}) 00:57:33 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x0, 0x1}], 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_queued\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x28011, r1, 0x0) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) 00:57:33 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x233) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000080)=0xeb6, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x107e, 0x21f8}, 0x14) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x4dca) splice(r0, 0x0, r2, 0x0, 0x1ffe1, 0x0) recvmmsg(r2, &(0x7f0000006980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x60012140, 0x0) 00:57:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00000003ffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:33 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xc, 0x1) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) 00:57:33 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) inotify_rm_watch(r0, 0x0) 00:57:33 executing program 0: rt_sigaction(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000240)) 00:57:33 executing program 2: r0 = epoll_create(0x3) pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0xb0000011}) 00:57:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000001fffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:33 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xc, 0x1) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) 00:57:33 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xc, 0x1) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) 00:57:33 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getpeername$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xffffffffffffff39) 00:57:33 executing program 2: openat$nvram(0xffffffffffffff9c, 0x0, 0x510000, 0x0) 00:57:33 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000003b40)={0x0, 0x0, &(0x7f0000003740)=[{0x0}, {0x0}], 0x2, &(0x7f0000003ac0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}, 0x0) 00:57:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000055aaffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:33 executing program 4: socket(0x1, 0x0, 0x1a0c97b5) 00:57:33 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040), 0xe) 00:57:33 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xc, 0x1) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000000)) [ 3446.582488][ T1429] ================================================================== [ 3446.582515][ T1429] BUG: KCSAN: data-race in evdev_pass_values / evdev_poll [ 3446.582545][ T1429] 00:57:33 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x100000, 0x0) 00:57:33 executing program 0: inotify_add_watch(0xffffffffffffffff, 0x0, 0x2) 00:57:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000007eeffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:33 executing program 2: sched_rr_get_interval(0x0, &(0x7f0000000180)) 00:57:33 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000180)={0x0, 0x0, 0x6}) socket(0x0, 0x0, 0x0) 00:57:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x891b, &(0x7f0000000100)={'batadv_slave_0\x00'}) 00:57:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 3446.582550][ T1429] write to 0xffff888103a2b008 of 4 bytes by task 18768 on cpu 1: 00:57:33 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000680)={0x4c, 0x0, &(0x7f0000000440)=[@transaction_sg={0x40486311, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 00:57:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000ffefffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x19, 0x0, 0x0) 00:57:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000fffbffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:33 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001580)={0x6, 0x3, &(0x7f0000000440)=@framed, &(0x7f00000004c0)='syzkaller\x00', 0x1f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:33 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8919, &(0x7f0000000100)={'batadv_slave_0\x00'}) 00:57:33 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000180)={0x0, 0x0, 0x6}) socket$inet(0x2, 0x0, 0x0) 00:57:33 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000180)={0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) socket(0x2, 0x0, 0x0) 00:57:33 executing program 2: memfd_create(&(0x7f0000000500)='[\x00', 0x4) [ 3446.582567][ T1429] evdev_pass_values+0x3b7/0x510 [ 3446.582591][ T1429] evdev_events+0x91/0xd0 [ 3446.582612][ T1429] input_pass_values+0x37a/0x8f0 00:57:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000f9fdffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:33 executing program 5: process_vm_readv(0x0, &(0x7f00000007c0)=[{&(0x7f0000000040)=""/213, 0xd5}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000000980)=[{&(0x7f0000000880)=""/108, 0x6c}], 0x1, 0x0) 00:57:33 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000180)={0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}) socket$inet(0x2, 0x6, 0x0) 00:57:33 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f00000002c0)) [ 3446.582629][ T1429] input_handle_event+0x8d4/0xd50 [ 3446.582647][ T1429] input_inject_event+0xbc/0xe0 00:57:33 executing program 4: prctl$PR_SET_PDEATHSIG(0x19, 0x0) 00:57:33 executing program 2: timer_create(0x0, &(0x7f00000006c0)={0x0, 0x22, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000700)) 00:57:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000fdfdffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:33 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x891e, &(0x7f0000000100)={'batadv_slave_0\x00'}) 00:57:33 executing program 3: prctl$PR_SET_PDEATHSIG(0x2a, 0x20000800023) [ 3446.582666][ T1429] evdev_write+0x326/0x400 00:57:33 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8946, &(0x7f0000000000)={'batadv_slave_0\x00'}) 00:57:33 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x541b, &(0x7f0000000000)={'batadv_slave_0\x00'}) 00:57:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00007fffffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:33 executing program 2: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020200000000020202020202020202020204344090000000000000020202020202020202020202020202020202020202020000000000000000029009b0000000029000000000000000000000000000000000000000000000000000000000000000001000001010000000018", 0x82, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000002900000000000029252f", 0x5a, 