Warning: Permanently added '[localhost]:2715' (ECDSA) to the list of known hosts. 2020/10/09 13:55:35 fuzzer started 2020/10/09 13:55:36 dialing manager at 10.0.2.10:44887 2020/10/09 13:55:36 syscalls: 3440 2020/10/09 13:55:36 code coverage: enabled 2020/10/09 13:55:36 comparison tracing: enabled 2020/10/09 13:55:36 extra coverage: enabled 2020/10/09 13:55:36 setuid sandbox: enabled 2020/10/09 13:55:36 namespace sandbox: enabled 2020/10/09 13:55:36 Android sandbox: /sys/fs/selinux/policy does not exist 2020/10/09 13:55:36 fault injection: enabled 2020/10/09 13:55:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/10/09 13:55:36 net packet injection: enabled 2020/10/09 13:55:36 net device setup: enabled 2020/10/09 13:55:36 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/10/09 13:55:36 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/10/09 13:55:36 USB emulation: enabled 2020/10/09 13:55:36 hci packet injection: enabled 2020/10/09 13:55:36 wifi device emulation: enabled 13:57:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="5500000018007f5f0cfe01b2a4a2809302060000fd000001020b00000a000400350028105d000000190005407fffffff000fde1338d54400009b84136ef75a0800de4411001600c43ab8220000ff00000000e4f25c", 0x55}], 0x1}, 0x0) 13:57:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:57:03 executing program 2: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0}, 0x64) 13:57:04 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/uts\x00') syzkaller login: [ 286.624070][T11861] IPVS: ftp: loaded support on port[0] = 21 [ 286.789774][T11863] IPVS: ftp: loaded support on port[0] = 21 [ 286.941520][T11861] chnl_net:caif_netlink_parms(): no params data found [ 287.081540][T11865] IPVS: ftp: loaded support on port[0] = 21 [ 287.102271][T11863] chnl_net:caif_netlink_parms(): no params data found [ 287.122878][T11861] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.132467][T11861] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.145106][T11861] device bridge_slave_0 entered promiscuous mode [ 287.166384][T11861] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.175495][T11861] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.187179][T11861] device bridge_slave_1 entered promiscuous mode [ 287.236210][T11861] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 287.253089][T11861] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 287.312810][T11866] IPVS: ftp: loaded support on port[0] = 21 [ 287.357058][T11861] team0: Port device team_slave_0 added [ 287.374342][T11861] team0: Port device team_slave_1 added [ 287.417861][T11863] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.429555][T11863] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.441762][T11863] device bridge_slave_0 entered promiscuous mode [ 287.471455][T11861] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 287.482514][T11861] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 287.518422][T11861] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 287.536119][T11863] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.547007][T11863] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.558677][T11863] device bridge_slave_1 entered promiscuous mode [ 287.592672][T11861] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 287.601804][T11861] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 287.643649][T11861] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 287.707825][T11863] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 287.724322][T11863] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 287.749038][T11865] chnl_net:caif_netlink_parms(): no params data found [ 287.809259][T11861] device hsr_slave_0 entered promiscuous mode [ 287.825853][T11861] device hsr_slave_1 entered promiscuous mode [ 287.845849][T11863] team0: Port device team_slave_0 added [ 287.883809][T11863] team0: Port device team_slave_1 added [ 287.980033][T11863] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 287.991561][T11863] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 288.023757][T11863] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 288.048134][T11866] chnl_net:caif_netlink_parms(): no params data found [ 288.110916][T11863] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 288.132446][T11863] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 288.176350][T11863] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 288.262134][T11865] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.274958][T11865] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.285555][T11865] device bridge_slave_0 entered promiscuous mode [ 288.317260][T11863] device hsr_slave_0 entered promiscuous mode [ 288.328866][T11863] device hsr_slave_1 entered promiscuous mode [ 288.340946][T11863] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 288.357772][T11863] Cannot create hsr debugfs directory [ 288.380097][T11865] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.392548][T11865] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.405010][T11865] device bridge_slave_1 entered promiscuous mode [ 288.448695][T11865] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 288.503734][T11865] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 288.525529][T11866] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.535954][ T64] Bluetooth: hci0: command 0x0409 tx timeout [ 288.547422][T11866] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.563577][T11866] device bridge_slave_0 entered promiscuous mode [ 288.580552][T11866] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.592471][T11866] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.605623][T11866] device bridge_slave_1 entered promiscuous mode [ 288.664421][T11865] team0: Port device team_slave_0 added [ 288.711335][T11866] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 288.723356][T11865] team0: Port device team_slave_1 added [ 288.736407][T11866] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 288.780292][ T2794] Bluetooth: hci1: command 0x0409 tx timeout [ 288.782392][T11865] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 288.795802][T11865] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 288.827716][T11865] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 288.861356][T11865] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 288.871698][T11865] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 288.906151][T11865] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 288.936765][T11866] team0: Port device team_slave_0 added [ 288.959772][T11866] team0: Port device team_slave_1 added [ 288.997634][T11861] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 289.017672][T11861] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 289.036260][T11861] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 289.053093][T11865] device hsr_slave_0 entered promiscuous mode [ 289.062617][T11865] device hsr_slave_1 entered promiscuous mode [ 289.070384][T11865] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 289.080411][T11865] Cannot create hsr debugfs directory [ 289.096395][ T35] Bluetooth: hci2: command 0x0409 tx timeout [ 289.098639][T11866] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 289.117284][T11866] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 289.157716][T11866] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 289.174391][T11861] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 289.226157][T11866] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 289.236133][T11866] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 289.260092][ T2557] Bluetooth: hci3: command 0x0409 tx timeout [ 289.276720][T11866] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 289.361857][T11866] device hsr_slave_0 entered promiscuous mode [ 289.372603][T11866] device hsr_slave_1 entered promiscuous mode [ 289.383077][T11866] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 289.395350][T11866] Cannot create hsr debugfs directory [ 289.503719][T11863] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 289.515952][T11863] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 289.533984][T11863] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 289.570158][T11863] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 289.693973][T11865] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 289.707945][T11865] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 289.718088][T11865] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 289.728694][T11865] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 289.773061][T11866] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 289.786649][T11866] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 289.796970][T11866] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 289.807194][T11866] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 289.874462][T11861] 8021q: adding VLAN 0 to HW filter on device bond0 [ 289.906217][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 289.916637][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 289.931538][T11861] 8021q: adding VLAN 0 to HW filter on device team0 [ 289.961197][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 289.971555][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.981226][ T2794] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.989228][ T2794] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.009239][T11863] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.022388][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.033388][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.043215][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.054609][ T38] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.063398][ T38] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.098554][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 290.109994][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 290.121889][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 290.133379][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 290.143261][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 290.154152][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 290.172879][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 290.183263][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.193760][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.213444][ T1246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.223951][ T1246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.239752][ T1246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 290.250838][ T1246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.264687][T11863] 8021q: adding VLAN 0 to HW filter on device team0 [ 290.278075][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 290.312098][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.336839][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.355601][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.381896][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.412116][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.434931][T11865] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.480214][T11866] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.497264][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.512934][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.530948][ T38] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.544870][ T38] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.558704][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 290.573012][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 290.586322][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 290.610132][ T1246] Bluetooth: hci0: command 0x041b tx timeout [ 290.611872][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 290.631670][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 290.642264][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 290.657477][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 290.674723][T11861] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 290.693616][ T1246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.707329][ T1246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.733454][T11866] 8021q: adding VLAN 0 to HW filter on device team0 [ 290.743930][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.758781][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.777142][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 290.794802][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 290.817347][T11865] 8021q: adding VLAN 0 to HW filter on device team0 [ 290.842153][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.860283][ T64] Bluetooth: hci1: command 0x041b tx timeout [ 290.867725][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.885644][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.897186][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.911478][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.925347][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.936988][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.947520][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.958060][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.966653][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.997875][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 291.018644][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 291.031878][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 291.042807][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 291.054380][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.063732][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.072835][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 291.085338][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 291.095353][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 291.105419][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 291.119411][T11863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 291.151297][T11895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 291.170829][ T2902] Bluetooth: hci2: command 0x041b tx timeout [ 291.174320][T11895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 291.211399][T11895] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.231262][T11895] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.246912][T11895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 291.273077][T11895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 291.320854][T11895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 291.340233][ T2902] Bluetooth: hci3: command 0x041b tx timeout [ 291.356001][T11895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 291.399409][T11895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 291.434025][T11895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 291.470739][T11895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 291.507969][T11895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 291.531895][T11895] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 291.571808][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 291.600961][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 291.625329][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 291.661712][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 291.697821][T11865] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 291.730954][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 291.745773][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 291.759211][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 291.773776][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 291.788027][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 291.803683][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 291.834864][T11861] device veth0_vlan entered promiscuous mode [ 291.853597][T11861] device veth1_vlan entered promiscuous mode [ 291.871327][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 291.885691][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 291.895679][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 291.908661][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 291.929723][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 291.941789][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 291.961654][T11863] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 291.991236][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 292.006671][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 292.018630][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 292.034110][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 292.050252][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 292.073796][T11865] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 292.086473][T11866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 292.097327][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 292.105970][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 292.134631][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 