[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.176' (ECDSA) to the list of known hosts. 2020/03/27 04:52:38 fuzzer started 2020/03/27 04:52:41 dialing manager at 10.128.0.26:33655 2020/03/27 04:52:41 syscalls: 3028 2020/03/27 04:52:41 code coverage: enabled 2020/03/27 04:52:41 comparison tracing: enabled 2020/03/27 04:52:41 extra coverage: enabled 2020/03/27 04:52:41 setuid sandbox: enabled 2020/03/27 04:52:41 namespace sandbox: enabled 2020/03/27 04:52:41 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/27 04:52:41 fault injection: enabled 2020/03/27 04:52:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/27 04:52:41 net packet injection: enabled 2020/03/27 04:52:41 net device setup: enabled 2020/03/27 04:52:41 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/27 04:52:41 devlink PCI setup: PCI device 0000:00:10.0 is not available 04:54:02 executing program 0: syzkaller login: [ 126.350211][ T7185] IPVS: ftp: loaded support on port[0] = 21 04:54:02 executing program 1: [ 126.501020][ T7185] chnl_net:caif_netlink_parms(): no params data found [ 126.603089][ T7185] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.612762][ T7185] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.622415][ T7185] device bridge_slave_0 entered promiscuous mode [ 126.633349][ T7185] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.642064][ T7185] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.651781][ T7185] device bridge_slave_1 entered promiscuous mode [ 126.679357][ T7185] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 126.681040][ T7305] IPVS: ftp: loaded support on port[0] = 21 [ 126.691535][ T7185] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 126.723146][ T7185] team0: Port device team_slave_0 added [ 126.732415][ T7185] team0: Port device team_slave_1 added [ 126.758834][ T7185] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 126.765817][ T7185] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 126.792032][ T7185] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 126.806997][ T7185] batman_adv: batadv0: Adding interface: batadv_slave_1 04:54:03 executing program 2: [ 126.814606][ T7185] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 126.847301][ T7185] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 126.961365][ T7185] device hsr_slave_0 entered promiscuous mode [ 126.998801][ T7185] device hsr_slave_1 entered promiscuous mode 04:54:03 executing program 3: [ 127.127649][ T7369] IPVS: ftp: loaded support on port[0] = 21 [ 127.346423][ T7419] IPVS: ftp: loaded support on port[0] = 21 [ 127.359796][ T7305] chnl_net:caif_netlink_parms(): no params data found 04:54:03 executing program 4: [ 127.402262][ T7185] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 127.495812][ T7185] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 127.629785][ T7185] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 127.673556][ T7185] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 127.716511][ T7577] IPVS: ftp: loaded support on port[0] = 21 [ 127.731817][ T7369] chnl_net:caif_netlink_parms(): no params data found 04:54:04 executing program 5: [ 127.791347][ T7305] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.810622][ T7305] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.822054][ T7305] device bridge_slave_0 entered promiscuous mode [ 127.880008][ T7305] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.887123][ T7305] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.895760][ T7305] device bridge_slave_1 entered promiscuous mode [ 127.967913][ T7305] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 127.997756][ T7305] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 128.017346][ T7687] IPVS: ftp: loaded support on port[0] = 21 [ 128.079324][ T7369] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.086427][ T7369] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.096621][ T7369] device bridge_slave_0 entered promiscuous mode [ 128.146310][ T7305] team0: Port device team_slave_0 added [ 128.153280][ T7369] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.161305][ T7369] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.169965][ T7369] device bridge_slave_1 entered promiscuous mode [ 128.206469][ T7305] team0: Port device team_slave_1 added [ 128.227896][ T7185] 8021q: adding VLAN 0 to HW filter on device bond0 [ 128.244364][ T7419] chnl_net:caif_netlink_parms(): no params data found [ 128.269465][ T7577] chnl_net:caif_netlink_parms(): no params data found [ 128.283332][ T7369] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 128.297697][ T7369] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 128.308351][ T7305] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 128.315414][ T7305] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 128.342248][ T7305] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 128.389874][ T7305] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 128.397007][ T7305] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 128.424228][ T7305] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 128.503767][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.512630][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.525221][ T7185] 8021q: adding VLAN 0 to HW filter on device team0 [ 128.534862][ T7369] team0: Port device team_slave_0 added [ 128.607813][ T7369] team0: Port device team_slave_1 added [ 128.641523][ T7305] device hsr_slave_0 entered promiscuous mode [ 128.688436][ T7305] device hsr_slave_1 entered promiscuous mode [ 128.728168][ T7305] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 128.735882][ T7305] Cannot create hsr debugfs directory [ 128.762606][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 128.771290][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.781069][ T2687] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.788335][ T2687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.823193][ T7577] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.830329][ T7577] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.838292][ T7577] device bridge_slave_0 entered promiscuous mode [ 128.846658][ T7577] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.853869][ T7577] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.861720][ T7577] device bridge_slave_1 entered promiscuous mode [ 128.871652][ T7419] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.878979][ T7419] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.886627][ T7419] device bridge_slave_0 entered promiscuous mode [ 128.900632][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 128.910944][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 128.921204][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.931593][ T2913] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.938710][ T2913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.962810][ T7369] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 128.970030][ T7369] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 128.996741][ T7369] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 129.008562][ T7419] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.015651][ T7419] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.024380][ T7419] device bridge_slave_1 entered promiscuous mode [ 129.053868][ T7369] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 129.061273][ T7369] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.088415][ T7369] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 129.107429][ T7687] chnl_net:caif_netlink_parms(): no params data found [ 129.118691][ T7419] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 129.131804][ T7419] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 129.142132][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 129.154965][ T7577] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 129.193509][ T7577] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 129.253477][ T7369] device hsr_slave_0 entered promiscuous mode [ 129.298621][ T7369] device hsr_slave_1 entered promiscuous mode [ 129.348139][ T7369] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 129.355816][ T7369] Cannot create hsr debugfs directory [ 129.425856][ T7185] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 129.437093][ T7185] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 129.450720][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 129.459769][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 129.471710][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 129.480781][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 129.490511][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 129.499649][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 129.509084][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 129.518573][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 129.526882][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 129.540153][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 129.548726][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 129.557965][ T7419] team0: Port device team_slave_0 added [ 129.589372][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 129.597023][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 129.614379][ T7419] team0: Port device team_slave_1 added [ 129.626073][ T7687] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.635086][ T7687] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.643629][ T7687] device bridge_slave_0 entered promiscuous mode [ 129.653471][ T7577] team0: Port device team_slave_0 added [ 129.663776][ T7185] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 129.702359][ T7687] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.710428][ T7687] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.721269][ T7687] device bridge_slave_1 entered promiscuous mode [ 129.730584][ T7577] team0: Port device team_slave_1 added [ 129.762015][ T7419] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 129.770104][ T7419] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.797182][ T7419] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 129.811236][ T7419] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 129.818652][ T7419] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.844910][ T7419] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 129.865079][ T7687] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 129.893975][ T7687] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 129.923986][ T7577] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 129.932644][ T7577] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 129.960332][ T7577] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 129.974532][ T7577] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 129.983765][ T7577] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 130.014497][ T7577] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 130.072785][ T7419] device hsr_slave_0 entered promiscuous mode [ 130.118989][ T7419] device hsr_slave_1 entered promiscuous mode [ 130.158052][ T7419] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 130.165659][ T7419] Cannot create hsr debugfs directory [ 130.173967][ T7687] team0: Port device team_slave_0 added [ 130.184054][ T7687] team0: Port device team_slave_1 added [ 130.202051][ T7687] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 130.209688][ T7687] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 130.237452][ T7687] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 130.284126][ T7687] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 130.292903][ T7687] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 130.321584][ T7687] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 130.403046][ T7577] device hsr_slave_0 entered promiscuous mode [ 130.448652][ T7577] device hsr_slave_1 entered promiscuous mode [ 130.508196][ T7577] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 130.515898][ T7577] Cannot create hsr debugfs directory [ 130.591427][ T7687] device hsr_slave_0 entered promiscuous mode [ 130.628830][ T7687] device hsr_slave_1 entered promiscuous mode [ 130.668126][ T7687] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 130.675801][ T7687] Cannot create hsr debugfs directory [ 130.701457][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 130.710364][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.744669][ T7305] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 130.870159][ T7305] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 130.924084][ T7369] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 130.972059][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 130.980263][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.989141][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.996937][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.014010][ T7185] device veth0_vlan entered promiscuous mode [ 131.025759][ T7305] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 131.080895][ T7305] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 131.155017][ T7369] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 131.204425][ T7369] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 131.258526][ T7369] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 131.341742][ T7185] device veth1_vlan entered promiscuous mode [ 131.411885][ T7419] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 131.450222][ T7419] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 131.490928][ T7419] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 131.550150][ T7419] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 131.656896][ T7185] device veth0_macvtap entered promiscuous mode [ 131.689901][ T7369] 8021q: adding VLAN 0 to HW filter on device bond0 [ 131.702851][ T7577] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 131.761420][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 131.771961][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.780935][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 131.794244][ T7185] device veth1_macvtap entered promiscuous mode [ 131.822306][ T7577] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 131.880764][ T7577] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 131.949867][ T7577] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 131.992590][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 132.003863][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.012833][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.025943][ T7369] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.064251][ T7185] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 132.086612][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 132.095633][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.104717][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.113876][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.122570][ T2977] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.129713][ T2977] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.138134][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.149506][ T7687] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 132.191042][ T7687] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 132.249935][ T7687] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 132.302518][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.314218][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.323216][ T2913] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.330366][ T2913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.340951][ T7185] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 132.349298][ T7687] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 132.413010][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 132.423012][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.445104][ T7305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.455307][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 132.484543][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 