0x8800}], 0x0, &(0x7f0000012200)) [ 3446.582693][ T1429] vfs_write+0x26d/0x890 [ 3446.582709][ T1429] ksys_write+0xe8/0x1a0 [ 3446.582726][ T1429] __x64_sys_write+0x3e/0x50 00:57:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x16, 0x0, 0x0) 00:57:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x14, 0x0, 0x0) 00:57:33 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000080)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000029c0)=""/4077, 0xfed}, {&(0x7f0000003a00)=""/4106, 0x100a}], 0x2}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x29) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0xffff7ffc, @local}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="900000002000", 0x6, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='%', 0xad2a, 0x7802, 0x0, 0x4b6ae4f95a5de307) 00:57:33 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448f0, &(0x7f0000000180)='-') 00:57:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f00008cffffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:33 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8914, &(0x7f0000000040)={'batadv_slave_1\x00'}) [ 3446.582743][ T1429] do_syscall_64+0x2b/0x70 [ 3446.582762][ T1429] entry_SYSCALL_64_after_hwframe+0x46/0xb0 00:57:33 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000140), 0x4) 00:57:33 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) bind$bt_hci(r0, 0x0, 0x0) 00:57:33 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/pid\x00') 00:57:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x12, 0x0, 0x0) 00:57:34 executing program 4: r0 = getpid() process_vm_readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000040)=""/213, 0xd5}], 0x1, &(0x7f0000000980)=[{&(0x7f0000000880)=""/108, 0x6c}, {&(0x7f0000000900)=""/89, 0x59}], 0x2, 0x0) 00:57:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000c9ffffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) [ 3446.582782][ T1429] [ 3446.582787][ T1429] read to 0xffff888103a2b008 of 4 bytes by task 1429 on cpu 0: 00:57:34 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)={0x0, 0x0, "eb584d", 0x20}) connect$netlink(0xffffffffffffffff, 0x0, 0x0) 00:57:34 executing program 2: prctl$PR_SET_PDEATHSIG(0x1d, 0x20000800023) [ 3446.582802][ T1429] evdev_poll+0xdd/0x110 00:57:34 executing program 5: r0 = getpid() ptrace$getsig(0x4202, r0, 0x0, 0x0) 00:57:34 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8931, &(0x7f0000000100)={'batadv_slave_0\x00'}) 00:57:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0xf, 0x0, 0x0) [ 3446.582823][ T1429] do_select+0x951/0x1020 00:57:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000daffffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:34 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000080), 0x0) [ 3446.582841][ T1429] core_sys_select+0x368/0x520 00:57:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x8}, 0x48) 00:57:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000e2ffffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2a, 0x0, 0x0) 00:57:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x30, 0x0, 0x0) 00:57:34 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x3938700}}, &(0x7f0000000280)) 00:57:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000f0ffffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:34 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448f0, 0x0) 00:57:34 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x900200}, 0xc) 00:57:34 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x185b00, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) 00:57:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000f6ffffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:34 executing program 4: timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x3938700}}, 0x0) [ 3446.582858][ T1429] __do_sys_pselect6+0x1f4/0x250 [ 3446.582877][ T1429] __x64_sys_pselect6+0x74/0x80 [ 3446.582895][ T1429] do_syscall_64+0x2b/0x70 [ 3446.582915][ T1429] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 3446.582935][ T1429] [ 3446.582938][ T1429] value changed: 0x0000002a -> 0x0000002c [ 3446.582949][ T1429] [ 3446.582951][ T1429] Reported by Kernel Concurrency Sanitizer on: [ 3446.582958][ T1429] CPU: 0 PID: 1429 Comm: acpid Not tainted 5.19.0-rc2-syzkaller-00049-g24625f7d91fb-dirty #0 [ 3446.582981][ T1429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3446.582992][ T1429] ================================================================== 00:57:34 executing program 0: sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000200000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 00:57:34 executing program 2: memfd_create(&(0x7f0000000200)='~\x00', 0x2) 00:57:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x24, 0x0, 0x0) 00:57:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0xce4, 0x4) 00:57:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x3, 0x2, 0x0, 0x0) 00:57:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000fbffffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000feffffff000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000280)=0x1f, 0x4) 00:57:34 executing program 5: socket(0xa, 0x3, 0x1f) 00:57:34 executing program 2: r0 = socket(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f00000000c0)=0x1002, 0x4) sendto$inet(r0, 0x0, 0xffe5, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x2001) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f00000000c0)) 00:57:34 executing program 4: madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x6) mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000000100)=""/201) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 00:57:34 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0xef9) 00:57:34 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x890d, &(0x7f0000000100)={'batadv_slave_0\x00'}) 00:57:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000004000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:34 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000000c0)={0x4c}, 0x4c}}, 0x0) 00:57:35 executing program 0: select(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0xdb}, &(0x7f00000001c0)={0x77359400}) 00:57:35 executing program 4: rt_sigaction(0x2f, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000240)) 00:57:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000000)=""/134, &(0x7f00000000c0)=0x86) 