292.144417][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 292.159398][T11861] device veth0_macvtap entered promiscuous mode [ 292.174686][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 292.183415][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 292.194531][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 292.205624][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 292.216462][T11894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 292.232797][T11861] device veth1_macvtap entered promiscuous mode [ 292.263859][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 292.278559][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 292.290473][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 292.299621][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 292.310807][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 292.325506][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 292.335294][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 292.351316][T11863] device veth0_vlan entered promiscuous mode [ 292.362194][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 292.373202][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 292.390370][T11865] device veth0_vlan entered promiscuous mode [ 292.407702][T11861] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 292.421780][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 292.431483][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 292.442618][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 292.455422][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 292.476192][T11866] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 292.498165][T11861] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 292.535942][T11865] device veth1_vlan entered promiscuous mode [ 292.550804][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 292.576313][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 292.593403][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 292.609103][T11863] device veth1_vlan entered promiscuous mode [ 292.632255][T11861] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.648019][T11861] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.665034][T11861] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.678960][T11861] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.700805][ T2902] Bluetooth: hci0: command 0x040f tx timeout [ 292.821640][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 292.842962][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 292.898083][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 292.916281][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 292.937221][T11865] device veth0_macvtap entered promiscuous mode [ 292.941213][T11897] Bluetooth: hci1: command 0x040f tx timeout [ 292.954904][T11865] device veth1_macvtap entered promiscuous mode [ 292.987886][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 293.006348][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 293.028896][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 293.045575][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 293.064298][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 293.079457][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.097242][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.110762][ T2902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 293.139782][T11863] device veth0_macvtap entered promiscuous mode [ 293.166059][T11866] device veth0_vlan entered promiscuous mode [ 293.195995][T11865] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 293.212120][T11865] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.224913][T11865] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 293.234547][T11863] device veth1_macvtap entered promiscuous mode [ 293.250162][T11897] Bluetooth: hci2: command 0x040f tx timeout [ 293.264180][ T1246] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 293.275001][ T1246] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 293.289248][ T1246] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 293.300514][ T1246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 293.335862][T11865] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 293.356533][T11865] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.372169][T11865] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 293.392506][T11890] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 293.394083][T11865] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 293.408098][T11890] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 293.424392][T11865] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 293.424408][T11865] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 293.424423][T11865] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 293.428799][T11866] device veth1_vlan entered promiscuous mode [ 293.434320][T11897] Bluetooth: hci3: command 0x040f tx timeout [ 293.477737][T11866] device veth0_macvtap entered promiscuous mode [ 293.528837][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 293.539295][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 293.551290][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 293.560592][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 293.570565][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 293.581768][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 293.592035][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 293.602874][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 293.641094][T11866] device veth1_macvtap entered promiscuous mode [ 293.663340][T11890] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 293.678521][T11890] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 293.693154][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 293.709176][T11863] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 293.724877][T11863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.737975][T11863] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 293.752076][T11863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.771788][T11863] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 293.796646][ T2557] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 293.807543][ T2557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 293.828170][T11863] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 293.852835][T11863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.866866][T11863] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 293.880056][T11863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 293.897019][T11863] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 293.923699][ T2557] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 293.934389][ T2557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 293.959485][T11861] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 293.966168][T11863] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.002154][T11863] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.045006][T11863] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.078330][T11863] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.133185][T11899] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 294.152479][T11899] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 294.176157][T11899] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.0'. [ 294.208222][T11866] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 13:57:12 executing program 0: sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x9effffff) [ 294.230577][T11866] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.255400][T11866] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 13:57:12 executing program 0: capset(&(0x7f0000000100)={0x20071026}, 0x0) [ 294.285481][T11866] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.305530][T11866] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 294.324405][T11906] capability: warning: `syz-executor.0' uses deprecated v2 capabilities in a way that may be insecure [ 294.327563][T11866] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 13:57:12 executing program 0: setrlimit(0x7, &(0x7f0000000380)) socket$inet(0xa, 0x3, 0x20) [ 294.366593][T11866] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 294.394716][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 13:57:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) [ 294.406997][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 294.428921][T11866] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 13:57:12 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x48) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) keyctl$setperm(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000800)=@raw={'raw\x00', 0x3c1, 0x3, 0x338, 0x0, 0xffffff80, 0x178, 0x36000000, 0xc7, 0x268, 0x258, 0x258, 0x268, 0x258, 0x3, 0x0, {[{{@ipv6={@local={0xfe, 0x80, [0x0, 0x0, 0x9e]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x3]}, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x8000009, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'geneve1\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x398) [ 294.452838][T11866] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.467253][T11866] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 294.493381][T11866] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.509134][T11866] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 294.523641][T11866] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 294.545476][T11866] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 294.564601][T11866] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.574754][T11866] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.586217][T11866] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.597599][T11866] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.616597][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 294.628519][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 294.650459][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 294.661709][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 294.682290][ T1246] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 294.720931][ T2457] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 294.733453][ T2457] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 294.743658][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 294.756844][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 294.769136][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 294.780296][ T35] Bluetooth: hci0: command 0x0419 tx timeout [ 294.791068][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 294.804711][ T2457] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 294.822031][ T2457] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 294.849562][ T64] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 294.905680][ T2457] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 294.943081][ T2457] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 295.005475][ T1246] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 295.010412][ T2902] Bluetooth: hci1: command 0x0419 tx timeout [ 295.086922][ T2457] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 295.134839][ T2457] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 295.169676][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 295.340821][ T2902] Bluetooth: hci2: command 0x0419 tx timeout [ 295.490953][ T2902] Bluetooth: hci3: command 0x0419 tx timeout 13:57:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, 0xc) 13:57:16 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) 13:57:16 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='siox_get_data\x00'}, 0x10) 13:57:16 executing program 3: capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7}) 13:57:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) 13:57:16 executing program 3: r0 = socket(0x1, 0x1, 0x0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xf0ff7f) 13:57:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000001c0)=@ll, 0x80, 0x0, 0x0, &(0x7f0000000280)=[@txtime={{0x18}}, @txtime={{0x18}}], 0x30}}], 0x2, 0x0) 13:57:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f00000001c0)=""/205, 0x32, 0xcd, 0x1}, 0x20) 13:57:16 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:16 executing program 3: setrlimit(0x7, &(0x7f0000000380)) socket(0x1, 0x1, 0x0) 13:57:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x3, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:16 executing program 2: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 13:57:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_GUARD={0x5, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 13:57:16 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:16 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/user\x00') 13:57:16 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x280000) 13:57:16 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000300)={0x0, @tipc=@id, @ipx={0x4, 0x0, 0x0, "69ce2008d1d1"}, @ipx={0x4, 0x0, 0x0, "7f2c6f0946bd"}}) 13:57:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0xc0189436, 0x0) 13:57:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000000)="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", 0x2000, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)=@keyring={'key_or_keyring:', 0x0, 0xa}) 13:57:16 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x9) bind(r0, &(0x7f0000000100)=@nl=@kern={0x10, 0x0, 0x0, 0x80000000}, 0x80) 13:57:16 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 13:57:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@mcast1, @loopback, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 13:57:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8916, &(0x7f0000001a80)={0x0, @nl=@unspec, @isdn, @generic={0x0, "1071a3fb5d11c9fc377368db742e"}}) 13:57:16 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0xc020660b, 0x0) 13:57:17 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x82, 0x0) write$cgroup_int(r0, 0x0, 0x0) 13:57:17 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0x101) 13:57:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={0x0}}, 0x20000800) 13:57:17 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:17 executing program 1: capset(&(0x7f0000000100), 0x0) 13:57:17 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x4b8, 0xffffffff, 0x0, 0x348, 0x0, 0xffffffff, 0xffffffff, 0x418, 0x418, 0x418, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@local, @rand_addr=' \x01\x00', [], [], 'veth1_to_hsr\x00', 'vlan0\x00'}, 0x0, 0x208, 0x248, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2, @ipv4={[], [], @local}, @remote, @empty, @private1, @remote, @empty, @empty, @private1, @private0, @ipv4={[], [], @loopback}, @private0, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}]}}, @common=@icmp6={{0x28, 'icmp6\x00'}, {0x0, "fa9a"}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "cfc56677c21c2c18beb90f18afded00908c9804f0e8eb6b9e5da0023dc64"}}}, {{@ipv6={@remote, @mcast1, [], [], 'veth1_to_batadv\x00', 'batadv0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@ipv6={@dev, @mcast2, [], [], 'macvtap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x518) 13:57:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000002a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10140, 0x0) 13:57:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x4b, 0x0, 0x0) 13:57:17 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:17 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001080)) 13:57:17 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x10000000) 13:57:17 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100), 0x10) 13:57:17 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000280)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x48) 13:57:17 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x17, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8934, &(0x7f0000000640)={'lo\x00'}) 13:57:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x32, 0x0, 0xffe4) 13:57:17 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:17 executing program 3: r0 = getpid() ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) 13:57:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000011c0)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x19}, 0x40) 13:57:17 executing program 0: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:17 executing program 3: socket$inet(0x2, 0xa, 0x80f) 13:57:17 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x649d79cc49e672a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 299.261234][T12095] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) 13:57:17 executing program 0: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:17 executing program 2: socketpair(0x10, 0x2, 0x1500, &(0x7f00000000c0)) 13:57:17 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x100000000, 0x2102) write$FUSE_WRITE(r0, 0x0, 0x0) 