132.493831][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.503865][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.513097][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.529717][ T7419] 8021q: adding VLAN 0 to HW filter on device bond0 [ 132.555165][ T7305] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.611440][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.619865][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.638947][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 132.647580][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.736808][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.745614][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 132.755009][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.763851][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.772720][ T3203] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.779993][ T3203] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.787944][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.796619][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.807310][ T3203] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.814756][ T3203] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.823566][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.885910][ T7419] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.910748][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.920952][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 04:54:09 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) [ 132.936025][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.946090][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.964151][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 132.986769][ T7369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.053943][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.062938][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.074113][ T2687] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.081290][ T2687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.089454][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.098844][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.107155][ T2687] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.114363][ T2687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.122502][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 133.132317][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.141697][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 133.150619][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 133.160198][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.168993][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 04:54:09 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x7f, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000640)='keyring\x00', &(0x7f0000000680)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, r0) [ 133.232188][ T7369] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 133.243408][ T7577] 8021q: adding VLAN 0 to HW filter on device bond0 [ 133.251182][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.260901][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 133.278745][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 133.289385][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.305386][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.316104][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.326355][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.335114][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.343827][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.352857][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.361782][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.370868][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 133.379214][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 133.387490][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 133.405259][ T7419] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 133.418636][ T7419] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 133.448700][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.457277][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.468896][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.477282][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.487317][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 04:54:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$reject(0x13, 0x0, 0x0, 0x0, r0) r1 = socket(0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) poll(&(0x7f0000000040)=[{r1}, {}, {r1}, {r1}], 0x4, 0x4) syz_genetlink_get_family_id$nl80211(0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x112) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x209) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000240)=@keyring={'key_or_keyring:', 0x0, 0xa}) [ 133.495246][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.503756][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.516448][ T7305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.534152][ T7577] 8021q: adding VLAN 0 to HW filter on device team0 [ 133.587058][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 133.603748][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 133.624867][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 133.634099][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 133.658070][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.667353][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.677045][ T3204] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.684220][ T3204] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.693150][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.702197][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.711001][ T3204] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.718136][ T3204] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.726210][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 133.746051][ T7687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 133.775082][ T7419] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 133.780793][ T27] audit: type=1804 audit(1585284850.311:2): pid=8454 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir254138305/syzkaller.fM4sil/3/bus" dev="sda1" ino=15746 res=1 [ 133.790390][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.813161][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 133.822846][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.835673][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 133.844644][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 133.854952][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.874053][ T7369] device veth0_vlan entered promiscuous mode [ 133.887575][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.896428][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.906571][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 04:54:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$reject(0x13, 0x0, 0x0, 0x0, r0) r1 = socket(0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) poll(&(0x7f0000000040)=[{r1}, {}, {r1}, {r1}], 0x4, 0x4) syz_genetlink_get_family_id$nl80211(0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x112) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x209) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000240)=@keyring={'key_or_keyring:', 0x0, 0xa}) [ 133.919019][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.920614][ T27] audit: type=1804 audit(1585284850.451:3): pid=8454 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir254138305/syzkaller.fM4sil/3/bus" dev="sda1" ino=15746 res=1 [ 133.930007][ T7687] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.020820][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 134.038341][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 134.047329][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 134.071964][ T7305] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 