00:57:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000000030000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "9b8fe9e4df42b05d"}}]}, 0x34}}, 0x0) 00:57:35 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001580)={0x6, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x6, 0x0, 0x0, 0x627c, 0x0, 0x1}, 0x48) 00:57:35 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x4100, 0x0) 00:57:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000000040000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:35 executing program 3: r0 = getpid() process_vm_readv(r0, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000180)=""/194, 0xc2}], 0x2, &(0x7f0000000600)=[{&(0x7f0000000500)=""/254, 0xfe}], 0x1, 0x0) 00:57:35 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000300)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000000)={'b', ' *:* ', 'r\x00'}, 0x8) 00:57:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000000050000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:35 executing program 0: socket$inet(0x2, 0x5, 0xffff5cca) 00:57:35 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 00:57:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000100)=0x7, 0x4) 00:57:35 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001580)={0x6, 0x3, &(0x7f0000000440)=@framed, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) 00:57:35 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000480)='\x02\a\xc5(\xec[r\xe1:', 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000580)='?', 0x1}], 0x1, 0x81806, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_CLR_FD(r0, 0x4c01) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/block/loop0', 0x0, 0xa4) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'caif0\x00', 0x400}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) 00:57:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000000005f0000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x8, 0x0, 0x0) 00:57:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x89a2, &(0x7f0000000000)={'batadv_slave_0\x00'}) 00:57:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040), 0x10) 00:57:35 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00'}) 00:57:35 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040), 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) 00:57:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x14, 0x1, 0x0, 0x0, {0x1d}}, 0x14}}, 0x0) 00:57:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000000600000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000000660000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x54, 0x0, &(0x7f0000000040)) 00:57:35 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)) 00:57:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) 00:57:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000000670000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:35 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f0000000000)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, 0x0, &(0x7f00000004c0)) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x20000080) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet(0x2, 0x6, 0x4800) syz_open_dev$ptys(0xc, 0x3, 0x1) openat$ptmx(0xffffffffffffff9c, 0x0, 0x30000, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x1) socket(0x2, 0x800, 0x0) 00:57:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x22, 0x0, 0x0) 00:57:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="0218"], 0x10}], 0x1}, 0x0) 00:57:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x15, 0x0, 0x0) 00:57:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x11, 0x2, 0x0, 0x0) 00:57:35 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2c5488e9, 0x0, "88c183efeb000400007e010100005fabcce0c2"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x1) 00:57:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000000000000008f0000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:35 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000380)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:35 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x89a1, &(0x7f0000000000)={'batadv_slave_0\x00'}) 00:57:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x1, &(0x7f0000000080)=@raw=[@ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xf3, &(0x7f0000000100)=""/243, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x7, 0x4) 00:57:35 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) sendmsg$IEEE802154_LLSEC_ADD_DEV(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) 00:57:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x3, 0x0, 0x0) 00:57:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000020000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4030014, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="23000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013800)) 00:57:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8914, &(0x7f0000000000)={'batadv_slave_1\x00'}) 00:57:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000030000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xc, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x6b6, 0x882) dup2(r1, r0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, 0x0) 00:57:35 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001a80)={0x6, 0x3, &(0x7f0000000900)=@framed={{}, [], {0x95, 0x63}}, &(0x7f0000000980)='GPL\x00', 0x4, 0x1000, &(0x7f00000009c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:35 executing program 0: openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) 00:57:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000040000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:35 executing program 5: sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/pid\x00') 00:57:35 executing program 4: rt_sigaction(0x2f, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000240)) 00:57:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x21, 0x0, 0x0) 00:57:35 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000680)={0x60, 0x0, &(0x7f0000000440)=[@acquire_done, @transaction_sg={0x40486311, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000080)={@flat=@binder={0x73622a85, 0x100, 0x2}, @fda={0x66646185, 0x3, 0x0, 0x16}, @flat=@weak_binder={0x77622a85, 0xf0674740d7c4ad93}}, &(0x7f0000000100)={0x0, 0x18, 0x38}}, 0x400}], 0xee, 0x0, &(0x7f0000000580)="9589f29536efe3f971949baecf778ba9f3dece10002c36d07cca0cfa054bd9e580d8350aba172d7a45926159b4fd68b09aa2d185ba382a864433b2432b55b8c18ce13d79c4f4eceae683b9351f09997fc7c295db906699fd51b20d19a00106675ed860a93ba68408a7b209eacdd7ddb06bbacc3e3a8ca69a0f3ac054fb37b819fcac80cfbbdf7168f7b11ccd161b241aa1a21ea409dba66e779e5563ec4ba3fc88d43882305cb91e2a8715d3da5bd31a4f37e0eb71af4026050d8b3e78a120a4620f5025e09036877fb03acdd4f74eed1fb9a46d05f6d1a77ec56f2589c4c459f02964d8d39de34782f225726331"}) 00:57:35 executing program 4: memfd_create(&(0x7f0000000000)='!