13:57:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, &(0x7f0000000140), 0x0) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0xac, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r4 = gettid() tkill(r4, 0x36) 13:57:17 executing program 3: madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x9) 13:57:17 executing program 2: setrlimit(0x7, &(0x7f0000000380)) socket$inet6_tcp(0xa, 0x1, 0x0) 13:57:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, &(0x7f0000000140), 0x0) r2 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0xac, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r4 = gettid() tkill(r4, 0x36) 13:57:17 executing program 0: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x3c, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 299.463980][T12126] ptrace attach of "/syz-executor.1"[12125] was attempted by "/syz-executor.1"[12126] 13:57:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x1b, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:17 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x13040) 13:57:17 executing program 2: getgroups(0x1, &(0x7f0000000000)=[0xee00]) 13:57:17 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x13}, 0x26) 13:57:18 executing program 3: shmget(0x3, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) 13:57:18 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:18 executing program 2: socketpair(0x11, 0x3, 0xffffffff, &(0x7f0000000000)) 13:57:18 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:18 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x7ffffffff000, 0x0, 0x10, r0, 0x10000000) 13:57:18 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8906, 0x0) 13:57:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x5, 0x0, 0x0) 13:57:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x32, {0x2, 0x0, @remote}, 'bridge0\x00'}) 13:57:18 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10111, r0, 0x10000000) 13:57:18 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:18 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001100)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 13:57:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2}}) 13:57:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x16, 0x0, 0x0) 13:57:18 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @dev}}}}) 13:57:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@mcast1, @loopback, @private0, 0x0, 0xb00}) 13:57:18 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000002280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:18 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x631ef75b80c7f90b) 13:57:18 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:18 executing program 2: perf_event_open(&(0x7f0000000000)={0x7, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x5421, &(0x7f0000000000)={@loopback, @loopback, @remote}) 13:57:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000003c0)='veth1\x00') 13:57:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) listen(r0, 0x0) 13:57:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x10, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0xbe, &(0x7f00000000c0)=""/190, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:19 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:19 executing program 3: add_key$keyring(&(0x7f0000006500)='keyring\x00', &(0x7f0000006540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) 13:57:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0xb16}, 0x14}}, 0x0) 13:57:19 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:19 executing program 3: socketpair(0x10, 0x2, 0xef, &(0x7f00000000c0)) 13:57:19 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:19 executing program 2: setrlimit(0x7, &(0x7f0000000380)) mq_open(&(0x7f00000000c0)='syztnl0\x00', 0x0, 0x0, 0x0) 13:57:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x0, 0x0, 0x0, 0x40}, 0x40) 13:57:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x4020940d, 0x0) 13:57:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x39, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:19 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:19 executing program 2: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000740)={&(0x7f0000000440)='./file0\x00'}, 0x10) 13:57:19 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x0, 0x0, 0x0, 0x40}, 0x40) 13:57:19 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:19 executing program 2: setrlimit(0x7, &(0x7f0000000380)) socket$vsock_stream(0x28, 0x1, 0x0) 13:57:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x3e, 0x0, 0x0) 13:57:19 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:19 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c412, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x401}, r0, 0x0, 0xffffffffffffffff, 0x0) 13:57:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x8918, &(0x7f00000000c0)={@mcast1, @loopback, @private0}) 13:57:19 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:19 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={0x0}}, 0x0) 13:57:19 executing program 2: add_key(0x0, 0x0, &(0x7f00000000c0)="81", 0x1, 0xfffffffffffffffb) r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000380)) 13:57:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r0, &(0x7f00000073c0)=[{{&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000240)=[{0x0}, {0x0}], 0x2, &(0x7f0000000280)=[{0x10}], 0x10}}], 0x1, 0x0) 13:57:19 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:19 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:19 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) ioctl$sock_ifreq(0xffffffffffffffff, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:19 executing program 1: socketpair(0x10, 0x2, 0x1b1, &(0x7f00000000c0)) 13:57:19 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000280)=0x2000001) 13:57:20 executing program 2: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x881, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40040}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x5, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:20 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) ioctl$sock_ifreq(0xffffffffffffffff, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14}, 0x33fe0}}, 0x0) 13:57:20 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, 0x0) 13:57:20 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) ioctl$sock_ifreq(0xffffffffffffffff, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r0) 13:57:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x2, 0x6, 0x5, 0x1, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x40) 13:57:20 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x4e4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:20 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x2010, r0, 0x10000000) 13:57:20 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000002, 0x11, r0, 0x10000000) 13:57:20 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x4e4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:20 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, 0x0) 13:57:20 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x5452, &(0x7f00000000c0)={@remote, @private1, @loopback}) 13:57:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x52, &(0x7f0000000100)={@local, @random="d800d284c6ef", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x1c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0xc2, 0x0, 0x0, 0x0, {[@generic={0x22, 0x6, "6f6da950"}]}}}}}}}}, 0x0) 13:57:20 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, 0x0) 13:57:20 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x4e4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) [ 302.011026][T12373] syz-executor.2 (12373) used greatest stack depth: 23000 bytes left 13:57:20 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) setreuid(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 13:57:20 executing program 2: r0 = socket(0x26, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x0, 'bridge0\x00'}) 13:57:20 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='nilfs2_segment_usage_allocated\x00'}, 0x10) 13:57:20 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) setreuid(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:20 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)) 13:57:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x43, 0x0, 0x0) 13:57:20 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@req={0x28, &(0x7f0000000000)={'team_slave_0\x00', @ifru_names}}) 13:57:20 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) setreuid(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:20 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000100), 0xfffffffffffffda8) 13:57:20 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)) 13:57:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x5451, 0x0) 13:57:20 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:20 executing program 2: add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 13:57:20 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 13:57:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8982, &(0x7f0000000640)={'lo\x00'}) 13:57:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x3, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:20 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000280)) 13:57:20 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000001a80)={0x0, @nl=@unspec, @isdn, @generic={0x0, "1071a3fb5d11c9fc377368db742e"}, 0x0, 0x0, 0x0, 0x3f000000}) 13:57:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x2, 0x40, 0x0, 0x0) 13:57:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x30, 0x0, 0x0) 13:57:20 executing program 3: r0 = syz_open_dev$vcsn(0x0, 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80) 13:57:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x30, 0x0, 0x0) 13:57:20 executing program 3: r0 = syz_open_dev$vcsn(0x0, 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x30}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0xbe, &(0x7f00000000c0)=""/190, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:20 executing program 1: add_key$keyring(&(0x7f0000006500)='keyring\x00', &(0x7f0000006540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, 0xfffffffffffffffc) 13:57:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80) 13:57:20 executing program 3: r0 = syz_open_dev$vcsn(0x0, 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:20 executing program 2: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:21 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000080), &(0x7f00000000c0), 0x8) 13:57:21 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:21 executing program 2: setgroups(0x1, &(0x7f0000001480)=[0xffffffffffffffff]) 13:57:21 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) 13:57:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x10, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:21 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:21 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={0x0, 0x0, 0x18}, 0x10) 13:57:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8932, &(0x7f0000000640)={'lo\x00'}) 13:57:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x8e, &(0x7f00000000c0)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "42bf00", 0x58, 0x3a, 0x0, @local={0xfe, 0x80, [0x3, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "7f112d", 0x0, 0x0, 0x0, @mcast1, @remote, [@dstopts={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3a], [@enc_lim]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@mcast2]}]}}}}}}}, 0x0) 13:57:21 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:21 executing program 1: socket(0xa, 0x1, 0x3) 13:57:21 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@dev, @ipv4={[], [], @multicast1}, @dev, 0x200}) 13:57:21 executing program 2: futex$FUTEX_WAIT_MULTIPLE(0x0, 0xd, 0x0, &(0x7f0000003440)={0x77359400}, 0x0, 0x0) 13:57:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8929, &(0x7f0000000000)={'veth1_to_bond\x00', @ifru_hwaddr=@remote}) 13:57:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x2, 0x6, 0x5, 0x1, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x40) 13:57:21 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:21 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind(r0, 0x0, 0x0) 13:57:21 executing program 1: mq_getsetattr(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 13:57:21 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:21 executing program 2: r0 = add_key$keyring(&(0x7f0000006500)='keyring\x00', &(0x7f0000006540)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000006500)='keyring\x00', &(0x7f0000006540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, r2) 13:57:21 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, 0x0, 0x0) setreuid(0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x4020940d, &(0x7f0000000640)={'lo\x00'}) 13:57:21 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x1, &(0x7f00000000c0)=@raw=[@call], &(0x7f0000000100)='GPL\x00', 0x7, 0x8d, &(0x7f0000000140)=""/141, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x4, &(0x7f0000000080)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, 0xc) 13:57:21 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, 0x0, 0x0) setreuid(0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:21 executing program 2: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x12) 13:57:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000002a80)=[{{0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0, 0x0) 13:57:21 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, 0x0, 0x0) setreuid(0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:21 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xd8, &(0x7f0000000200)=""/216, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:21 executing program 2: socketpair(0x2c, 0x3, 0x26, &(0x7f0000000080)) 13:57:21 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x4e4) setreuid(0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x14, 0x0, 0x4, 0x9, 0x8}, 0x40) 13:57:21 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, &(0x7f00000000c0)=@l2tp={0x2, 0x0, @broadcast}, 0x80) 13:57:21 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x4e4) setreuid(0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x19, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:21 executing program 1: capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)={0x4}) 13:57:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r0, &(0x7f00000073c0)=[{{0x0, 0x0, &(0x7f0000000240)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0) 13:57:21 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x4e4) setreuid(0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r1, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:21 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000)=0x10001, 0x400, 0x0) 13:57:21 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(0xffffffffffffffff, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:21 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcsu\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, 0x0) 13:57:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@loopback, @rand_addr=0x64010100}, 0xc) 13:57:22 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(0xffffffffffffffff, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:22 executing program 1: socketpair(0x28, 0x0, 0x0, &(0x7f0000000000)) 13:57:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) syz_emit_ethernet(0x52, &(0x7f0000000100)={@local, @random="d800d284c6ef", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x1c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0xc2, 0x0, 0x0, 0x0, {[@generic={0x22, 0x6, "6f6da950"}]}}}}}}}}, 0x0) 13:57:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x33, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:22 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(0xffffffffffffffff, 0x8995, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x9, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0xbe, &(0x7f00000000c0)=""/190, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:22 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x0, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f00000000c0)={0x3, 'sit0\x00'}) 13:57:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) syz_emit_ethernet(0x52, &(0x7f0000000100)={@local, @random="d800d284c6ef", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x1c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0xc2, 0x0, 0x0, 0x0, {[@generic={0x22, 0x6, "6f6da950"}]}}}}}}}}, 0x0) 13:57:22 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x0, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:23 executing program 0: socketpair(0x10, 0x2, 0x18, &(0x7f00000000c0)) 13:57:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) 13:57:23 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x0, &(0x7f0000002480)={'xfrm0\x00', @ifru_addrs=@xdp}) 13:57:23 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x8995, 0x0) 13:57:23 executing program 1: bind$xdp(0xffffffffffffffff, 0x0, 0x0) 13:57:23 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c412, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x904}, r0, 0x3, 0xffffffffffffffff, 0x0) 13:57:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:23 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clock_gettime(0x0, &(0x7f0000000580)) 13:57:23 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c412, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x904}, r0, 0x3, 0xffffffffffffffff, 0x0) 13:57:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind(r0, &(0x7f0000000100)=@nl=@kern={0x10, 0x0, 0x0, 0x200000}, 0x80) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 13:57:23 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x8995, 0x0) 13:57:23 executing program 1: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x10) 13:57:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8982, &(0x7f0000001a80)={0x0, @nl=@unspec, @isdn, @generic={0x0, "1071a3fb5d11c9fc377368db742e"}}) 13:57:23 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x4e4) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r2, 0x8995, 0x0) 13:57:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) 13:57:23 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)={0x0, 0x41, "c884fe3af34ce73f1bdf5d2ae22d7399e799fbcbeb3bffc680efeb1fe528a030891552cbd4de84e4856344a489e1ef4efd4d520a62b3c1ceb161783a3706d6df8e"}) 13:57:23 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'syztnl2\x00', 0x0}) recvmmsg(r0, &(0x7f0000000200), 0x1, 0x0, 0x0) 13:57:23 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:23 executing program 0: memfd_create(&(0x7f0000000000)=':-\\]#.