134.097464][ T7369] device veth1_vlan entered promiscuous mode [ 134.111475][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 134.133993][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.135001][ T27] audit: type=1804 audit(1585284850.661:4): pid=8460 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir254138305/syzkaller.fM4sil/4/bus" dev="sda1" ino=15746 res=1 [ 134.152141][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.179116][ T3202] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.186219][ T3202] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.197684][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 134.206248][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 134.250238][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.262157][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.271477][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.286767][ T3201] bridge0: port 2(bridge_slave_1) entered blocking state 04:54:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$reject(0x13, 0x0, 0x0, 0x0, r0) r1 = socket(0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) poll(&(0x7f0000000040)=[{r1}, {}, {r1}, {r1}], 0x4, 0x4) syz_genetlink_get_family_id$nl80211(0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x112) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x209) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000240)=@keyring={'key_or_keyring:', 0x0, 0xa}) [ 134.293902][ T3201] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.313550][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 134.335901][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.355058][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 134.375986][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 134.386062][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 134.402442][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.412509][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 134.425539][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.427637][ C1] hrtimer: interrupt took 46548 ns [ 134.481304][ T27] audit: type=1804 audit(1585284851.011:5): pid=8472 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir254138305/syzkaller.fM4sil/5/bus" dev="sda1" ino=15746 res=1 [ 134.486054][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 134.494556][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 134.495117][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.495557][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 134.496235][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 134.496723][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 134.570397][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 134.579598][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 134.588385][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 04:54:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$reject(0x13, 0x0, 0x0, 0x0, r0) r1 = socket(0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) poll(&(0x7f0000000040)=[{r1}, {}, {r1}, {r1}], 0x4, 0x4) syz_genetlink_get_family_id$nl80211(0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x112) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x209) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000240)=@keyring={'key_or_keyring:', 0x0, 0xa}) [ 134.596694][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 134.607582][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.624552][ T7369] device veth0_macvtap entered promiscuous mode [ 134.646038][ T7687] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 134.664060][ T7687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 134.675864][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 134.689189][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 134.698264][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 134.706705][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.717100][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 134.726758][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.741220][ T7369] device veth1_macvtap entered promiscuous mode [ 134.761926][ T7419] device veth0_vlan entered promiscuous mode [ 134.779908][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 134.798258][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.809611][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.818545][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 134.826970][ T3202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.827165][ T27] audit: type=1804 audit(1585284851.351:6): pid=8474 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir254138305/syzkaller.fM4sil/6/bus" dev="sda1" ino=15746 res=1 [ 134.869600][ T7305] device veth0_vlan entered promiscuous mode [ 134.885574][ T7419] device veth1_vlan entered promiscuous mode [ 134.893545][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 134.903630][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.912123][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.921996][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 134.930783][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 134.939091][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 134.946539][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 134.962832][ T7687] 8021q: adding VLAN 0 to HW filter on device batadv0 04:54:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$reject(0x13, 0x0, 0x0, 0x0, r0) r1 = socket(0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) poll(&(0x7f0000000040)=[{r1}, {}, {r1}, {r1}], 0x4, 0x4) syz_genetlink_get_family_id$nl80211(0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x112) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x209) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000240)=@keyring={'key_or_keyring:', 0x0, 0xa}) [ 134.974811][ T7577] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 134.989650][ T7369] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.002034][ T7369] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.018117][ T7369] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 135.065906][ T7305] device veth1_vlan entered promiscuous mode [ 135.090735][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 135.108313][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 135.116567][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.140263][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.156010][ T7369] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.179192][ T7369] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.199376][ T7369] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 135.232834][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 135.241608][ T27] audit: type=1804 audit(1585284851.771:7): pid=8493 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir254138305/syzkaller.fM4sil/7/bus" dev="sda1" ino=15746 res=1 [ 135.244434][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.279477][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.290952][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 135.300068][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 135.313756][ T7419] device veth0_macvtap entered promiscuous mode [ 135.328196][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 135.353332][ T7305] device veth0_macvtap entered promiscuous mode [ 135.368738][ T7419] device veth1_macvtap entered promiscuous mode [ 135.411706][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 135.420722][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 135.435690][ T7305] device veth1_macvtap entered promiscuous mode [ 135.458772][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 135.467307][ T3201] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 135.501414][ T7419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.513089][ T7419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.524638][ T7419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.537226][ T7419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.550168][ T7419] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 135.692023][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 135.706810][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.725046][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.734983][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.750843][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 135.765706][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.790916][ T7419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.806375][ T7419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.831860][ T7419] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 135.843777][ T7419] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.856216][ T7419] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 135.885210][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.894440][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.908537][ T7305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.919475][ T7305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.929850][ T7305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.940371][ T7305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.950879][ T7305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 135.961896][ T7305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 135.973204][ T7305] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 135.991795][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 136.000721][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.010491][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 136.020114][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 136.032988][ T7687] device veth0_vlan entered promiscuous mode [ 136.090229][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.100722][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.108773][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 136.117007][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.126585][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.134761][ T2977] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.144301][ T7305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.155830][ T7305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.166227][ T7305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.177142][ T7305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.187099][ T7305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.197750][ T7305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.209552][ T7305] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 136.219250][ T7687] device veth1_vlan entered promiscuous mode [ 136.271783][ T7577] device veth0_vlan entered promiscuous mode [ 136.282001][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 136.290846][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 136.300240][ T3204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 136.435907][ T7577] device veth1_vlan entered promiscuous mode [ 136.490923][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 136.499513][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 136.514882][ T7687] device veth0_macvtap entered promiscuous mode [ 136.565075][ T7687] device veth1_macvtap entered promiscuous mode [ 136.598561][ T7687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 04:54:13 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000007c0)="4c00000052001f15b9d522849ac000000ae24ec88cbe55c5ac27a6c5b068afbf2cf223fcc4373a5ad94a461cdbfee9bdb9b64a74786e2a1358b9aa189dbb140a9b4a7d3569359b358451d1ec", 0x4c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 04:54:13 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local, @multicast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @broadcast}, {0x0, 0x0, 0xc, 0x0, @opaque="9bc764c8"}}}}}, 0x0) 04:54:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/248, 0xf8}], 0xf8) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000072000032eb00"}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100cbba00"/27, @ANYRES32=r1, @ANYBLOB="0880000000800000f2ff00000800010075333200c0010200bc01010004000200b40105510004d72000000807000000ff03ffffffffff02000000000000000000000000010000000000000001ffb810000000000080000080000000000407000000080000d000000040000000050400000020000000000000620000000007000000400000000000800100000000089f1abf5f01978b467790f81f8178070000009b55b91601000300000000000009ffff800009002f3de672922ca7287d55e227a85e000029000000085408b300fbffffff000000080001000007000000f8f600000000a243000080010400000000000000000000675b0d41d9af33380b545184138e54a0000000080800000000000000000001ff00200eb7070020007f000000800000000000007f01000000ff7f00000000000580000001010017fbbc930000fa000010000c00000004070000000000200000000809000008090020000000000700020fffc359000002000000000004000000000900000000000a0000000000060000081707000000ff03000000000007000001ff1200000002000000000000020002000401019910ec13000000e5000300000006000100000900000000000020000013037f000000ff7f00000000001022bd9d000000000000adf007117909895d0ffdc701d59f03d529d940ca2c02eaaa04a8e080b422265e02ae1817f396d57182598287b386ff8cdad692ef98b45b5f7d302a9c27a7e7e5501a583f3a35e2833cd7ed3c5ecae0148ee8e7b69342c9a20caee6d01df95a395d92aca5a9620062d353429dd782684ed3e695921980b1f20e4ad251e1e08156283a14deb206ed12cc3f684847d788b083d3321d7cbfa07b5e1b8e3fb37ec8c429e2cbbfec27a9660c7026588442f5f9f4557511ec050d7a43ed56192fdb1f50cf3f8d9f1b62f596024f8c496cb2f4ea1ff3cefe5bb7b229ec4b81b626f53eed9ffe419ccf45f6bd19857c8c40ad05c2a8924dd25aafec45476a69048dcef34bd9b4469db9edb9ae2e0394ae8747a18929b39c74c7043fea0a748d9320bfaed47cd1b0a82d48"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180), 0x1, 0x0, 0x0, 0x4000000}, 0x0) r4 = syz_open_pts(r0, 0x2002) dup3(r4, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) [ 136.609318][ T7687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.620646][ T7687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.633188][ T7687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.643975][ T7687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.668785][ T7687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.691635][ T7687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 136.717572][ T7687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.749162][ T7687] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 136.764813][ T7577] device veth0_macvtap entered promiscuous mode [ 136.795820][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 136.804775][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 136.821818][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 136.837357][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 136.864550][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 136.877889][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 136.889231][ T7687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.901394][ T7687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.913568][ T7687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.924487][ T7687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.937085][ T7687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.949514][ T7687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.959878][ T7687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 136.971182][ T7687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 136.983674][ T7687] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 136.994684][ T7577] device veth1_macvtap entered promiscuous mode [ 137.015182][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 137.023712][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 137.034418][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 137.044321][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 137.112772][ T7577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 137.132760][ T7577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.142721][ T7577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 137.158445][ T7577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.172638][ T7577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 137.184119][ T7577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.195063][ T7577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 137.205607][ T7577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.215690][ T7577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 137.226178][ T7577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.238009][ T7577] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 137.249258][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 137.258741][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 137.319843][ T7577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.331683][ T7577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.341944][ T7577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.354111][ T7577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.364396][ T7577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.375048][ T7577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.385581][ T7577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.396409][ T7577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.406461][ T7577] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 137.417088][ T7577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 137.429840][ T7577] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 137.450875][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 137.459562][ T2913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 04:54:14 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80085, 0x0) writev(r1, &(0x7f00000023c0), 0x10000000000003ff) 04:54:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.sched_load_balance\x00', 0x2, 0x0) writev(r4, &(0x7f0000000180)=[{&(0x7f0000000140)='0', 0x1}], 0x1) 04:54:14 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 04:54:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/248, 0xf8}], 0xf8) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000072000032eb00"}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100cbba00"/27, @ANYRES32=r1, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180), 0x1, 0x0, 0x0, 0x4000000}, 0x0) r4 = syz_open_pts(r0, 0x2002) dup3(r4, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 04:54:14 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 04:54:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80085, 0x0) writev(r1, &(0x7f00000023c0), 0x10000000000003ff) 04:54:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80085, 0x0) writev(r1, &(0x7f00000023c0), 0x10000000000003ff) 04:54:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80085, 0x0) writev(r1, &(0x7f00000023c0), 0x10000000000003ff) 04:54:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) 04:54:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/248, 0xf8}], 0xf8) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000072000032eb00"}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100cbba00"/27, @ANYRES32=r1, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180), 0x1, 0x0, 0x0, 0x4000000}, 0x0) r4 = syz_open_pts(r0, 0x2002) dup3(r4, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 04:54:14 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:14 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/248, 0xf8}], 0xf8) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, "000072000032eb00"}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100cbba00"/27, @ANYRES32=r1, @ANYBLOB="0880000000800000f2ff00000800010075333200c0010200bc01010004000200b40105510004d72000000807000000ff03ffffffffff02000000000000000000000000010000000000000001ffb810000000000080000080000000000407000000080000d000000040000000050400000020000000000000620000000007000000400000000000800100000000089f1abf5f01978b467790f81f8178070000009b55b91601000300000000000009ffff800009002f3de672922ca7287d55e227a85e000029000000085408b300fbffffff000000080001000007000000f8f600000000a243000080010400000000000000000000675b0d41d9af33380b545184138e54a0000000080800000000000000000001ff00200eb7070020007f000000800000000000007f01000000ff7f00000000000580000001010017fbbc930000fa000010000c00000004070000000000200000000809000008090020000000000700020fffc359000002000000000004000000000900000000000a0000000000060000081707000000ff03000000000007000001ff1200000002000000000000020002000401019910ec13000000e5000300000006000100000900000000000020000013037f000000ff7f00000000001022bd9d000000000000adf007117909895d0ffdc701d59f03d529d940ca2c02eaaa04a8e080b422265e02ae1817f396d57182598287b386ff8cdad692ef98b45b5f7d302a9c27a7e7e5501a583f3a35e2833cd7ed3c5ecae0148ee8e7b69342c9a20caee6d01df95a395d92aca5a9620062d353429dd782684ed3e695921980b1f20e4ad251e1e08156283a14deb206ed12cc3f684847d788b083d3321d7cbfa07b5e1b8e3fb37ec8c429e2cbbfec27a9660c7026588442f5f9f4557511ec050d7a43ed56192fdb1f50cf3f8d9f1b62f596024f8c496cb2f4ea1ff3cefe5bb7b229ec4b81b626f53eed9ffe419ccf45f6bd19857c8c40ad05c2a8924dd25aafec45476a69048dcef34bd9b4469db9edb9ae2e0394ae8747a18929b39c74c7043fea0a748d9320bfaed47cd1b0a82d48"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180), 0x1, 0x0, 0x0, 0x4000000}, 0x0) r4 = syz_open_pts(r0, 0x2002) dup3(r4, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 04:54:14 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x87e9b1a5bf03cec0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000004c0)=""/245) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000180)=0x48) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80085, 0x0) writev(r1, &(0x7f00000023c0), 0x10000000000003ff) 04:54:15 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000100)=0x2, 0x4) 04:54:15 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/tty/drivers\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000780)='\x00', 0x0) write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./control\x00', 0xa4000960) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 04:54:15 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f8000003001b003003000098020000000000000000000000000000000000009802000098020000980200009802000098f2ffff0200000000000000000020affd1fffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000e83000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000080000000000000000000000000000000000000000000000000000000000000000000000000000000080150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff000000000000000000000000030000000700000000000000000000000000000048004354"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:15 executing program 3: mmap(&(0x7f0000196000/0x4000)=nil, 0x4000, 0x0, 0x34032, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x400000000019604, 0x0) 04:54:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000240)={0x10, 0xf50c}, 0xb2, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xfdc4}}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x6, 0x0, 0x0, 0x2}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 04:54:15 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:15 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/tty/drivers\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000780)='\x00', 0x0) write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./control\x00', 0xa4000960) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 04:54:15 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:54:15 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x400000000019604, 0x0) 04:54:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000700)=@newtfilter={0x444, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x40c, 0x2, [@TCA_CGROUP_POLICE={0x408, 0x2, [@TCA_POLICE_PEAKRATE={0x404}]}]}}, @TCA_RATE={0x6}]}, 0x444}}, 0x0) 04:54:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000700)=@newtfilter={0x9c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x64, 0x2, [@TCA_CGROUP_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c, 0x1, {0x81}}]}, @TCA_CGROUP_ACT={0x20, 0x1, [@m_tunnel_key={0x1c, 0x0, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x4}, {0x4}}}]}]}}, @TCA_RATE={0x6}]}, 0x9c}}, 0x0) 04:54:15 