#\'\xa5+-(\\*\xd2\x00', 0x0) 00:57:35 executing program 5: prctl$PR_SET_PDEATHSIG(0x36, 0x0) 00:57:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000050000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xc, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x6b6, 0x882) dup2(r1, r0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, 0x0) 00:57:35 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) socket$inet(0x2, 0x6, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:57:35 executing program 4: rt_sigaction(0x2f, &(0x7f0000000100)={&(0x7f0000000040)="c422898c5038440f01dec461796ebe060000000f53a700000100c44241afcb64f343ac660f2f739dc48209399c956b000000c4214ddb01c4c3b968451b00", 0x0, 0x0}, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000240)) 00:57:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000060000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x7, 0x0, 0x0) [ 3448.364652][T19050] loop3: detected capacity change from 0 to 131456 [ 3448.382157][T19050] EXT4-fs (loop3): inodes count not valid: 35 vs 32 00:57:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEV(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8082}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x70bd26}, 0x14}}, 0x0) 00:57:35 executing program 4: r0 = getpid() process_vm_readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000040)=""/213, 0xd5}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000000980)=[{&(0x7f0000000880)=""/108, 0x6c}, {0x0}], 0x2, 0x0) 00:57:35 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) 00:57:35 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8923, &(0x7f0000000000)={'batadv_slave_0\x00'}) 00:57:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xc, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x6b6, 0x882) dup2(r1, r0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, 0x0) 00:57:35 executing program 5: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x77359400}) 00:57:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000070000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:35 executing program 4: timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x77359400}, {0x0, 0x989680}}, 0x0) 00:57:35 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x800, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x10, 0x0, &(0x7f0000000040)=[@register_looper, @dead_binder_done], 0x1, 0x0, &(0x7f0000000080)='|'}) 00:57:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000080000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:35 executing program 4: mmap$binder(&(0x7f00007fe000/0x800000)=nil, 0x800000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 00:57:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x3f, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000300)={0x0, {}, 0x0, {}, 0x0, 0x6c44f9dbfe7518bf, 0x0, 0x0, "5d946942410600000000000000fd8ebe30375e900388f1c6b3bd27b1b6bfa6cdb0d4bb77d1804b5d5cce8f72f9e15c0900113bbb67180c1a99261b02acb15500", "5645c32599684d8c2356dc055533a9440a2d7f96e1dc319d86c622e89d74efd2"}) 00:57:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xc, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x6b6, 0x882) dup2(r1, r0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, 0x0) 00:57:35 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x54, 0x13, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x4}]}, 0x54}}, 0x0) 00:57:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000090000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:35 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e0, &(0x7f0000000340)='a') 00:57:35 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x800, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000080)='|'}) 00:57:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000140), 0x10) 00:57:36 executing program 3: socket(0x28, 0x0, 0x33ebd31e) 00:57:36 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xc, 0x1) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045518, &(0x7f0000000000)) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000a0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 0: pselect6(0x8, &(0x7f0000000040), &(0x7f00000000c0)={0x8}, 0x0, &(0x7f0000000140)={0x0, 0x989680}, 0x0) 00:57:36 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f00000002c0)={'fscrypt:', @desc1}, &(0x7f0000000300)={0x0, "f7d4def4c396f9b52b7575e9b11b4aa73dd240efc0582b4439eac7c23c7941f96053cc4bc98a92cacf1ad6b3cc2821816158e3d25ea3ac97333767f93624ccfd"}, 0x48, r0) 00:57:36 executing program 0: prctl$PR_SET_PDEATHSIG(0x24, 0x20000800023) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000b0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xc, 0x1) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045518, &(0x7f0000000000)) 00:57:36 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 00:57:36 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x5411, 0x0) 00:57:36 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x9}, 0x48) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000c0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, 0x0, 0x11) 00:57:36 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xc, 0x1) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045518, &(0x7f0000000000)) 00:57:36 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x89a0, &(0x7f0000000000)={'batadv_slave_0\x00'}) 00:57:36 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0xc, 0x1) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045518, &(0x7f0000000000)) 00:57:36 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8927, &(0x7f0000000000)={'batadv_slave_0\x00'}) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000d0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000100), 0x4) 00:57:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002940)=[{0x0, 0x10}], 0x1}, 0x0) 00:57:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x1, &(0x7f0000000080)=@raw=[@ldst], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:36 executing program 3: syz_clone(0x8a827480, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:36 executing program 5: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f0000000600)='.