*\x00', 0x0) 13:57:23 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/bsg\x00', 0x0, 0x0) write$tun(r0, 0x0, 0x0) 13:57:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f00000000c0)={@mcast1, @loopback, @private0}) 13:57:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, 0x0) 13:57:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, 0x0) 13:57:23 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 13:57:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f00000000c0)={@mcast1, @loopback, @private0}) 13:57:24 executing program 0: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fallocate(r0, 0x0, 0x0, 0x10000101) 13:57:24 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x79, 0x79, 0x3, [@const, @fwd, @typedef, @const, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}, @var, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], '|'}, @int]}, {0x0, [0x0]}}, 0x0, 0x97}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x27) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 13:57:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f00000000c0)={@mcast1, @loopback, @private0}) 13:57:24 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0xc0189436, &(0x7f0000001a80)={0x0, @nl=@unspec, @isdn, @generic={0x0, "1071a3fb5d11c9fc377368db742e"}}) 13:57:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f00000000c0)={@mcast1, @loopback, @private0}) 13:57:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x4b, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:24 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, 0x0) 13:57:24 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x48050, r0, 0x10000000) 13:57:24 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={0x0, 0x0}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x307) clone(0x200000000204a100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x98, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48], 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {0xffff}, {0xffff, 0xfc}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 13:57:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x89a0, &(0x7f0000001a80)={0x0, @nl=@unspec, @isdn, @generic={0x0, "1071a3fb5d11c9fc377368db742e"}}) 13:57:24 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x1, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0) 13:57:24 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:24 executing program 0: r0 = socket(0x11, 0x802, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 13:57:24 executing program 2: bpf$MAP_CREATE(0xa, &(0x7f0000000200), 0x40) 13:57:24 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000011c0)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:24 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) 13:57:24 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x3ff, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x5452, &(0x7f00000000c0)={@remote, @private1, @loopback}) 13:57:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, 0x0, 0xffe4) 13:57:24 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:24 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000000)={0x576}, 0x10) 13:57:24 executing program 2: perf_event_open(&(0x7f0000000000)={0x6, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:24 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x3ff, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x5452, &(0x7f00000000c0)={@remote, @private1, @loopback}) 13:57:24 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:24 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001480)={0x11, 0x3, &(0x7f0000000380)=@framed, &(0x7f00000003c0)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:24 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 13:57:24 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000002bc0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 13:57:25 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12043, 0x0) 13:57:25 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@fwd, @const, @const, @volatile, @var, @restrict]}, {0x0, [0x0, 0x0]}}, 0x0, 0x68, 0x0, 0x1000000}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x27) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 13:57:25 executing program 1: socket(0x0, 0xe466199416e66116, 0x0) 13:57:25 executing program 2: kexec_load(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x1c4}], 0x0) 13:57:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x1d, 0x0, 0x0) 13:57:25 executing program 2: kexec_load(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x1c4}], 0x0) 13:57:25 executing program 0: memfd_create(&(0x7f0000000000)='}(+\x11[\':##!@]\x00', 0x0) 13:57:25 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x3ff, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002400)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r1, &(0x7f00000003c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r1, &(0x7f0000004440)={0xa0, 0x0, r3}, 0xa0) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0x0, r2}, 0x18) 13:57:25 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:25 executing program 2: kexec_load(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x1c4}], 0x0) 13:57:25 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)) 13:57:25 executing program 1: r0 = socket(0x1, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', 0x0}) 13:57:25 executing program 2: kexec_load(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x1c4}], 0x0) 13:57:25 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:57:26 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) 13:57:26 executing program 2: kexec_load(0x0, 0x0, 0x0, 0x0) 13:57:26 executing program 2: shmget(0x1, 0x2000, 0x2c000a80, &(0x7f0000ffe000/0x2000)=nil) 13:57:26 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:26 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:26 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x32180, 0x0) 13:57:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x35, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:26 executing program 2: syz_open_procfs$namespace(0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x181682, 0x0) 13:57:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x5421, &(0x7f0000001a80)={0x0, @nl=@unspec, @isdn, @generic={0x0, "1071a3fb5d11c9fc377368db742e"}}) 13:57:26 executing program 0: capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)) 13:57:26 executing program 2: syz_open_procfs$namespace(0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x181682, 0x0) 13:57:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:57:26 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:26 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, &(0x7f0000000140), 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0xac, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x36) 13:57:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x1e, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) [ 308.135283][T12915] ptrace attach of "/syz-executor.0"[12914] was attempted by "/syz-executor.0"[12915] 13:57:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:26 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x5c, 0x0, 0x1, 0x40b, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @private}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x5c}}, 0x0) 13:57:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x14, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:26 executing program 1: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000080)) 13:57:26 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:26 executing program 2: mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x4034973, 0xffffffffffffffff, 0x10000000) 13:57:26 executing program 1: madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa) 13:57:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8927, &(0x7f0000000640)={'lo\x00'}) 13:57:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000040)) 13:57:26 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setfsuid(r1) syz_open_dev$ttys(0xc, 0x2, 0x0) 13:57:26 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x1, &(0x7f0000000480)=@raw=[@jmp], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:26 executing program 0: bpf$MAP_CREATE(0x17, &(0x7f0000000200), 0x40) 13:57:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x2, 0x6, 0x5, 0x0, 0x1}, 0x40) 13:57:26 executing program 1: mq_getsetattr(0xffffffffffffffff, &(0x7f0000000040), 0x0) 13:57:27 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x4e, 0x0, 0x0) 13:57:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast2}, {0x0, @random}, 0x0, {0x2, 0x0, @loopback}, 'veth1_to_bond\x00'}) 13:57:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8940, &(0x7f0000001a80)={0x0, @nl=@unspec, @isdn, @generic={0x0, "1071a3fb5d11c9fc377368db742e"}}) 13:57:27 executing program 1: bpf$MAP_CREATE(0xe, &(0x7f0000000200), 0x40) 13:57:27 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x3ff, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$namespace(r1, 0x0) 13:57:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000066c0)={0x90, 0x0, 0x0, {0x400000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x100}}}, 0x0, 0x0, 0x0, 0x0}) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)=@keyring={'key_or_keyring:', 0x0, 0xa}) 13:57:27 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x12, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:27 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x98, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48], 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {0xffff}, {0xffff, 0xfc}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 13:57:27 executing program 0: setrlimit(0x7, &(0x7f0000000380)) 13:57:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x4, 0x0, 0xff}, 0x40) 13:57:27 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:27 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x208282, 0x0) sendmsg$SOCK_DESTROY(r0, 0x0, 0x0) 13:57:27 executing program 1: socket$inet(0x2, 0x2, 0x40) 13:57:27 executing program 2: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x3}, &(0x7f0000000080)={0x6}, &(0x7f00000000c0)={0x77359400}) 13:57:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2d, 0x0, 0x0) 13:57:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) 13:57:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x29, 0x0, @private, @dev}}}}) 13:57:27 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:27 executing program 0: mount$9p_fd(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0) 13:57:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8971, &(0x7f0000000640)={'lo\x00'}) 13:57:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8918, 0x0) 13:57:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001480)={0x11, 0x4, &(0x7f0000000380)=@framed={{}, [@call]}, &(0x7f00000003c0)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001400), 0x8, 0x10, 0x0}, 0x78) 13:57:27 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:27 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000003c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000004440)={0xa0, 0xfffffffffffffff5, r1}, 0xa0) 13:57:27 executing program 2: socketpair(0x10, 0x2, 0x103, &(0x7f00000000c0)) 13:57:27 executing program 1: io_pgetevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 13:57:27 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000980)='/dev/full\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x10000000) 13:57:27 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x181682, 0x0) 13:57:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect(r0, &(0x7f0000000000)=@l2tp={0x2, 0x0, @dev}, 0x80) 13:57:27 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x6, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x2, 0x6, 0x5, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 13:57:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x48, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x0) 13:57:27 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x5411, &(0x7f0000000640)={'gretap0\x00'}) 13:57:27 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x328, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x90, 0xf0, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26]}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x388) 13:57:27 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18}, 0xfffffffffffffe15) 13:57:28 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 13:57:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) bind(r0, &(0x7f0000000100)=@nl=@kern={0x10, 0x0, 0x0, 0x80000000}, 0x80) 13:57:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x29, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:28 executing program 3: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) r0 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r0, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:28 executing program 2: bpf$MAP_CREATE(0xd, &(0x7f0000000200), 0x40) 13:57:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000000)={0x0, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @multicast1}}}, 0x108) 13:57:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x11, &(0x7f0000000040)=0x4, 0x4) 13:57:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x8, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:28 executing program 3: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) r0 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r0, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:28 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x18}, 0x10) 13:57:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000007000000000000001ea5ffff85000000010035f5d379ae1b74"], &(0x7f0000000900)='syzkaller\x00', 0x7, 0xaf, &(0x7f0000000940)=""/175, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:28 executing program 0: socketpair(0x3d, 0x0, 0x0, &(0x7f0000000000)) 13:57:28 executing program 1: write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x2, 0x4) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) 13:57:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 13:57:28 executing program 3: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) r0 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r0, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:28 executing program 0: socketpair(0x3d, 0x0, 0x0, &(0x7f0000000000)) 13:57:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) 13:57:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x4c, 0x0, 0x0) 13:57:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000001400)=[{0x0}, {0x0}, {&(0x7f0000000180)="ef", 0x1}], 0x3}}], 0x1, 0x0) 13:57:28 executing program 3: r0 = socket(0x0, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x32, 0x0, 0x0) 13:57:28 executing program 2: setresgid(0xee01, 0x0, 0xee01) 13:57:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind(r0, &(0x7f0000000100)=@nl, 0x80) 13:57:28 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x1, 0x0, &(0x7f0000001f40)) 13:57:28 executing program 2: bpf$MAP_CREATE(0x10, &(0x7f0000000200), 0x40) 13:57:28 executing program 3: r0 = socket(0x0, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:28 executing program 0: perf_event_open(&(0x7f0000000000)={0x8, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:28 executing program 1: write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) r0 = socket$packet(0x11, 0x2, 0x300) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x11, 0x8100, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) 13:57:28 executing program 2: syz_emit_ethernet(0xda, &(0x7f0000000240)={@local, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0x4c, 0x11, 0x0, @private2, @local, {[@srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}], {0x0, 0x0, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "4333118fe7d20dae41a984f6ffb6bfbbe8e7a25659d5b81790e5c64500a3745a", "9c980aaaec0f0f9abf66edff3c9a973cfd4c6dbeb5c3a07c31b2c76f069e56774c7a6dbbb033f91eaa28c85d18b1e83f", "b56fcf93158fd4452038dcd725519e7931f031dd0e12d9c1b8b6a8ec", {"882ecfbd1aaaa576cf2f3dcb05680413", "33034dd4ec78365e24348a4f32da97be"}}}}}}}}, 0x0) 13:57:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x13, 0x0, 0x0, 0x0, 0x24}, 0x26) 13:57:28 executing program 0: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) 13:57:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 13:57:28 executing program 3: r0 = socket(0x0, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x0, 0x0, 0x0, 0x402}, 0x40) 13:57:28 executing program 0: socketpair(0x10, 0x2, 0x167, &(0x7f00000000c0)) 13:57:28 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x181682, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x0, 0x0) 13:57:28 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) 13:57:28 executing program 0: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x77359400}, 0x8) 13:57:28 executing program 3: r0 = socket(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:28 executing program 1: bpf$MAP_CREATE(0x15, &(0x7f0000000200), 0x40) 13:57:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x13, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:29 executing program 2: r0 = socket$inet(0x2, 0x3, 0x6) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, 0x0) 13:57:29 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @ipv4={[], [], @multicast2}, @local}}) 13:57:29 executing program 2: add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setfsuid(r1) 13:57:29 executing program 3: r0 = socket(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:29 executing program 0: r0 = socket$inet(0x2, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 13:57:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) connect(r0, &(0x7f0000000180)=@nl=@unspec, 0x80) 13:57:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8953, &(0x7f0000000640)={'lo\x00'}) 13:57:29 executing program 3: r0 = socket(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x13, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:29 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000002c0)={'batadv_slave_1\x00'}) 13:57:29 executing program 0: waitid(0x2, 0x0, 0x0, 0x2, 0x0) 13:57:29 executing program 2: r0 = getpid() capset(&(0x7f0000000100)={0x20071026, r0}, 0x0) 13:57:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'veth0_to_bridge\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:30 executing program 2: mount$9p_fd(0x0, &(0x7f00000002c0)='./file0/file0\x00', 0x0, 0x0, 0x0) 13:57:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x19, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:30 executing program 1: getgroups(0x2, &(0x7f0000000100)=[0xee00, 0xffffffffffffffff]) setresgid(0xee00, 0xffffffffffffffff, r0) 13:57:30 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80) 13:57:30 executing program 2: mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x3ff}, &(0x7f0000000040)) 13:57:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x1, &(0x7f0000000480)=@raw=[@func], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000001a80)={0x0, @nl=@unspec, @isdn, @generic={0x0, "1071a3fb5d11c9fc377368db742e"}}) 13:57:30 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xf, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0), 0x10}, 0x78) 13:57:30 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x1a, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, 0x0, 0x0) 13:57:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8901, &(0x7f0000000640)={'lo\x00'}) 13:57:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000000)={0xfffffffe, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:30 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x28, 0x0, 0x4, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 13:57:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/205, 0x1a, 0xcd, 0x1}, 0x20) 13:57:30 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x6001, 0x0) 13:57:30 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00'}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8942, &(0x7f0000000640)={'lo\x00'}) 13:57:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x18, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:30 executing program 2: setrlimit(0x7, &(0x7f0000000380)) socket$inet(0x2, 0x3, 0x20) 13:57:30 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00'}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x67, 0x0, &(0x7f0000001f40)) 13:57:30 executing program 1: r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/28) 13:57:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x3a, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000036c0), 0x4) 13:57:30 executing program 1: r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/28) 13:57:31 executing program 2: openat$nvram(0xffffffffffffff9c, 0x0, 0x410000, 0x0) 13:57:31 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00'}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8990, &(0x7f0000000640)={'lo\x00'}) 13:57:31 executing program 1: r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/28) 13:57:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x21, 0x0, 0x0) 13:57:31 executing program 1: r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/28) 13:57:31 executing program 0: r0 = add_key$keyring(&(0x7f0000006500)='keyring\x00', &(0x7f0000006540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="81", 0x1, r0) 13:57:31 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@loopback}, 0xc) 13:57:31 executing program 2: setrlimit(0x7, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:57:31 executing program 1: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000000)=""/28) 13:57:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x894c, 0x0) 13:57:31 executing program 0: r0 = add_key$keyring(&(0x7f0000006500)='keyring\x00', &(0x7f0000006540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, r0) 13:57:31 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:31 executing program 1: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:57:31 executing program 2: mq_open(0x0, 0x0, 0x0, 0x0) io_setup(0xca, &(0x7f0000000a00)) 13:57:31 executing program 1: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:57:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x3a, 0x0, 0x0) 13:57:31 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:31 executing program 1: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:57:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xa, 0x0, 0x0) 13:57:31 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x0, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xc, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:31 executing program 0: msgsnd(0xffffffffffffffff, &(0x7f0000001400), 0x8, 0x0) 13:57:31 executing program 2: setreuid(0xffffffffffffffff, 0x0) setreuid(0x0, 0x0) 13:57:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0xf4240, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbe, &(0x7f00000000c0)=""/190, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:31 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x0, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:31 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, 0x0) 13:57:31 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)={0x7ff, 0x31, "2f9d2195f9f84ae4e33d9c8f3815bbd885b8d5828fb3ac53c5aa3e5ccc7ef38e0b1dc52ae5bbd8f251aa3c2c60b7a8fe37"}) 13:57:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x22, 0x0, 0x0) 13:57:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x5c, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb81"], 0x0) 13:57:31 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x0, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x200024a8, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:31 executing program 0: setfsuid(0xee01) syz_open_procfs$namespace(0x0, 0x0) 13:57:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001480)={0x11, 0x4, &(0x7f0000000380)=@framed={{}, [@call]}, &(0x7f00000003c0)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 13:57:31 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:31 executing program 0: semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000000)=""/85) 13:57:31 executing program 1: syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x6001) 13:57:31 executing program 2: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="81", 0x1, 0xfffffffffffffffc) 13:57:32 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:32 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0), 0x10}, 0x78) 13:57:32 executing program 2: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000380)) 13:57:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x9, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r0, &(0x7f00000073c0)=[{{&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000240)=[{0x0}, {0x0}], 0x2, &(0x7f0000000280)=[{0x28, 0x0, 0x0, "3da490675d50fbabb66c217eb27023f227"}], 0x28}}], 0x1, 0x0) 13:57:32 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000080)={'dummy0\x00', @ifru_names}) 13:57:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @multicast2}, {0x0, @link_local}, 0x2c, {0x2, 0x0, @multicast2}, 'wg1\x00'}) 13:57:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x8, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:32 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x0, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:32 executing program 1: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86836, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000002880)={0x7, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:32 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x20000, 0x0) 13:57:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000002880)={0x500, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000002880)={0x7, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000480)=@raw=[@func], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:32 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x0, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:32 executing program 2: clock_gettime(0x0, &(0x7f0000000180)) 13:57:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000280)={'vlan1\x00', @ifru_settings={0x0, 0x0, @fr_pvc=0x0}}) 13:57:32 executing program 1: socket$inet(0x2, 0x1, 0x48) 13:57:32 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, 0x0) 13:57:32 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f00000000c0)='./file0\x00'}, 0x10) 13:57:32 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x0, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:32 executing program 2: socketpair(0x2c, 0x3, 0x0, &(0x7f00000001c0)) 13:57:32 executing program 0: syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0xffffffff, 0x208300) 13:57:32 executing program 2: socketpair(0x2c, 0x3, 0x0, &(0x7f00000001c0)) 13:57:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0xbe, &(0x7f00000000c0)=""/190, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:32 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:32 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0, 0x0, 0x30}, 0x10) 13:57:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x12, 0x0, 0x0) 13:57:32 executing program 2: epoll_create(0x1) 13:57:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x18, 0x2, &(0x7f0000000b80)=@raw=[@initr0], &(0x7f0000000bc0)='syzkaller\x00', 0x81, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:32 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:32 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ttyS3\x00', 0x0, 0x0) 13:57:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4, 0x101}]}]}}, &(0x7f00000001c0)=""/205, 0x32, 0xcd, 0x1}, 0x20) 13:57:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xc}, 0x40) 13:57:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, 0x0, 0x0) 13:57:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:33 executing program 0: r0 = add_key$keyring(&(0x7f0000006500)='keyring\x00', &(0x7f0000006540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, 0xfffffffffffffffb) 13:57:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000001a80)={0x0, @nl=@proc, @ipx={0x4, 0x0, 0x0, "08e72b8a92d4"}, @generic={0x0, "1071a3fb5d117368db742e00"}}) 13:57:33 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:33 executing program 0: openat$vcsu(0xffffffffffffff9c, 0x0, 0x40c080, 0x0) 13:57:33 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) 13:57:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x2, 0x3, 0x1d8, 0x98, 0x98, 0x98, 0x0, 0x98, 0x140, 0x140, 0x140, 0x140, 0x140, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48], 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x3ff}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {}, {0xffff, 0xfc}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x238) 13:57:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@remote, @loopback, @private0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x800026}) 13:57:33 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x82, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000002, 0x11, r0, 0x10000000) 13:57:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x894b, &(0x7f0000000640)={'lo\x00'}) 13:57:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x21, 0x0, 0x0) 13:57:33 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:33 executing program 0: r0 = getpid() ptrace$setopts(0x4206, r0, 0x1ff, 0x0) 13:57:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xffffffff, 0x3, 0x8000}, 0x40) 13:57:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x14) 13:57:33 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={[], [], @multicast2}, @local}}) 13:57:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000000)={'veth0_to_hsr\x00', @ifru_flags}) 13:57:33 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0xc0045878, 0x0) 13:57:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x17, 0x0, 0x0) 13:57:33 executing program 2: setrlimit(0x7, &(0x7f0000000380)) socket$inet6_udplite(0xa, 0x2, 0x88) 13:57:33 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) pselect6(0x40, &(0x7f0000002300), 0x0, &(0x7f0000002380)={0x8}, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x4e4) 13:57:33 executing program 0: socketpair(0x10, 0x2, 0x2, &(0x7f00000000c0)) 13:57:33 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:33 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) bind(r0, &(0x7f00000000c0)=@un=@abs, 0x80) 13:57:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x16, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:33 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x10d082) r1 = memfd_create(&(0x7f0000000140)='\xbb\x02\xb1\xed\x97\xdb\xb1,\x116\xe0\x89]\xad\x01\xc3r%;\x99\xbck\xe7=\xfa\xe8HB\x00\x9e\x15\x9e\xc9\x86\x8e\x1d\xdf\x9d+,\x00\xd7h\xa4\x06jt\xea\xf9l\x00\x00\x00\x00!