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newtfilter={0x44, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x14, 0x2, [@TCA_CGROUP_EMATCHES={0x10, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_LIST={0x4}]}]}}]}, 0x44}}, 0x0) 04:54:15 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x5000000}, 0x0) [ 139.227549][ T8659] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 139.253219][ T8661] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 04:54:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x328, 0x178, 0x178, 0xc, 0x0, 0x178, 0x258, 0x258, 0x258, 0x258, 0x258, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x138, 0x178, 0x0, {}, [@common=@unspec=@quota={{0x38, 'quota\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x388) 04:54:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 04:54:16 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x8ec8, 0x0) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "00000100000000000800449420eba71a4976e252922cb18f6e2e2aba000100012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b080000000049740000000000000025ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000002e001903a070c9a86b9e05e11ed02804", @ANYRES32=r4], 0x2}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 04:54:16 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/535], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/1014], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8, 0x5000000}, 0x0) [ 139.707314][ T8675] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 139.730794][ T8680] Cannot find add_set index 0 as target [ 139.738190][ T8674] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 04:54:16 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') [ 139.780592][ T8674] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 04:54:16 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000002004000000000000800200000000000000000000800000005003000050030000500300005003000050030000030000000000000000000000fe800000c000000000000000000000bbff020000400000000000000000000001000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f626f6e640000006e657470636930000000000000000000000000d40400000000000000000000000000000000000000001d000000000000000000000000000000000000500280020000000001000000000000000000000000000000000000005001686173686c696d69740000000000000000000000000000000000000000027465616d5f736c6176655f310000000000000000000000000000000000000000000000008800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000f10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000fe18b61af10800000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a6b616c6c657231000000000000000000000000000004000000000000000000000005000000a60000000000000000000000000000003000434f4e4e4d41524b00000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000001840)=[{{&(0x7f0000000380)={0xa, 0x4e36, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x0) [ 139.838911][ T8688] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 139.852305][ T8690] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 04:54:16 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x328, 0x178, 0x178, 0x0, 0x0, 0x178, 0x258, 0x258, 0x258, 0x258, 0x258, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x138, 0x178, 0x0, {}, [@common=@unspec=@quota={{0x38, 'quota\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x8000000, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x388) [ 139.881403][ T8690] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 139.903874][ T8692] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 04:54:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/535], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 139.942554][ T8695] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 139.951599][ T8696] xt_hashlimit: max too large, truncated to 1048576 [ 139.996218][ T8696] Cannot find add_set index 0 as target 04:54:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r1, 0x0, 0x3, &(0x7f0000000140)=0x7ff, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) splice(r2, 0x0, r0, 0x0, 0x10006, 0x0) 04:54:16 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000008060108000000005a6ad3400000000005000100070000002587186e0948d5037402d763c39e702a125e39ce4acdcc2a71bd6b8d53fbf468d5a2eb53140757b38458a03659afd5c73a135d5db34c6d05d6ed2df4b5fc4ac1f7bc16cfa9a0a4440482ffcc7787e460414d1c4375b3d3a57c40a34dc24b348669e0ceda1015aa15b1998bcb6f5f7a33f96711314a90c52a7d3c81ab732eb03aa037e650e2b219d786a417bcd792856f14adfadd33000000d483b446403f450af75b434edd696119da44b50fe8529d85085ce9ea4daaf2d02e9bca7e5a575507000000e2b6210600e781ece6d20e073a73f8721a76241dfcecbbd920386c31408b86cc1a824d9436b456f6c682d1829b3b655668b400000000000000fd3574c71a21660e77ff696fcb7c9e4ff2e1d9d1b4117a300487e78aa8c9d4500789f26a5f10a31c70d9fa7b4265df8de358477c7b944c55e89463180abcb23f679c02686e012022c6e43a9d9f5aafc6b000000000f5e42fe836941fbadef7a2510e1ca726ca317b2a20f43322a8b6088270fa0ccbf0c7623d15decb8aa85860801493f7ed8a2422443106163a8506f8cc1b6145445aa262fc74d8f4cac0b5fc99f9104cb2591a8f2262e93aa6cd0df80dcfef006304613b0952f80fd10dd670b61ffb13e9b17ac05c47964905000000d490230c0da0e85afab07a5379dcef1e7461fb6281b8c63806aeeeac55aca4b2ddf398259a48338141b0c9662030ce08c30d0379be0658348291ad313c0106b78ad666c8cef6beda16a722aed5cf28606679bdee38988870252308aa7a879eecf3fff09c76cbe643fdc38d5c6a85b9eef5dbb8cfc1123ee55494d8de56bb63c97ff477deb00c0b99fec083730b07a7eda5e64068205da08dc41b2dfa825ae9351875270668a83a0d416d79ca1192539143a2f4eb5473a64c9fe665e5bfae5165472a1a742ad9557d092373450000010000000000d12f46a6fca918128ecfb15691d7de7beef087a27485d512ac817570c22435a2935320bf5dcd48aacb6fa31b0f6ab21c2e3c748911fce9a6427b90328ce3a5c6c45e9449297a1369b15a3f4e00"/789], 0x1c}}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 140.051232][ T8704] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 04:54:16 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') [ 140.099482][ T8704] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 04:54:17 executing program 4: 04:54:17 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@raw={'raw\x00', 0x3c1, 0x3, 0x478, 0x2b8, 0x2b8, 0x0, 0x0, 0x0, 0x3a8, 0x3a8, 0x3a8, 0x3a8, 0x3a8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x298, 0x2b8, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x1, 0x0, 'syz1\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d8) 04:54:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="8c0000000001ff060000000000000000000000003c0001002c000100358003008000000000000000000000000000000114000400fe8000010000000000000000000000bb0c00020005000100000000002400028c0c00020005000100006e000014000100080001000200000008000200e00000010800070000000000080015000000000008000800000000008feeac1ae24e0df68e3e601860fa32e32c822e02d52129d57006005e462a590af57582db8f47296092e5610868add595836b804ff9acacde4ca9a87202451cfc461dbcd4a399389758e16069a4eeeb98a781a90045738f87648adeb9e428262ac8d6998b3bc126ae1f56ef2305a907692d1622e8b1869396d3f7e3601d02000000000000546f07fcc0eacf06af6effb4d11333b28ffbac442b1075734fc60ff978609033aeca5a1b0261f4a9297a93ee88b36d72b47b200000000000000000ae0392c4e621a77316d89b4c7c8f3e07385bd150682e5eac017b2e4f30caf3fe0edaff78dc886f7d89639bdfd2f4b5dd4aa183509c2a4629af2185f432850f4378ee3d7a3cac7a382e85a1fde2717cdf1641a6dbc2165e44d3b7c4b772464c657e80d6b05715314bca6d62f3e3de1723d17696220c17758ddb0000000500000000007af2643a9bf609de061fe3018a2ebe40f25a5ed0a94dbb64be596805a029b77b496beb8059c06aeda6321fe54a051f4eb95c6129ddcf6b4fd573a22c8900"/535], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newtfilter={0x40, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x10, 0x2, [@TCA_CGROUP_EMATCHES={0xc, 0x7, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x40}}, 0x0) 04:54:17 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:17 executing program 2: 04:54:17 executing program 3: 04:54:17 executing program 4: 04:54:17 executing program 2: 