\x00'}, 0x10) 00:57:36 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={0x0, 0x0, 0x18}, 0x10) 00:57:36 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x1, 0xb}]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xac, &(0x7f00000002c0)=""/172, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000e0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e0, &(0x7f0000000340)) 00:57:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000000f0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000040)=@framed={{0x79}}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xac, &(0x7f00000002c0)=""/172, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:36 executing program 0: syz_clone(0x84800080, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='freezer.self_freezing\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2a, &(0x7f0000000080), 0x4) 00:57:36 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 00:57:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4}]}}}], 0x18}, 0x0) 00:57:36 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0xdf) socketpair(0x1, 0x3, 0x8, &(0x7f0000000000)) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000100000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001440)={&(0x7f0000001400)='./file0\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000003740)={&(0x7f0000003700)='./file0\x00', 0x0, 0x8}, 0x10) 00:57:36 executing program 5: syz_clone(0x21000100, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000110000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) setsockopt$sock_attach_bpf(r0, 0x1, 0x2a, &(0x7f0000000080), 0x4) 00:57:36 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0xf, 0x0, 0x0, 0x0, 0x2000}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 3449.551964][T19187] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19187 comm=syz-executor.5 00:57:36 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x5, 0x5, 0xf12d, 0xa40, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x3}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xfcf) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='freezer.state\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x4, 0x7, 0x0, 0xc, 0x0, 0x4, 0x4010, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x87a2, 0x1, @perf_bp={&(0x7f0000000080), 0x4}, 0x1000, 0x5, 0x3538, 0x9, 0x20, 0x10000, 0xb2bb, 0x0, 0xffffffff, 0x0, 0x3}, 0xffffffffffffffff, 0xb, r1, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0xa000) write$cgroup_int(r2, 0x0, 0x0) 00:57:36 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000000000)='K', 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x300}, 0x0) 00:57:36 executing program 3: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xac, &(0x7f00000002c0)=""/172, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) 00:57:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x2, 0x1}]}]}}, &(0x7f0000001440)=""/4108, 0x32, 0x100c, 0x1}, 0x20) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000120000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0xc0189436, 0x0) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000180000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 0: openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x40000, 0x0) 00:57:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffdfff7fffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x1, 0xfc, 0x2, 0x7, 0x0, 0x7, 0x110, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xef, 0x1, @perf_bp={&(0x7f00000001c0), 0x6}, 0x40202, 0xfffffffffffff294, 0x1d3, 0x0, 0x3, 0x81, 0x0, 0x0, 0xffff, 0x0, 0x54}, 0x0, 0x0, r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x5, 0x0, 0x94, 0x0, 0x0, 0x8, 0x2000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000180)}, 0x800, 0x6, 0x401, 0x5, 0x0, 0x5, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xa000) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) 00:57:36 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000001a0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x25}, 0x10) 00:57:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x5452, &(0x7f0000000000)={'veth0_macvtap\x00'}) 00:57:36 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x1, 0x0, 0x0, 0xa}]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xac, &(0x7f00000002c0)=""/172, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x23, &(0x7f0000000080), 0x29) sendmsg$inet(r1, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x0) 00:57:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x5, 0x8, 0x3603, 0x8}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000080), 0x0}, 0x20) 00:57:36 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[], 0x1d0}, 0x0) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000220000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 4: perf_event_open$cgroup(&(0x7f0000000a80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:57:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x7a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2a, &(0x7f0000000080), 0x4) 00:57:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000004b6d0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='ext4_mballoc_alloc\x00', r1}, 0x10) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8bec1cd836a344de}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000ec0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\xe5pu\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x950\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xd50\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\nXJ\x03\n\xad^zv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf8\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\xad\x95$1\x16|\x17\xb8\xda3\"\xca\xe7YQ]]\xf5\x13??_\xac w\'\x11q\xe9\v\xd64O\x1ci\r\xc4\xf6\xa6H\x80\xde\xa3.\xea\x16\xbef\x81\xf2\xc0\x9e!Y\x01\x94-4\x06\t\xb1\x0e\xe19\xb66\xe3`\xe7\x1f\xb1\x87\xfa\xd0>j\xde+o\x8eU\xd5\xaa\xaa\x0eU\xc1\xde\xe2\xa8\x97z\xe8\x1f\xc3!\xca\x8al\x02\xb6\'\xf3i\xd0\xbfxZ\xdaG\xcd\xc9k\xe9\x82,qBc\x11*\x17\xdbfl\xa2l/ja\n\x1d\xb2\x9d\xe6\x88\xcezOvw\xcb\x93\xe7=\bV\xf7\x8e&@\x95\x15X\x1e\xd5\xe3\x88\xb8\xcf\x14\xc7Bo}\xcdX\xb4j9L\'\xc6PN<\xf9o?\xc8\xaf}\x1f-@\xe6\x84\xf4Kzv\x83\xda\x03\x7fx\'\xea!lnU\x1eh\xb0\xe9\x81A\xd8\x86\xe4\xe7\xb4\x17\xf1\xe0u\xbe\xdc\f#\x94\xb8\x9fc\xc2x\xa4\xb5U\xd6\xf5\x913\x85dG\x19\xbf\xecA\x7f\xee\xefc\xdd\xd0\xb0\x13\x89\xbe\xbc\x01IG\"\x89[\x8ct\xf4\x10\xc6$Ar^z\xf6\x90^h?