\xf8\xac\xdc\x00\x00\x00', 0x0) pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)='!', 0x1}], 0x1, 0x40ee1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3fbcbab16c80fab, 0x11, r0, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xffffff0f) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000), 0x52698b21) 13:57:33 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 13:57:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x891b, &(0x7f0000000640)={'lo\x00'}) 13:57:33 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@multicast2, @dev={0xac, 0x14, 0x14, 0x3a}, @loopback}, 0xc) 13:57:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, 0x0}, 0x0) 13:57:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind(r0, &(0x7f0000000100)=@nl=@kern={0x10, 0x0, 0xf0}, 0x80) 13:57:33 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:33 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000006500)='keyring\x00', &(0x7f0000006540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) 13:57:33 executing program 1: perf_event_open(&(0x7f0000002140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:57:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x20e, 0x69, 0x20000000, &(0x7f00000004c0)="b95b03b700030703009e40f005dd1fff060007000000e08477fbac141436e00a0001c699da153f0809e6e380f60109f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058e05cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 13:57:34 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000040)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='ip6gre0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0xcbf, 0xa0000001}, 0x14) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x140006, 0x0) 13:57:34 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvram\x00', 0x40080, 0x0) 13:57:34 executing program 2: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x6}, &(0x7f00000000c0)={0x77359400}) 13:57:34 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:34 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 13:57:34 executing program 0: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, &(0x7f0000000000)=0xa1f, 0x9, 0x0) 13:57:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x19, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind(r0, &(0x7f0000000100)=@nl, 0x80) syz_genetlink_get_family_id$SEG6(&(0x7f0000000500)='SEG6\x00') 13:57:34 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:34 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, 0x0) 13:57:34 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000040)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='ip6gre0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0xcbf, 0xa0000001}, 0x14) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x140006, 0x0) 13:57:34 executing program 0: socket(0x28, 0x0, 0x1ff) 13:57:34 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x82, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10111, r0, 0x10000000) 13:57:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x4, &(0x7f0000002140)=@security={'security\x00', 0xe, 0x4, 0x308, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth1_to_hsr\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x368) 13:57:35 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:35 executing program 0: r0 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000006500)='keyring\x00', &(0x7f0000006540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r1, 0x0) 13:57:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7}, 0x40) 13:57:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x39, 0x0, 0x0) 13:57:35 executing program 1: clock_gettime(0x2aa27c32a110633c, 0x0) 13:57:35 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:35 executing program 2: kexec_load(0x0, 0x1, &(0x7f0000000480)=[{0x0}], 0x0) 13:57:35 executing program 0: r0 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000006500)='keyring\x00', &(0x7f0000006540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r1, 0x0) 13:57:35 executing program 2: bpf$MAP_CREATE(0x9, &(0x7f0000000200), 0x40) 13:57:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x891d, &(0x7f0000000640)={'lo\x00'}) 13:57:35 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0) 13:57:36 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x0, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x10, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:36 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x0, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0) 13:57:36 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0xbe, &(0x7f00000000c0)=""/190, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}]}, &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xd8, &(0x7f0000000200)=""/216, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:36 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x303001, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 13:57:36 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x0, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x1, &(0x7f00000000c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}], &(0x7f0000000100)='syzkaller\x00', 0x1, 0x88, &(0x7f0000000140)=""/136, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:36 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000640)='ns/pid_for_children\x00') 13:57:36 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x0, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x3, 0x0, 0x0) 13:57:36 executing program 1: shmget(0x3, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) 13:57:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 13:57:36 executing program 0: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x3}, 0x0, &(0x7f00000000c0)={0x77359400}) 13:57:36 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) 13:57:36 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, 0x0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x49, &(0x7f0000002880)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 13:57:36 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@func]}, &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xd8, &(0x7f0000000200)=""/216, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:57:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x7, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @dev, {[@cipso={0x86, 0x6}]}}}}}) 13:57:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001480)={0x11, 0x4, &(0x7f0000000380)=@framed={{}, [@call]}, &(0x7f00000003c0)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001440), 0x10}, 0x78) 13:57:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0x0, r0, 0x0) 13:57:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f0000000040)) 13:57:36 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, 0x0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x6, 0x0, 0x0) 13:57:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0x0, r0, 0x0) 13:57:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@multicast2, @dev, @loopback}, 0xc) 13:57:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f0000005d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2101, 0x0) 13:57:36 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, 0x0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:36 executing program 1: ptrace$setopts(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 13:57:36 executing program 2: io_setup(0x3, &(0x7f0000003a80)=0x0) io_destroy(r0) 13:57:36 executing program 0: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYRESHEX], 0x1f) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 13:57:36 executing program 1: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xe) 13:57:36 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 318.525281][ T39] audit: type=1804 audit(1602251856.882:31): pid=13955 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir070978937/syzkaller.xwBdY8/141/bus" dev="sda1" ino=16701 res=1 errno=0 [ 318.605334][ T39] audit: type=1804 audit(1602251856.952:32): pid=13955 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir070978937/syzkaller.xwBdY8/141/bus" dev="sda1" ino=16701 res=1 errno=0 13:57:37 executing program 0: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYRESHEX], 0x1f) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 13:57:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x40, 0x0, 0x0) [ 318.666682][ T39] audit: type=1800 audit(1602251857.002:33): pid=13960 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16701 res=0 errno=0 [ 318.707862][ T39] audit: type=1800 audit(1602251857.002:34): pid=13955 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16701 res=0 errno=0 13:57:37 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40183, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10111, r0, 0x10000000) 13:57:37 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x89a1, &(0x7f0000000640)={'lo\x00'}) 13:57:37 executing program 2: setrlimit(0x7, &(0x7f0000000380)) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) 13:57:37 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000003c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004500)={0x2020}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000004440)={0xa0, 0x0, r1}, 0xa0) 13:57:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001780)={0x0, 0xffffffffffffffd7}}, 0x0) [ 318.927607][ T39] audit: type=1804 audit(1602251857.282:35): pid=13977 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir070978937/syzkaller.xwBdY8/142/bus" dev="sda1" ino=16698 res=1 errno=0 13:57:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8946, &(0x7f0000000640)={'lo\x00'}) 13:57:37 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind(r0, &(0x7f0000000100)=@sco={0x1f, @fixed}, 0x80) 13:57:37 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x358, 0xffffffff, 0x0, 0x348, 0x0, 0xffffffff, 0xffffffff, 0x418, 0x418, 0x418, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@local, @rand_addr=' \x01\x00', [], [], 'veth1_to_hsr\x00', 'vlan0\x00', {}, {}, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "cfc56677c21c2c18beb90f18afded00908c9804f0e8eb6b9e5da0023dc64"}}}, {{@ipv6={@remote, @mcast1, [], [], 'veth1_to_batadv\x00', 'batadv0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@ipv6={@dev, @mcast2, [], [], 'macvtap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) 13:57:37 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9bcc, 0x0) read$FUSE(r0, &(0x7f00000023c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setreuid(r1, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 13:57:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7, 0x6, 0x7, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x2}, 0x40) 13:57:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000640)={'lo\x00'}) 13:57:37 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002400)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000100)={0x10, 0x0, r1}, 0x10) 13:57:37 executing program 1: 13:57:37 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 13:57:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x4}]}]}}, &(0x7f00000001c0)=""/205, 0x32, 0xcd, 0x1}, 0x20) 13:57:37 executing program 0: accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0xeb873a00169f21a5) 13:57:37 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa}, 0x40) 13:57:37 executing program 1: 13:57:37 executing program 2: 13:57:37 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x2000016, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:37 executing program 1: 13:57:37 executing program 0: 13:57:37 executing program 2: 13:57:38 executing program 1: 13:57:38 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:38 executing program 0: 13:57:38 executing program 2: 13:57:38 executing program 1: 13:57:38 executing program 0: 13:57:38 executing program 1: 13:57:38 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:38 executing program 2: 13:57:38 executing program 1: 13:57:38 executing program 0: 13:57:38 executing program 2: 13:57:38 executing program 1: 13:57:38 executing program 2: 13:57:38 executing program 0: 13:57:38 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:38 executing program 1: 13:57:38 executing program 1: 13:57:38 executing program 2: 13:57:38 executing program 0: 13:57:38 executing program 1: 13:57:38 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) sendmmsg$inet6(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:38 executing program 2: 13:57:38 executing program 0: 13:57:38 executing program 1: 13:57:38 executing program 0: 13:57:38 executing program 2: 13:57:38 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:38 executing program 0: 13:57:38 executing program 1: 13:57:38 executing program 0: 13:57:38 executing program 2: 13:57:38 executing program 1: 13:57:38 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:38 executing program 0: 13:57:38 executing program 2: 13:57:38 executing program 1: 13:57:38 executing program 2: 13:57:38 executing program 1: 13:57:38 executing program 0: 13:57:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 13:57:39 executing program 2: 13:57:39 executing program 1: 13:57:39 executing program 0: 13:57:39 executing program 2: 13:57:39 executing program 1: 13:57:39 executing program 2: 13:57:39 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000240)={'ip6tnl0\x00', 0x0}) 13:57:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, 0x0, 0x0, 0x0) 13:57:39 executing program 1: 13:57:39 executing program 2: 13:57:39 executing program 0: 13:57:39 executing program 1: 13:57:39 executing program 2: 13:57:39 executing program 1: 13:57:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, 0x0, 0x0, 0x0) 13:57:39 executing program 0: 13:57:39 executing program 1: 13:57:39 executing program 0: 13:57:39 executing program 2: 13:57:39 executing program 1: 13:57:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, 0x0, 0x0, 0x0) 13:57:39 executing program 0: 13:57:39 executing program 2: 13:57:39 executing program 1: 13:57:39 executing program 2: 13:57:39 executing program 0: 13:57:39 executing program 1: 13:57:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840), 0x0, 0x0) 13:57:39 executing program 1: 13:57:39 executing program 2: 13:57:39 executing program 0: 13:57:39 executing program 2: 13:57:39 executing program 1: 13:57:39 executing program 1: 13:57:39 executing program 0: 13:57:39 executing program 2: 13:57:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840), 0x0, 0x0) 13:57:39 executing program 1: 13:57:39 executing program 2: 13:57:39 executing program 1: 13:57:39 executing program 0: 13:57:39 executing program 2: 13:57:39 executing program 1: 13:57:39 executing program 0: 13:57:40 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) sendmmsg$inet6(r1, &(0x7f0000000840), 0x0, 0x0) 13:57:40 executing program 2: 13:57:40 executing program 1: 13:57:40 executing program 0: 13:57:40 executing program 2: 13:57:40 executing program 1: 13:57:40 executing program 0: 13:57:40 executing program 2: 13:57:40 executing program 1: 13:57:40 executing program 3: 13:57:40 executing program 0: 13:57:40 executing program 3: 13:57:40 executing program 1: 13:57:40 executing program 2: 13:57:40 executing program 3: 13:57:40 executing program 2: 13:57:40 executing program 0: 13:57:40 executing program 1: 13:57:40 executing program 2: 13:57:40 executing program 1: 13:57:40 executing program 3: 13:57:40 executing program 0: 13:57:40 executing program 1: 13:57:40 executing program 0: 13:57:40 executing program 3: 13:57:40 executing program 2: 13:57:40 executing program 3: 13:57:40 executing program 1: 13:57:40 executing program 0: 13:57:40 executing program 2: 13:57:40 executing program 3: 13:57:40 executing program 2: 13:57:40 executing program 1: 13:57:40 executing program 3: 13:57:40 executing program 2: 13:57:40 executing program 0: 13:57:40 executing program 1: 13:57:40 executing program 2: 13:57:40 executing program 3: 13:57:40 executing program 1: 13:57:40 executing program 0: 13:57:40 executing program 2: 13:57:40 executing program 0: 13:57:40 executing program 3: 13:57:40 executing program 1: 13:57:40 executing program 2: 13:57:40 executing program 0: 13:57:40 executing program 3: 13:57:40 executing program 1: 13:57:40 executing program 0: 13:57:40 executing program 2: 13:57:40 executing program 3: 13:57:40 executing program 0: 13:57:40 executing program 1: 13:57:40 executing program 2: 13:57:40 executing program 0: 13:57:40 executing program 1: 13:57:40 executing program 3: 13:57:40 executing program 2: 13:57:40 executing program 1: 13:57:40 executing program 3: 13:57:40 executing program 0: 13:57:40 executing program 2: 13:57:40 executing program 3: 13:57:40 executing program 1: 13:57:40 executing program 2: 13:57:40 executing program 0: 13:57:41 executing program 3: 13:57:41 executing program 1: 13:57:41 executing program 0: 13:57:41 executing program 2: 13:57:41 executing program 3: 13:57:41 executing program 2: 13:57:41 executing program 1: 13:57:41 executing program 0: 13:57:41 executing program 3: 13:57:41 executing program 1: 13:57:41 executing program 2: 13:57:41 executing program 0: 13:57:41 executing program 2: 13:57:41 executing program 3: 13:57:41 executing program 1: 13:57:41 executing program 1: 13:57:41 executing program 2: 13:57:41 executing program 3: 13:57:41 executing program 0: 13:57:41 executing program 2: 13:57:41 executing program 1: 13:57:41 executing program 3: 13:57:41 executing program 0: 13:57:41 executing program 3: 13:57:41 executing program 2: 13:57:41 executing program 1: 13:57:41 executing program 3: 13:57:41 executing program 1: 13:57:41 executing program 2: 13:57:41 executing program 3: 13:57:41 executing program 0: 13:57:41 executing program 2: 13:57:41 executing program 3: 13:57:41 executing program 1: 13:57:41 executing program 3: 13:57:41 executing program 2: 13:57:41 executing program 1: 13:57:41 executing program 0: 13:57:41 executing program 3: 13:57:41 executing program 2: 13:57:41 executing program 1: 13:57:41 executing program 2: 13:57:41 executing program 0: 13:57:41 executing program 1: 13:57:41 executing program 3: 13:57:41 executing program 0: 13:57:41 executing program 2: 13:57:41 executing program 1: 13:57:41 executing program 3: 13:57:41 executing program 0: 13:57:41 executing program 2: 13:57:41 executing program 1: 13:57:41 executing program 3: 13:57:41 executing program 2: 13:57:41 executing program 3: 13:57:41 executing program 0: 13:57:41 executing