\xc2A\x11\xa5xv+\xb0\xc7\x8c\xa3\xb0\x05^$\xcb-\xfc\x93\xaa\xd91\x9e\xe4\x1c3\xb3\xf0\xeb9I\xeb\xa3\xfe\xc7H\xf2\x8d\\\x8f {Rbd-\xfaY\xc1(e\x87\x19\x8a{\xd5\x18|\xf4\x8fj\x95wK\v\xf5\x1d\x89t\f}\xfe\xedq\x994Xk\xa6\x9a=a\x84\xd8\xe0\xcd\xdd7Ur\xd8\xeb\xb6\x17\xaa+%\x042\x8d\xbbk\x0f\x1a\xa2\x93\xce\xa1\xc3\xe4l\xc0\x898\x9e=\xc9\xfa\x05e_+i\xcd2\x84z\xdc/G\xbb\f\x9e\xbad:\xdd\xc9\x9a\xd1\xec\xc6)~\x1a.\x86\x03z\x97\xc4\x94eKe\xee\\\x92\\\xf3'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) 00:57:36 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xf36) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x0, 0x3, &(0x7f0000000500)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 00:57:36 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x14}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000250000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0xb, &(0x7f0000000080), 0x4) 00:57:36 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000780)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=[{&(0x7f00000001c0)='g', 0x1}], 0x1}, 0x0) 00:57:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0xd, &(0x7f0000000080), 0x4) 00:57:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0xff, 0x12) write$cgroup_int(r1, &(0x7f0000000100), 0x12) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000260000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000000000)="4b913aa50ce82d5a4049d96e9ac7b37d69803c57f9e3862e4d61fed9fdf7e2bd652637701071a4d7768230c7ff62b0576d5189ad5c8d07206cc672f37c66dad4de9c948c2aa5a80b2dab6acd3246095108e6555e5e22", 0x56}, {&(0x7f00000000c0)="19c935addf54e0624563cfca5487811232cc3e565e07361c2306699706755079811d50e415b386cf610767a16bbde74942a9b456427e73644863d87b32c61d897b4627c0459872e3fa184b3016e6bb4b7af17fbffcce2697831d7f8382e5942d1ef9", 0x62}, {&(0x7f00000001c0)="ee9a5d62ceef094c0f59cbccd84844daaaa2cceb7f6559ce502f4a5491e252f1f9d04128aa01d8f611df3cba3fb3fa484596483e636db657b9f5e9f49d76a2ea3835622cbc514f2db0af700215f536ccd6e2a1e412f824c864130d20163f8b7a724c", 0x62}, {&(0x7f0000000240)="55100501b887e82aad492ff8d1d3595bf700266f586a9ed5dd67f768f7ad6695a1f2317c2979838ddb9f4470cee9d45300a349f091690cb45b029470b8e70da991a7e9b0a6f4627db9af770243c3cb81055ab5c3a88ff95ddf1755b462e8ba3470e663dae02fed70449f726c532eafab19bed132dc17146780087872a0e0228795c1cc15e99a673dfd6f92ccb428292f906766a9f99dede2b3f3355af1b8123c193992", 0xa3}, {&(0x7f00000004c0)="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", 0xc00}, {&(0x7f00000014c0)="3ba0c43ab3d78ccb3984fc0877e9c7e769df036d78140d2f68672c6f790580e2f40f3eb06c1b465961ed459d7839aaf32795041c17ca3d44a6e0b2901ae2f040b5e7422db67e47e2208f2d97df867dce4d55620d753e82481a842046aabf5efd61db5049b44db46bb8620c6a83532d20c7094090bcd7a9fd99531840e849f1fb2d69fa9138355fc44d7e23166bdb5081ff5cbf6b55d3c0a9c36825c892aa305bf557ff6f5c98020e35a8e04c2d0aff710d6766219e904868788163f23d560f6355596ab20567968d8f0190bdd9c4b92e9fd97f866379be1621dc090b87ad156952c75e70b71f741b965648e63c4efd462c3282bae8394201a1f2c7db140136faf00751f3662365b8083a925676be117989548dc019b00faa4591e5449273c389b64271d9c6fcb4ed6eb43b4c6d71a92f159a1f65cee2606fec92998258184a367807da67ecd572af43accb00a6e6fa909d920acb8e9e4a702fb69148b70d5e8ede99f132e8550218e3ff8cb0be7d2c0c531f57c6b3526b36dc71f6acc93dcdfdb478641c3e735f6ccee15e1e778f7b18e8968934fb8b1b06882e2249127744f5f6f3f274966f34195d8cae62c58afd92fd2568bc9f0d5c9be8581964eb2ee4ba32fb109e271af8c8bb87b26faa4aa4dfe4a2f2e7d934c0ce6cf262f9fdc1f10a96cedb3fec10f9cf14ad9a7a55075340bb61aa3fb4812f9954eb9ba8f706f4beeab26b26660ec6ce594d40827e2188b5de2afea9e4b9a4ced0ee6ed10c1543d2dc01b5586ba8a8bc5f067936ffcf1384d8066a841951c0ce9c65ef35d0bfa7088bd1d4", 0x243}], 0x6}, 0x0) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1}, 0x0) 00:57:36 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000000000)='I', 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000b80)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1}, 0x0) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000320000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000004b6d0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='ext4_mballoc_alloc\x00', r1}, 0x10) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8bec1cd836a344de}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000ec0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\xe5pu\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x950\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xd50\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\nXJ\x03\n\xad^zv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf8\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\xad\x95$1\x16|\x17\xb8\xda3\"\xca\xe7YQ]]\xf5\x13??_\xac w\'\x11q\xe9\v\xd64O\x1ci\r\xc4\xf6\xa6H\x80\xde\xa3.\xea\x16\xbef\x81\xf2\xc0\x9e!Y\x01\x94-4\x06\t\xb1\x0e\xe19\xb66\xe3`\xe7\x1f\xb1\x87\xfa\xd0>j\xde+o\x8eU\xd5\xaa\xaa\x0eU\xc1\xde\xe2\xa8\x97z\xe8\x1f\xc3!\xca\x8al\x02\xb6\'\xf3i\xd0\xbfxZ\xdaG\xcd\xc9k\xe9\x82,qBc\x11*\x17\xdbfl\xa2l/ja\n\x1d\xb2\x9d\xe6\x88\xcezOvw\xcb\x93\xe7=\bV\xf7\x8e&@\x95\x15X\x1e\xd5\xe3\x88\xb8\xcf\x14\xc7Bo}\xcdX\xb4j9L\'\xc6PN<\xf9o?\xc8\xaf}\x1f-@\xe6\x84\xf4Kzv\x83\xda\x03\x7fx\'\xea!lnU\x1eh\xb0\xe9\x81A\xd8\x86\xe4\xe7\xb4\x17\xf1\xe0u\xbe\xdc\f#\x94\xb8\x9fc\xc2x\xa4\xb5U\xd6\xf5\x913\x85dG\x19\xbf\xecA\x7f\xee\xefc\xdd\xd0\xb0\x13\x89\xbe\xbc\x01IG\"\x89[\x8ct\xf4\x10\xc6$Ar^z\xf6\x90^h?\xc2A\x11\xa5xv+\xb0\xc7\x8c\xa3\xb0\x05^$\xcb-\xfc\x93\xaa\xd91\x9e\xe4\x1c3\xb3\xf0\xeb9I\xeb\xa3\xfe\xc7H\xf2\x8d\\\x8f {Rbd-\xfaY\xc1(e\x87\x19\x8a{\xd5\x18|\xf4\x8fj\x95wK\v\xf5\x1d\x89t\f}\xfe\xedq\x994Xk\xa6\x9a=a\x84\xd8\xe0\xcd\xdd7Ur\xd8\xeb\xb6\x17\xaa+%\x042\x8d\xbbk\x0f\x1a\xa2\x93\xce\xa1\xc3\xe4l\xc0\x898\x9e=\xc9\xfa\x05e_+i\xcd2\x84z\xdc/G\xbb\f\x9e\xbad:\xdd\xc9\x9a\xd1\xec\xc6)~\x1a.