program 1: 13:57:41 executing program 2: 13:57:41 executing program 3: 13:57:41 executing program 1: 13:57:41 executing program 2: 13:57:41 executing program 3: 13:57:41 executing program 0: 13:57:41 executing program 1: 13:57:41 executing program 2: 13:57:41 executing program 1: 13:57:41 executing program 3: 13:57:42 executing program 1: 13:57:42 executing program 0: 13:57:42 executing program 2: 13:57:42 executing program 3: 13:57:42 executing program 2: 13:57:42 executing program 0: 13:57:42 executing program 1: 13:57:42 executing program 3: 13:57:42 executing program 2: 13:57:42 executing program 2: 13:57:42 executing program 0: 13:57:42 executing program 1: 13:57:42 executing program 3: 13:57:42 executing program 2: 13:57:42 executing program 1: 13:57:42 executing program 2: 13:57:42 executing program 0: 13:57:42 executing program 3: 13:57:42 executing program 1: 13:57:42 executing program 0: 13:57:42 executing program 2: 13:57:42 executing program 1: 13:57:42 executing program 3: 13:57:42 executing program 0: 13:57:42 executing program 2: 13:57:42 executing program 3: 13:57:42 executing program 1: 13:57:43 executing program 0: 13:57:43 executing program 3: 13:57:43 executing program 2: 13:57:43 executing program 0: 13:57:43 executing program 1: 13:57:43 executing program 2: 13:57:43 executing program 3: 13:57:43 executing program 1: 13:57:43 executing program 2: 13:57:43 executing program 0: 13:57:43 executing program 3: 13:57:43 executing program 1: 13:57:43 executing program 2: 13:57:43 executing program 1: 13:57:43 executing program 3: 13:57:43 executing program 0: 13:57:43 executing program 2: 13:57:43 executing program 2: 13:57:43 executing program 1: 13:57:43 executing program 0: 13:57:43 executing program 3: 13:57:43 executing program 1: 13:57:43 executing program 2: 13:57:43 executing program 2: 13:57:43 executing program 3: 13:57:43 executing program 1: 13:57:43 executing program 0: 13:57:43 executing program 2: 13:57:43 executing program 1: 13:57:43 executing program 3: 13:57:43 executing program 1: 13:57:43 executing program 2: 13:57:43 executing program 3: 13:57:43 executing program 0: 13:57:43 executing program 1: 13:57:43 executing program 3: 13:57:43 executing program 2: 13:57:43 executing program 3: 13:57:43 executing program 1: 13:57:43 executing program 2: 13:57:43 executing program 3: 13:57:43 executing program 0: 13:57:43 executing program 1: 13:57:43 executing program 3: 13:57:43 executing program 2: 13:57:43 executing program 3: 13:57:43 executing program 0: 13:57:43 executing program 1: 13:57:43 executing program 2: 13:57:43 executing program 3: 13:57:43 executing program 1: 13:57:43 executing program 2: 13:57:43 executing program 0: 13:57:43 executing program 3: 13:57:43 executing program 2: 13:57:43 executing program 1: 13:57:43 executing program 0: 13:57:43 executing program 3: 13:57:43 executing program 2: 13:57:43 executing program 3: 13:57:43 executing program 0: 13:57:43 executing program 1: 13:57:43 executing program 2: 13:57:43 executing program 1: 13:57:43 executing program 3: 13:57:43 executing program 0: 13:57:44 executing program 2: 13:57:44 executing program 1: 13:57:44 executing program 3: 13:57:44 executing program 2: 13:57:44 executing program 1: 13:57:44 executing program 3: 13:57:44 executing program 0: 13:57:44 executing program 2: 13:57:44 executing program 3: 13:57:44 executing program 1: 13:57:44 executing program 2: 13:57:44 executing program 1: 13:57:44 executing program 0: 13:57:44 executing program 3: 13:57:44 executing program 2: 13:57:44 executing program 1: 13:57:44 executing program 0: 13:57:44 executing program 3: 13:57:44 executing program 1: 13:57:44 executing program 2: 13:57:44 executing program 0: 13:57:44 executing program 2: 13:57:44 executing program 1: 13:57:44 executing program 3: 13:57:44 executing program 0: 13:57:44 executing program 2: 13:57:44 executing program 3: 13:57:44 executing program 0: 13:57:44 executing program 3: 13:57:44 executing program 1: 13:57:44 executing program 2: 13:57:44 executing program 3: 13:57:44 executing program 2: 13:57:44 executing program 1: 13:57:44 executing program 0: 13:57:44 executing program 3: 13:57:44 executing program 1: 13:57:44 executing program 0: 13:57:44 executing program 2: 13:57:44 executing program 3: 13:57:44 executing program 1: 13:57:44 executing program 2: 13:57:44 executing program 0: 13:57:44 executing program 2: 13:57:44 executing program 1: 13:57:44 executing program 3: 13:57:44 executing program 0: 13:57:44 executing program 2: 13:57:44 executing program 3: 13:57:44 executing program 1: 13:57:44 executing program 2: 13:57:44 executing program 0: 13:57:44 executing program 1: 13:57:44 executing program 3: 13:57:44 executing program 2: 13:57:44 executing program 0: 13:57:44 executing program 1: 13:57:44 executing program 3: 13:57:44 executing program 2: 13:57:44 executing program 0: 13:57:44 executing program 1: 13:57:44 executing program 2: 13:57:44 executing program 1: 13:57:44 executing program 3: 13:57:44 executing program 0: 13:57:44 executing program 1: 13:57:44 executing program 2: 13:57:44 executing program 3: 13:57:44 executing program 2: 13:57:44 executing program 1: 13:57:44 executing program 3: 13:57:44 executing program 0: 13:57:44 executing program 2: 13:57:45 executing program 3: 13:57:45 executing program 2: 13:57:45 executing program 0: 13:57:45 executing program 1: 13:57:45 executing program 3: 13:57:45 executing program 3: 13:57:45 executing program 0: 13:57:45 executing program 2: 13:57:45 executing program 1: 13:57:45 executing program 3: 13:57:45 executing program 0: 13:57:45 executing program 2: 13:57:45 executing program 1: 13:57:45 executing program 3: 13:57:45 executing program 2: 13:57:45 executing program 1: 13:57:45 executing program 3: 13:57:45 executing program 2: 13:57:45 executing program 0: 13:57:45 executing program 1: 13:57:45 executing program 3: 13:57:45 executing program 2: 13:57:45 executing program 1: 13:57:45 executing program 0: 13:57:45 executing program 3: 13:57:45 executing program 1: 13:57:45 executing program 2: 13:57:45 executing program 1: 13:57:45 executing program 0: 13:57:45 executing program 2: 13:57:45 executing program 3: 13:57:45 executing program 1: 13:57:45 executing program 2: 13:57:45 executing program 0: 13:57:45 executing program 3: 13:57:45 executing program 1: 13:57:45 executing program 2: 13:57:45 executing program 0: 13:57:45 executing program 1: 13:57:45 executing program 3: 13:57:45 executing program 2: 13:57:45 executing program 0: 13:57:45 executing program 1: 13:57:45 executing program 3: 13:57:45 executing program 0: 13:57:45 executing program 2: 13:57:45 executing program 0: 13:57:45 executing program 3: 13:57:45 executing program 1: 13:57:45 executing program 2: 13:57:45 executing program 3: 13:57:45 executing program 0: 13:57:45 executing program 1: 13:57:45 executing program 3: 13:57:45 executing program 2: 13:57:45 executing program 1: 13:57:45 executing program 3: 13:57:45 executing program 2: 13:57:45 executing program 0: 13:57:45 executing program 3: 13:57:45 executing program 1: 13:57:45 executing program 3: 13:57:45 executing program 0: 13:57:45 executing program 2: 13:57:45 executing program 3: 13:57:45 executing program 1: 13:57:45 executing program 2: 13:57:45 executing program 3: 13:57:45 executing program 0: 13:57:45 executing program 2: 13:57:45 executing program 1: 13:57:45 executing program 3: 13:57:45 executing program 2: 13:57:46 executing program 0: 13:57:46 executing program 2: 13:57:46 executing program 3: 13:57:46 executing program 1: 13:57:46 executing program 2: 13:57:46 executing program 3: 13:57:46 executing program 1: 13:57:46 executing program 0: connect$packet(0xffffffffffffffff, 0x0, 0x0) 13:57:46 executing program 0: 13:57:46 executing program 1: 13:57:46 executing program 3: 13:57:46 executing program 2: 13:57:46 executing program 3: 13:57:46 executing program 1: 13:57:46 executing program 0: 13:57:46 executing program 2: 13:57:46 executing program 3: 13:57:46 executing program 1: 13:57:46 executing program 0: 13:57:46 executing program 3: 13:57:46 executing program 2: 13:57:46 executing program 1: 13:57:46 executing program 3: 13:57:46 executing program 0: 13:57:46 executing program 1: 13:57:46 executing program 2: 13:57:46 executing program 3: 13:57:46 executing program 1: 13:57:46 executing program 2: 13:57:46 executing program 2: 13:57:46 executing program 1: 13:57:46 executing program 0: 13:57:46 executing program 3: 13:57:46 executing program 2: 13:57:46 executing program 3: 13:57:46 executing program 1: 13:57:46 executing program 0: 13:57:46 executing program 2: 13:57:46 executing program 3: 13:57:46 executing program 1: 13:57:46 executing program 2: 13:57:46 executing program 0: 13:57:46 executing program 3: 13:57:46 executing program 2: 13:57:46 executing program 1: 13:57:46 executing program 2: 13:57:46 executing program 0: 13:57:46 executing program 3: 13:57:46 executing program 1: 13:57:46 executing program 2: 13:57:46 executing program 3: 13:57:46 executing program 2: 13:57:46 executing program 0: 13:57:46 executing program 1: 13:57:46 executing program 3: 13:57:46 executing program 2: 13:57:46 executing program 1: 13:57:47 executing program 3: 13:57:47 executing program 2: 13:57:47 executing program 0: 13:57:47 executing program 1: 13:57:47 executing program 2: 13:57:47 executing program 1: 13:57:47 executing program 3: 13:57:47 executing program 2: 13:57:47 executing program 0: 13:57:47 executing program 1: 13:57:47 executing program 3: 13:57:47 executing program 2: 13:57:47 executing program 1: 13:57:47 executing program 2: 13:57:47 executing program 3: 13:57:47 executing program 1: 13:57:47 executing program 0: 13:57:47 executing program 1: 13:57:47 executing program 3: 13:57:47 executing program 2: 13:57:47 executing program 1: 13:57:47 executing program 3: 13:57:47 executing program 1: 13:57:47 executing program 2: 13:57:47 executing program 0: 13:57:47 executing program 3: 13:57:47 executing program 1: 13:57:47 executing program 2: 13:57:47 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 13:57:47 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) 13:57:47 executing program 1: 13:57:47 executing program 2: 13:57:47 executing program 1: 13:57:47 executing program 2: r0 = socket$packet(0xf, 0x3, 0x2) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 13:57:47 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000140)={'macsec0\x00', @ifru_data=0x0}) 13:57:47 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x117}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x44}}, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 13:57:47 executing program 0: syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x4540) 13:57:47 executing program 2: socketpair(0x23, 0x0, 0x1, &(0x7f0000000040)) 13:57:47 executing program 0: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="92", 0x1}], 0x0, 0x0) 13:57:47 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0xfffffffffffffd59) 13:57:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="5083f3189da527d4f99cf6310df25176026a3a3a46dd855924fb1f013ba17fae81bdbbf974cff5778abeec4a7991d7ce20ea23f18a0dad32f54ab341b21c16f3247e2adea56f4292477c77276aab0198d12b2b974a71e95523526e320215daf2b51f789b82f2f25e895ab41e635a1da739d73ae8a7eb49c841e83586190864e6228d6898e668fff745389ec3ef", 0x8d, 0x5}], 0x1, &(0x7f0000000200)={[{@gid={'gid', 0x3d, 0xee00}}, {@gid={'gid', 0x3d, 0xee01}}, {@show_sys_files_no='show_sys_files=no'}, {@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x9}}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x3}}, {@errors_recover='errors=recover'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@uid_lt={'uid<', 0xffffffffffffffff}}, {@fowner_lt={'fowner<', 0xee01}}, {@uid_eq={'uid'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@smackfstransmute={'smackfstransmute', 0x3d, '$/!.\xf7@(++{}#'}}]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.memory_pressure\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0, 0x400) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)={0x264, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x68, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x40}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1e4800000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x400000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x74a3b9c7}]}]}, @TIPC_NLA_BEARER={0x160, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc5ef}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x34}}}, {0x14, 0x2, @in={0x2, 0x4e21, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @rand_addr=0x64010100}}, {0x14, 0x2, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2a}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xfffffff8, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @empty}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast1}}}}]}, @TIPC_NLA_BEARER={0x70, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1f}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x0, @mcast2, 0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffff523}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}]}, 0x264}, 0x1, 0x0, 0x0, 0x4004800}, 0x24008054) 13:57:47 executing program 2: symlinkat(&(0x7f0000000140)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00') [ 329.406797][T15120] ntfs: (device loop1): parse_options(): Unrecognized mount option uid<18446744. 13:57:47 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x3) [ 329.698562][T15120] ntfs: (device loop1): parse_options(): Unrecognized mount option uid<18446744. 13:57:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_NAN_FUNC={0xc, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID={0x5}]}]}, 0x34}}, 0x0) 13:57:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000740)={&(0x7f0000000200), 0xc, 0x0}, 0x0) 13:57:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_DEL_TX_TS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="8f8f29bd7000fedbdf256a"], 0x70}}, 0x0) 13:57:50 executing program 2: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000000080)='\x00', 0x1}, {&(0x7f00000001c0)='\f', 0x1, 0xfffffffffffffffc}], 0x0, 0x0) 13:57:50 executing program 0: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)) 13:57:50 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000340)=[{&(0x7f0000000140)="2d5fcd997cf11418ba604a20c9608fb5450d3f055ec8a7de5183ac8ca38b35ffe32735ade9487929360af0fd936fdefa993ddf3c0c4e02daf1f702b20aafe2e84198df9b2ae22b8d61aa12620c63bbc64b6eb80775df3310a13226bf204f307589", 0x61, 0xdecd}, {&(0x7f0000000200)="1e", 0x1, 0x3f}], 0x1000082, &(0x7f00000003c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0xee00, @ANYBLOB="2c6d66745f7a6f6e655f6d756c7469706c6965723d3078666666666666666666666666666666662c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030302c7365636c6162656c2c7375626a5f726f6c653d5c7b7d232c7375626a5f747970653d5b2c6673757569643d66373400313535622d361863632d630035332d313732662d646254f79b089a255c10176330", @ANYRES32]) 13:57:50 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)={[{@usrquota='usrquota'}, {@errors_continue='errors=continue'}, {@quota='quota'}], [{@smackfsfloor={'smackfsfloor', 0x3d, ')&$'}}]}) 13:57:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_NAN_FUNC={0xc, 0xf0, 0x0, 0x1, [@NL80211_NAN_FUNC_FOLLOW_UP_REQ_ID={0x5}]}]}, 0x34}}, 0x0) [ 332.452222][T15153] jfs: Unrecognized mount option "smackfsfloor=)&$" or missing value 13:57:50 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockname(r0, 0x0, &(0x7f0000000280)) [ 332.457013][T15160] ntfs: (device loop1): parse_options(): Unrecognized mount option seclabel. [ 332.482967][T15160] ntfs: (device loop1): parse_options(): Unrecognized mount option subj_role. [ 332.495296][T15160] ntfs: (device loop1): parse_options(): Unrecognized mount option subj_type. 13:57:50 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 332.506658][T15160] ntfs: (device loop1): parse_options(): Unrecognized mount option fsuuid. 13:57:50 executing program 0: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[]) 13:57:50 executing program 2: syz_mount_image$iso9660(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 332.609220][T15153] jfs: Unrecognized mount option "smackfsfloor=)&$" or missing value 13:57:51 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 13:57:51 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x125d, 0x0) 13:57:51 executing program 3: r0 = socket$packet(0xf, 0x3, 0x2) sendto$packet(r0, 0x0, 0x8, 0x0, 0x0, 0x0) 13:57:51 executing program 2: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsu\x00', 0x0, 0x0) 13:57:51 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x3}, &(0x7f00000000c0)={0x9}, 0x0, &(0x7f00000001c0)={0x0}) 13:57:51 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x3}, 0x0, 0x0, 0x0) 13:57:51 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x0, &(0x7f00000024c0), 0x0, &(0x7f00000027c0)={[{@map_normal='map=normal'}], [{@euid_eq={'euid'}}]}) 13:57:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000bc0)={'batadv0\x00'}) 13:57:51 executing program 2: 13:57:51 executing program 1: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) 13:57:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000680)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_IBSS(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f00000006c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_HIDDEN_SSID={0x9, 0x7e, @random="6ed249001d"}, @NL80211_ATTR_MESH_CONFIG={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x28}}, 0x0) 13:57:51 executing program 3: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) [ 333.080510][T15215] netlink: 'syz-executor.2': attribute type 126 has an invalid length. [ 333.093454][T15217] netlink: 'syz-executor.2': attribute type 126 has an invalid length. 