\x86\x03z\x97\xc4\x94eKe\xee\\\x92\\\xf3'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) 00:57:36 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x2}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000003e0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xe640, 0x0) 00:57:36 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x8}]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xac, &(0x7f00000002c0)=""/172, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:36 executing program 4: ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000040000000000000000850000000e000000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='net_dev_start_xmit\x00', r0}, 0x10) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r1, 0x0, 0x7, 0x0}, 0x30) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xd3, 0x4, 0x8, 0x41, 0x0, 0x10001, 0x5000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0xd}, 0x118c, 0x400, 0x1ff, 0x6, 0x6, 0x1, 0x200, 0x0, 0x3c9c, 0x0, 0x6}, r2, 0x1, 0xffffffffffffffff, 0x2) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000460000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000001440)=""/4108, 0x32, 0x100c, 0x1}, 0x20) 00:57:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xfcf) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='freezer.state\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x7, 0x0, 0xc, 0x0, 0x4, 0x4010, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x87a2, 0x1, @perf_bp={0x0}, 0x1000, 0x5, 0x3538, 0x0, 0x0, 0x10000, 0xb2bb}, 0xffffffffffffffff, 0x0, r1, 0xa) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) 00:57:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000480000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x93, &(0x7f00000000c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, 0x0}, 0x80) 00:57:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x2a, &(0x7f0000000080), 0x4) 00:57:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="e4000000", @ANYRES16=r2, @ANYBLOB="07002abd7000ffdbdf250700000008000300", @ANYRES32=r3, @ANYBLOB="0c0099000100000069000000140004002f6163766c616e3100000000000000000400cc00080005000a"], 0xe4}}, 0x0) 00:57:37 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'gre0\x00'}) 00:57:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000004c0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000004b6d0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='ext4_mballoc_alloc\x00', r1}, 0x10) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8bec1cd836a344de}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000ec0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\xe5pu\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x950\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xd50\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\nXJ\x03\n\xad^zv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf8\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\xad\x95$1\x16|\x17\xb8\xda3\"\xca\xe7YQ]]\xf5\x13??_\xac w\'\x11q\xe9\v\xd64O\x1ci\r\xc4\xf6\xa6H\x80\xde\xa3.\xea\x16\xbef\x81\xf2\xc0\x9e!Y\x01\x94-4\x06\t\xb1\x0e\xe19\xb66\xe3`\xe7\x1f\xb1\x87\xfa\xd0>j\xde+o\x8eU\xd5\xaa\xaa\x0eU\xc1\xde\xe2\xa8\x97z\xe8\x1f\xc3!\xca\x8al\x02\xb6\'\xf3i\xd0\xbfxZ\xdaG\xcd\xc9k\xe9\x82,qBc\x11*\x17\xdbfl\xa2l/ja\n\x1d\xb2\x9d\xe6\x88\xcezOvw\xcb\x93\xe7=\bV\xf7\x8e&@\x95\x15X\x1e\xd5\xe3\x88\xb8\xcf\x14\xc7Bo}\xcdX\xb4j9L\'\xc6PN<\xf9o?\xc8\xaf}\x1f-@\xe6\x84\xf4Kzv\x83\xda\x03\x7fx\'\xea!lnU\x1eh\xb0\xe9\x81A\xd8\x86\xe4\xe7\xb4\x17\xf1\xe0u\xbe\xdc\f#\x94\xb8\x9fc\xc2x\xa4\xb5U\xd6\xf5\x913\x85dG\x19\xbf\xecA\x7f\xee\xefc\xdd\xd0\xb0\x13\x89\xbe\xbc\x01IG\"\x89[\x8ct\xf4\x10\xc6$Ar^z\xf6\x90^h?\xc2A\x11\xa5xv+\xb0\xc7\x8c\xa3\xb0\x05^$\xcb-\xfc\x93\xaa\xd91\x9e\xe4\x1c3\xb3\xf0\xeb9I\xeb\xa3\xfe\xc7H\xf2\x8d\\\x8f {Rbd-\xfaY\xc1(e\x87\x19\x8a{\xd5\x18|\xf4\x8fj\x95wK\v\xf5\x1d\x89t\f}\xfe\xedq\x994Xk\xa6\x9a=a\x84\xd8\xe0\xcd\xdd7Ur\xd8\xeb\xb6\x17\xaa+%\x042\x8d\xbbk\x0f\x1a\xa2\x93\xce\xa1\xc3\xe4l\xc0\x898\x9e=\xc9\xfa\x05e_+i\xcd2\x84z\xdc/G\xbb\f\x9e\xbad:\xdd\xc9\x9a\xd1\xec\xc6)~\x1a.\x86\x03z\x97\xc4\x94eKe\xee\\\x92\\\xf3'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) 00:57:37 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, 0x0}, 0x80) 00:57:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000510000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:37 executing program 4: syz_clone(0x220c0400, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:37 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x4281, 0x0) 00:57:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x1d, &(0x7f0000000080), 0x4) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 00:57:37 executing program 5: perf_event_open$cgroup(&(0x7f0000000a80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:57:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000550000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:37 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xac, &(0x7f00000002c0)=""/172, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x24, &(0x7f0000000080), 0x4) 00:57:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000600000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0xe, &(0x7f0000000080), 0x4) [ 3450.757172][T19324] __nla_validate_parse: 4 callbacks suppressed [ 3450.757242][T19324] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.0'. 00:57:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000004b6d0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='ext4_mballoc_alloc\x00', r1}, 0x10) perf_event_open(&(0x7f0000000a40)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8bec1cd836a344de}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000ec0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\xe5pu\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x950\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xd50\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\nXJ\x03\n\xad^zv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf8\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\xad\x95$1\x16|\x17\xb8\xda3\"\xca\xe7YQ]]\xf5\x13??_\xac w\'\x11q\xe9\v\xd64O\x1ci\r\xc4\xf6\xa6H\x80\xde\xa3.\xea\x16\xbef\x81\xf2\xc0\x9e!Y\x01\x94-4\x06\t\xb1\x0e\xe19\xb66\xe3`\xe7\x1f\xb1\x87\xfa\xd0>j\xde+o\x8eU\xd5\xaa\xaa\x0eU\xc1\xde\xe2\xa8\x97z\xe8\x1f\xc3!\xca\x8al\x02\xb6\'\xf3i\xd0\xbfxZ\xdaG\xcd\xc9k\xe9\x82,qBc\x11*\x17\xdbfl\xa2l/ja\n\x1d\xb2\x9d\xe6\x88\xcezOvw\xcb\x93\xe7=\bV\xf7\x8e&@\x95\x15X\x1e\xd5\xe3\x88\xb8\xcf\x14\xc7Bo}\xcdX\xb4j9L\'\xc6PN<\xf9o?\xc8\xaf}\x1f-@\xe6\x84\xf4Kzv\x83\xda\x03\x7fx\'\xea!lnU\x1eh\xb0\xe9\x81A\xd8\x86\xe4\xe7\xb4\x17\xf1\xe0u\xbe\xdc\f#\x94\xb8\x9fc\xc2x\xa4\xb5U\xd6\xf5\x913\x85dG\x19\xbf\xecA\x7f\xee\xefc\xdd\xd0\xb0\x13\x89\xbe\xbc\x01IG\"\x89[\x8ct\xf4\x10\xc6$Ar^z\xf6\x90^h?\xc2A\x11\xa5xv+\xb0\xc7\x8c\xa3\xb0\x05^$\xcb-\xfc\x93\xaa\xd91\x9e\xe4\x1c3\xb3\xf0\xeb9I\xeb\xa3\xfe\xc7H\xf2\x8d\\\x8f {Rbd-\xfaY\xc1(e\x87\x19\x8a{\xd5\x18|\xf4\x8fj\x95wK\v\xf5\x1d\x89t\f}\xfe\xedq\x994Xk\xa6\x9a=a\x84\xd8\xe0\xcd\xdd7Ur\xd8\xeb\xb6\x17\xaa+%\x042\x8d\xbbk\x0f\x1a\xa2\x93\xce\xa1\xc3\xe4l\xc0\x898\x9e=\xc9\xfa\x05e_+i\xcd2\x84z\xdc/G\xbb\f\x9e\xbad:\xdd\xc9\x9a\xd1\xec\xc6)~\x1a.\x86\x03z\x97\xc4\x94eKe\xee\\\x92\\\xf3'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) 00:57:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, 0x0, 0x0) 00:57:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={0xffffffffffffffff, r0}, 0xfffffd2b) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r1}, 0x8) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x132b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3}, 0x0, 0xffdfff7fffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1ff, 0x14000, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x10009, 0x0, 0x3, 0x1, 0xfff, 0x3, 0xff, 0x0, 0x9, 0x0, 0x8}, r4, 0x10, r3, 0xa) r5 = perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x1, 0xfc, 0x2, 0x7, 0x0, 0x7, 0x110, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xef, 0x1, @perf_bp={&(0x7f00000001c0), 0x6}, 0x40202, 0xfffffffffffff294, 0x1d3, 0x0, 0x3, 0x81, 0x9, 0x0, 0xffff, 0x0, 0x54}, 0x0, 0x4, r0, 0x9) perf_event_open(0x0, r4, 0xffffffffffffffff, r5, 0xa) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x0, 0x1f, 0x3, 0x0, 0xfffffffffffffff8, 0x41, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0xc6f, 0x4, 0x8, 0x7, 0x7, 0x3, 0x0, 0x9, 0x0, 0x7}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0xa000) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x7, 0xff, 0x3, 0x8, 0x0, 0x80000001, 0x2047, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x2000, 0x4, 0x3, 0x0, 0x4, 0x1, 0x80, 0x0, 0x0, 0x0, 0x811d}, 0x0, 0x1, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000240)={0x0, r2}, 0x10) 00:57:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000680000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x4020940d, &(0x7f0000000000)={'veth0_macvtap\x00'}) 00:57:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xb, 0x0, 0x0, 0x8, 0x185}, 0x48) 00:57:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000006c0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:37 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000380)=@raw=[@map_fd={0x18, 0xb, 0x1, 0x0, 0x1}], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x35, &(0x7f0000000080), 0x4) 00:57:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x1d, &(0x7f0000000080), 0x4) 00:57:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x31, &(0x7f0000000080), 0x4) 00:57:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000740000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x42, &(0x7f0000000080), 0x4) 00:57:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xb, 0x5, 0xd00, 0x8, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xb}, 0x48) 00:57:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x1, 0x0, 0x0, 0x7, 0x0, 0x7, 0x110, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000001c0), 0x6}, 0x40202, 0x0, 0x1d3, 0x0, 0x3, 0x0, 0x9, 0x0, 0xffff}, 0x0, 0x4, r0, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xa000) 00:57:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x14, &(0x7f0000000080), 0x4) 00:57:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f0000007a0000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000240)}, 0x20) 00:57:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1a, 0x0, 0x2, 0x0, 0x0, 0x1, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) syz_clone(0x710c9200, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3c43, 0x1402, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_bp={0x0}, 0x4032, 0x9, 0x0, 0x0, 0x0, 0x3f, 0x79c, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) gettid() r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0xff, 0x12) write$cgroup_int(r2, &(0x7f0000000100), 0x12) r3 = openat$cgroup_ro(r1, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000000)=0xc9ab) write$cgroup_pid(r4, &(0x7f0000000380), 0x12) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x20030, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xffffffff00000000}, 0x821, 0x8, 0xd1f, 0x2, 0x80000100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x4000d, r0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000002980)=ANY=[], 0x32600) write$cgroup_subtree(r5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x13, 0xb19, 0x9, 0x5, 0x1020, r3, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2}, 0x48) 00:57:38 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) 00:57:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000840000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:38 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000004040)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) 00:57:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x23, &(0x7f0000000080), 0x29) setsockopt$sock_attach_bpf(r0, 0x1, 0x23, &(0x7f0000000080), 0x4) 00:57:38 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x5}]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xac, &(0x7f00000002c0)=""/172, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 00:57:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x23, &(0x7f0000000080), 0x29) sendmsg$inet(r1, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[], 0x80}, 0x0) 00:57:38 executing program 3: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2401, 0x0) 00:57:38 executing program 0: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000480)={&(0x7f0000000200)='./file0\x00'}, 0x10) 00:57:38 executing program 2: syz_clone(0x88880, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x25, &(0x7f0000000080), 0x4) 00:57:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x83c0f, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001000b0f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000900000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f00000003c0)="fc", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 00:57:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0xa, &(0x7f0000000080), 0x4) 00:57:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x5, 0x13, 0x5, 0x7c}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) 00:57:38 executing program 3: syz_clone(0x56000a00, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:38 executing program 2: syz_clone(0x51020080, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'veth0_to_bond\x00'}) 00:57:38 executing program 5: ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0,