13:57:51 executing program 1: socket(0x7246d8d72d2bffa9, 0x0, 0x0) 13:57:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 13:57:51 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x0, &(0x7f00000024c0), 0x0, &(0x7f00000027c0)={[{@map_normal='map=normal'}], [{@euid_eq={'euid'}}]}) 13:57:51 executing program 2: 13:57:51 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x401070c9, 0x0) 13:57:51 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000380)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000016c0)={0x4c, 0x0, &(0x7f0000001540)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x48, 0x0, &(0x7f0000001600)="ec368a376416bf490b7a9f3e19c0af1820b500e6f468e5b817f04072ef173463820bbdf4defb5b8cec402921ee8e12d9f69ffa5a2429b45081c60b44de78da360ca0a4200d0e76de"}) 13:57:51 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000001140)=ANY=[@ANYBLOB='utf8,uid=', @ANYRESHEX=0xee01, @ANYBLOB=',disable_sparse']) 13:57:51 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, 0x0, 0x0) [ 333.264687][T15237] ntfs: (device loop3): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 333.301139][T15237] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 13:57:51 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000001140)=ANY=[@ANYBLOB='utf8,', @ANYRESHEX=0xee01, @ANYBLOB=',disable_sparse=yes,case_sensitive=no', @ANYBLOB=',context=']) 13:57:51 executing program 2: openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000004c0)='devices.allow\x00', 0x2, 0x0) [ 333.407512][T15237] ntfs: (device loop3): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 13:57:51 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x0, &(0x7f00000024c0), 0x0, &(0x7f00000027c0)={[{@map_normal='map=normal'}], [{@euid_eq={'euid'}}]}) [ 333.433644][T15252] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 13:57:51 executing program 2: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 13:57:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x7}, 0x4) 13:57:51 executing program 2: socketpair(0x10, 0x2, 0x0, &(0x7f0000000880)) 13:57:51 executing program 2: syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) 13:57:51 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1000023, &(0x7f0000000640)) 13:57:52 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="926b1937f2432dc7bce1de1cc56112", 0xf, 0x4}], 0x1000080, &(0x7f00000002c0)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}, {@nls={'nls', 0x3d, 'cp865'}}, {@errors_remount='errors=remount-ro'}, {@uid={'uid', 0x3d, 0xee00}}, {@errors_remount='errors=remount-ro'}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@smackfshat={'smackfshat'}}, {@hash='hash'}, {@seclabel='seclabel'}]}) 13:57:52 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x0, &(0x7f00000024c0), 0x0, &(0x7f00000027c0)={[{@map_normal='map=normal'}], [{@euid_eq={'euid'}}]}) 13:57:52 executing program 2: socket(0xa, 0x0, 0x623a) 13:57:52 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)={0x0, 0x0, "3b9719", 0x23}) 13:57:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 13:57:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x106}}, 0x20) 13:57:52 executing program 1: socket$packet(0xa, 0x3, 0x87) 13:57:52 executing program 0: syz_mount_image$iso9660(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x0, &(0x7f00000024c0), 0x0, &(0x7f00000027c0)={[{@map_normal='map=normal'}], [{@euid_eq={'euid'}}]}) 13:57:52 executing program 2: socket(0x25, 0x5, 0xfff) 13:57:52 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000380)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x4020940d, &(0x7f00000016c0)={0x14, 0x0, &(0x7f0000001540)=[@increfs_done], 0x0, 0x0, 0x0}) 13:57:52 executing program 1: socketpair(0x10, 0x0, 0x0, &(0x7f0000000880)) 13:57:53 executing program 0: syz_mount_image$iso9660(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x0, &(0x7f00000024c0), 0x0, &(0x7f00000027c0)={[{@map_normal='map=normal'}], [{@euid_eq={'euid'}}]}) 13:57:53 executing program 3: keyctl$dh_compute(0x17, &(0x7f0000000080), &(0x7f0000000140)=""/4096, 0x1000, &(0x7f0000001180)={0x0}) 13:57:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) 13:57:53 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_ifreq(r0, 0x8915, 0x0) 13:57:53 executing program 2: r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x40345622, 0x0) 13:57:53 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x127c, 0x0) 13:57:53 executing program 3: syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 13:57:53 executing program 0: syz_mount_image$iso9660(0x0, &(0x7f0000000300)='./file1\x00', 0x0, 0x0, &(0x7f00000024c0), 0x0, &(0x7f00000027c0)={[{@map_normal='map=normal'}], [{@euid_eq={'euid'}}]}) 13:57:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000740)={&(0x7f0000000200), 0xc, &(0x7f0000000700)={0x0}}, 0x0) 13:57:53 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0x40086602, &(0x7f0000000080)) 13:57:53 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 13:57:53 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) 13:57:53 executing program 0: syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', 0x0, 0x0, 0x0, &(0x7f00000024c0), 0x0, &(0x7f00000027c0)={[{@map_normal='map=normal'}], [{@euid_eq={'euid'}}]}) 13:57:53 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001600)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803}}], 0x500, 0x0, 0x0) 13:57:53 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000000), 0x4) 13:57:53 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000380)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0046209, 0x0) [ 335.890702][ T2794] Bluetooth: hci0: command 0x0401 tx timeout [ 410.294710][ T2557] Bluetooth: hci3: command 0x0406 tx timeout [ 410.294917][ T2794] Bluetooth: hci0: command 0x0406 tx timeout [ 410.340901][ T2794] Bluetooth: hci2: command 0x0406 tx timeout [ 410.347595][ T2557] Bluetooth: hci1: command 0x0406 tx timeout [ 416.518547][T11917] syz-executor.0: page allocation failure: order:0, mode:0x40a20(GFP_ATOMIC|__GFP_COMP), nodemask=(null),cpuset=syz0,mems_allowed=0-1 [ 416.519983][T11917] CPU: 0 PID: 11917 Comm: syz-executor.0 Not tainted 5.9.0-rc8-syzkaller #0 [ 416.519983][T11917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 416.519983][T11917] Call Trace: [ 416.519983][T11917] dump_stack+0x198/0x1fd [ 416.519983][T11917] warn_alloc.cold+0x87/0x17a [ 416.519983][T11917] ? zone_watermark_ok_safe+0x2a0/0x2a0 [ 416.519983][T11917] ? find_held_lock+0x2d/0x110 [ 416.519983][T11917] ? wakeup_kswapd+0x206/0x6a0 [ 416.519983][T11917] ? __zone_watermark_ok+0x440/0x440 [ 416.519983][T11917] ? wake_all_kswapds+0x143/0x2c0 [ 416.519983][T11917] __alloc_pages_slowpath.constprop.0+0x22bd/0x28c0 [ 416.519983][T11917] ? warn_alloc+0x120/0x120 [ 416.519983][T11917] ? __zone_watermark_ok+0x440/0x440 [ 416.519983][T11917] ? __zone_watermark_ok+0x440/0x440 [ 416.519983][T11917] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 416.519983][T11917] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 416.519983][T11917] __alloc_pages_nodemask+0x62c/0x790 [ 416.519983][T11917] ? lock_is_held_type+0xbb/0xf0 [ 416.519983][T11917] ? __alloc_pages_slowpath.constprop.0+0x28c0/0x28c0 [ 416.519983][T11917] ? lock_downgrade+0x830/0x830 [ 416.519983][T11917] ? lock_downgrade+0x830/0x830 [ 416.519983][T11917] cache_grow_begin+0x71/0x4a0 [ 416.519983][T11917] fallback_alloc+0x1fb/0x2e0 [ 416.519983][T11917] kmem_cache_alloc+0x2e3/0x3f0 [ 416.519983][T11917] __sigqueue_alloc+0x236/0x550 [ 416.519983][T11917] __send_signal+0x62d/0xf90 [ 416.519983][T11917] force_sig_info_to_task+0x2a0/0x3a0 [ 416.519983][T11917] force_sig_fault+0xb0/0xf0 [ 416.519983][T11917] ? force_sig_fault_to_task+0xe0/0xe0 [ 416.519983][T11917] ? arch_local_irq_disable+0x50/0x50 [ 416.519983][T11917] ? _down_write_nest_lock+0x150/0x150 [ 416.519983][T11917] __bad_area_nosemaphore+0x32a/0x4f0 [ 416.519983][T11917] do_user_addr_fault+0x852/0xbf0 [ 416.519983][T11917] ? rcu_read_lock_sched_held+0x3a/0xb0 [ 416.519983][T11917] exc_page_fault+0xa8/0x190 [ 416.519983][T11917] ? asm_exc_page_fault+0x8/0x30 [ 416.519983][T11917] asm_exc_page_fault+0x1e/0x30 [ 416.519983][T11917] RIP: 0023:0x804d5bc [ 416.519983][T11917] Code: ff 50 e8 d7 5d 01 00 83 c4 10 85 c0 0f 84 75 01 00 00 8b 5c 24 0c e8 93 03 01 00 65 f0 83 2d e4 ff ff ff 01 8b 54 24 10 8b 00 <83> 7a 50 ff 89 42 54 75 0b 85 c0 75 07 c7 42 54 16 00 00 00 6b 44 [ 416.519983][T11917] RSP: 002b:00000000f54f7100 EFLAGS: 00010282 [ 416.519983][T11917] RAX: 000000000000000e RBX: 0000000000000000 RCX: 00000000f54f70f0 [ 416.519983][T11917] RDX: 0000000000000000 RSI: 000000000818af60 RDI: 000000000815e000 [ 416.519983][T11917] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000 [ 416.519983][T11917] R10: 0000000000000000 R11: 0000000000000296 R12: 0000000000000000 [ 416.519983][T11917] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 416.519983][T11917] Mem-Info: [ 416.519983][T11917] active_anon:3284 inactive_anon:102029 isolated_anon:0 [ 416.519983][T11917] active_file:120 inactive_file:125 isolated_file:0 [ 416.519983][T11917] unevictable:0 dirty:18 writeback:40 [ 416.519983][T11917] slab_reclaimable:14253 slab_unreclaimable:152642 [ 416.519983][T11917] mapped:34876 shmem:318 pagetables:873 bounce:0 [ 416.519983][T11917] free:6803 free_pcp:791 free_cma:0 [ 416.519983][T11917] Node 0 active_anon:13124kB inactive_anon:205380kB active_file:32kB inactive_file:4kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:36kB dirty:0kB writeback:8kB shmem:1252kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 88064kB writeback_tmp:0kB kernel_stack:8032kB all_unreclaimable? yes [ 416.519983][T11917] Node 1 active_anon:12kB inactive_anon:202736kB active_file:448kB inactive_file:496kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:139468kB dirty:72kB writeback:152kB shmem:20kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:1632kB all_unreclaimable? yes [ 416.519983][T11917] Node 0 DMA free:2236kB min:720kB low:900kB high:1080kB reserved_highatomic:0KB active_anon:0kB inactive_anon:13056kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 417.330409][ C1] ------------[ cut here ]------------ [ 416.519983][T11917] lowmem_reserve[]: 0 496 496 496 496 [ 416.519983][T11917] Node 0 DMA32 free:8620kB min:74952kB low:80716kB high:86480kB reserved_highatomic:2048KB active_anon:13124kB inactive_anon:192324kB active_file:32kB inactive_file:4kB unevictable:0kB writepending:8kB present:1032192kB managed:513812kB mlocked:0kB pagetables:1440kB bounce:0kB free_pcp:1600kB local_pcp:756kB free_cma:0kB [ 416.519983][T11917] lowmem_reserve[]: 0 0 0 0 0 [ 416.519983][T11917] Node 1 DMA32 free:16356kB min:64272kB low:75220kB high:86168kB reserved_highatomic:0KB active_anon:12kB inactive_anon:202736kB active_file:448kB inactive_file:496kB unevictable:0kB writepending:128kB present:1048436kB managed:965484kB mlocked:0kB pagetables:2052kB bounce:0kB free_pcp:1568kB local_pcp:452kB free_cma:0kB [ 416.519983][T11917] lowmem_reserve[]: 0 0 0 0 0 [ 416.519983][T11917] Node 0 DMA: 5*4kB (UE) 3*8kB (UE) 3*16kB (E) 3*32kB (UE) 4*64kB (E) 4*128kB (UE) 1*256kB (E) 2*512kB (UE) 0*1024kB 0*2048kB 0*4096kB = 2236kB [ 417.369556][ C1] HSR: Could not send supervision frame [ 417.378267][ C1] WARNING: CPU: 1 PID: 0 at net/hsr/hsr_device.c:299 send_hsr_supervision_frame+0x889/0xb40 [ 416.519983][T11917] Node 0 DMA32: 733*4kB (ME) 386*8kB (UMEH) 105*16kB (UME) 31*32kB (UME) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8692kB [ 416.519983][T11917] Node 1 DMA32: 367*4kB (UME) 139*8kB (UME) 41*16kB (UME) 30*32kB (UME) 15*64kB (UME) 12*128kB (ME) 16*256kB (UME) 5*512kB (M) 3*1024kB (M) 0*2048kB 0*4096kB = 16420kB [ 416.519983][T11917] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 417.428545][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 416.519983][T11917] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 417.437885][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.9.0-rc8-syzkaller #0 [ 416.519983][T11917] 567 total pagecache pages [ 417.437885][ C1] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014 [ 417.437885][ C1] Call Trace: [ 416.519983][T11917] 0 pages in swap cache [ 417.437885][ C1] [ 416.519983][T11917] Swap cache stats: add 0, delete 0, find 0/0 [ 417.437885][ C1] dump_stack+0x198/0x1fd [ 416.519983][T11917] Free swap = 0kB [ 417.437885][ C1] panic+0x382/0x7fb [ 416.519983][T11917] Total swap = 0kB [ 416.519983][T11917] 524155 pages RAM [ 417.437885][ C1] ? __warn_printk+0xf3/0xf3 [ 416.519983][T11917] 0 pages HighMem/MovableOnly [ 416.519983][T11917] 150354 pages reserved [ 417.437885][ C1] ? mark_held_locks+0x9f/0xe0 [ 416.519983][T11917] 0 pages cma reserved [ 417.437885][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 417.437885][ C1] ? __warn.cold+0x5/0x4b [ 417.437885][ C1] ? __warn+0xd6/0x1f2 [ 417.437885][ C1] ? send_hsr_supervision_frame+0x889/0xb40 [ 417.437885][ C1] __warn.cold+0x20/0x4b [ 417.437885][ C1] ? send_hsr_supervision_frame+0x889/0xb40 [ 417.437885][ C1] report_bug+0x1bd/0x210 [ 417.810194][ C1] handle_bug+0x38/0x90 [ 417.810194][ C1] exc_invalid_op+0x14/0x40 [ 417.810194][ C1] asm_exc_invalid_op+0x12/0x20 [ 417.810194][ C1] RIP: 0010:send_hsr_supervision_frame+0x889/0xb40 [ 417.810194][ C1] Code: 03 31 ff 89 de e8 c7 71 58 f9 84 db 0f 85 8b fd ff ff e8 9a 75 58 f9 48 c7 c7 00 29 67 89 c6 05 52 e6 36 03 01 e8 89 b2 28 f9 <0f> 0b e9 6c fd ff ff e8 7b 75 58 f9 41 be 42 00 00 00 ba 01 00 00 [ 417.810194][ C1] RSP: 0000:ffffc900004e8c48 EFLAGS: 00010286 [ 417.810194][ C1] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 417.810194][ C1] RDX: ffff88802c21c380 RSI: ffffffff815f5a55 RDI: fffff5200009d17b [ 417.810194][ C1] RBP: 00000000000088fb R08: 0000000000000001 R09: ffffffff8d0c3abf [ 417.810194][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888054646e80 [ 417.900332][ C1] R13: 0000000000000000 R14: ffff888054780ce8 R15: ffff88802cf255c0 [ 417.900332][ C1] ? vprintk_func+0x95/0x1d4 [ 417.900332][ C1] ? send_hsr_supervision_frame+0x889/0xb40 [ 417.900332][ C1] hsr_announce+0x122/0x320 [ 417.900332][ C1] ? send_hsr_supervision_frame+0xb40/0xb40 [ 417.900332][ C1] ? lock_is_held_type+0xbb/0xf0 [ 417.900332][ C1] call_timer_fn+0x1ac/0x760 [ 417.900332][ C1] ? send_hsr_supervision_frame+0xb40/0xb40 [ 417.900332][ C1] ? msleep_interruptible+0x130/0x130 [ 417.900332][ C1] ? lock_downgrade+0x830/0x830 [ 417.900332][ C1] ? _raw_spin_unlock_irq+0x1f/0x80 [ 417.900332][ C1] ? lockdep_hardirqs_on_prepare+0x19c/0x530 [ 417.900332][ C1] ? _raw_spin_unlock_irq+0x1f/0x80 [ 417.900332][ C1] ? send_hsr_supervision_frame+0xb40/0xb40 [ 417.900332][ C1] __run_timers.part.0+0x67c/0xaa0 [ 417.900332][ C1] ? call_timer_fn+0x760/0x760 [ 417.900332][ C1] ? sched_clock_cpu+0x17b/0x1f0 [ 417.900332][ C1] run_timer_softirq+0xb3/0x1d0 [ 417.900332][ C1] __do_softirq+0x1f8/0xb23 [ 417.900332][ C1] asm_call_irq_on_stack+0xf/0x20 [ 417.900332][ C1] [ 417.900332][ C1] do_softirq_own_stack+0x9b/0xd0 [ 417.900332][ C1] irq_exit_rcu+0x235/0x280 [ 417.900332][ C1] sysvec_apic_timer_interrupt+0x51/0xf0 [ 417.900332][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 417.900332][ C1] RIP: 0010:native_safe_halt+0xe/0x10 [ 417.900332][ C1] Code: 89 ef e8 95 dc 8d f9 e9 86 fe ff ff 48 89 df e8 88 dc 8d f9 e9 7b ff ff ff cc cc cc e9 07 00 00 00 0f 00 2d 94 9f 5f 00 fb f4 90 e9 07 00 00 00 0f 00 2d 84 9f 5f 00 f4 c3 cc cc 55 53 e8 69 [ 417.900332][ C1] RSP: 0000:ffffc9000041fe60 EFLAGS: 00000282 [ 417.900332][ C1] RAX: 1ffffffff13f8d80 RBX: ffff88802c21c380 RCX: 1ffffffff16b2b61 [ 417.900332][ C1] RDX: dffffc0000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 417.900332][ C1] RBP: dffffc0000000000 R08: 0000000000000001 R09: 0000000000000001 [ 417.900332][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff89fc6be0 [ 417.900332][ C1] R13: ffffed1005843870 R14: 0000000000000001 R15: ffffffff8b599748 [ 417.900332][ C1] default_idle+0x2f/0x50 [ 417.900332][ C1] default_idle_call+0x95/0xd0 [ 417.900332][ C1] do_idle+0x4a9/0x730 [ 417.900332][ C1] ? arch_cpu_idle_exit+0x70/0x70 [ 417.900332][ C1] cpu_startup_entry+0x14/0x20 [ 417.900332][ C1] secondary_startup_64+0xa4/0xb0 [ 417.900332][ C1] Kernel Offset: disabled [ 417.900332][ C1] Rebooting in 86400 seconds..