04:54:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="8c0000000001ff060000000000000000000000003c0001002c000100358003008000000000000000000000000000000114000400fe8000010000000000000000000000bb0c00020005000100000000002400028c0c00020005000100006e000014000100080001000200000008000200e00000010800070000000000080015000000000008000800000000008feeac1ae24e0df68e3e601860fa32e32c822e02d52129d57006005e462a590af57582db8f47296092e5610868add595836b804ff9acacde4ca9a87202451cfc461dbcd4a399389758e16069a4eeeb98a781a90045738f87648adeb9e428262ac8d6998b3bc126ae1f56ef2305a907692d1622e8b1869396d3f7e3601d02000000000000546f07fcc0eacf06af6effb4d11333b28ffbac442b1075734fc60ff978609033aeca5a1b0261f4a9297a93ee88b36d72b47b200000000000000000ae0392c4e621a77316d89b4c7c8f3e07385bd150682e5eac017b2e4f30caf3fe0edaff78dc886f7d89639bdfd2f4b5dd4aa183509c2a4629af2185f432850f4378ee3d7a3cac7a382e85a1fde2717cdf1641a6dbc2165e44d3b7c4b772464c657e80d6b05715314bca6d62f3e3de1723d17696220c17758ddb0000000500000000007af2643a9bf609de061fe3018a2ebe40f25a5ed0a94dbb64be596805a029b77b496beb8059c06aeda6321fe54a051f4eb95c6129ddcf6b4fd573a22c8900"/535], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:17 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:17 executing program 3: 04:54:17 executing program 0: 04:54:17 executing program 2: 04:54:17 executing program 4: 04:54:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:17 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:17 executing program 0: 04:54:17 executing program 3: 04:54:17 executing program 4: 04:54:17 executing program 2: 04:54:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:17 executing program 0: 04:54:17 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f8000003001b003003000098020000000000000000000000000000000000009802000098020000980200009802000098f2ffff0200000000000000000020affd1fffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000e83000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000080000000000000000000000000000000000000000000000000000000000000000000000000000000080150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff000000000000000000000000030000000700000000000000000000000000000048004354"], 0x1) memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:17 executing program 2: 04:54:17 executing program 4: 04:54:17 executing program 0: 04:54:17 executing program 3: 04:54:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:17 executing program 4: 04:54:17 executing program 0: 04:54:17 executing program 2: 04:54:17 executing program 3: 04:54:17 executing program 2: 04:54:17 executing program 4: 04:54:17 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:17 executing program 0: 04:54:17 executing program 3: 04:54:17 executing program 1: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/535], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:17 executing program 4: 04:54:17 executing program 0: 04:54:17 executing program 2: 04:54:17 executing program 0: 04:54:17 executing program 1: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/535], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:17 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:17 executing program 3: 04:54:17 executing program 2: 04:54:18 executing program 0: 04:54:18 executing program 4: 04:54:18 executing program 1: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/535], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:18 executing program 3: 04:54:18 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f8000003001b003003000098020000000000000000000000000000000000009802000098020000980200009802000098f2ffff0200000000000000000020affd1fffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000e83000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000080000000000000000000000000000000000000000000000000000000000000000000000000000000080150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff000000000000000000000000030000000700000000000000000000000000000048004354"], 0x1) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:18 executing program 2: 04:54:18 executing program 0: 04:54:18 executing program 4: 04:54:18 executing program 3: 04:54:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:18 executing program 2: 04:54:18 executing program 0: 04:54:18 executing program 4: 04:54:18 executing program 3: 04:54:18 executing program 2: 04:54:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:18 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f8000003001b003003000098020000000000000000000000000000000000009802000098020000980200009802000098f2ffff0200000000000000000020affd1fffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000e83000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000080000000000000000000000000000000000000000000000000000000000000000000000000000000080150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff000000000000000000000000030000000700000000000000000000000000000048004354"], 0x1) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:18 executing program 4: 04:54:18 executing program 3: 04:54:18 executing program 0: 04:54:18 executing program 2: 04:54:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:18 executing program 3: 04:54:18 executing program 0: 04:54:18 executing program 4: 04:54:18 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r0, 0x0, r1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:18 executing program 2: 04:54:18 executing program 0: 04:54:18 executing program 3: 04:54:18 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r0, 0x0, r1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:18 executing program 4: 04:54:18 executing program 2: 04:54:18 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r0, 0x0, r1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:18 executing program 0: 04:54:18 executing program 3: 04:54:18 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r0 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:18 executing program 4: 04:54:18 executing program 2: 04:54:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:18 executing program 0: 04:54:18 executing program 3: 04:54:18 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f8000003001b003003000098020000000000000000000000000000000000009802000098020000980200009802000098f2ffff0200000000000000000020affd1fffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000e83000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000080000000000000000000000000000000000000000000000000000000000000000000000000000000080150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff000000000000000000000000030000000700000000000000000000000000000048004354"], 0x1) r0 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:18 executing program 4: 04:54:18 executing program 2: 04:54:18 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r0 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:18 executing program 0: 04:54:18 executing program 3: 04:54:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:18 executing program 0: 04:54:18 executing program 4: 04:54:18 executing program 2: 04:54:19 executing program 3: 04:54:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:19 executing program 2: 04:54:19 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:19 executing program 4: 04:54:19 executing program 0: 04:54:19 executing program 3: 04:54:19 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:19 executing program 2: 04:54:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:19 executing program 4: 04:54:19 executing program 3: 04:54:19 executing program 0: 04:54:19 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f8000003001b003003000098020000000000000000000000000000000000009802000098020000980200009802000098f2ffff0200000000000000000020affd1fffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000e83000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000080000000000000000000000000000000000000000000000000000000000000000000000000000000080150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff000000000000000000000000030000000700000000000000000000000000000048004354"], 0x1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:19 executing program 2: 04:54:19 executing program 4: 04:54:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:19 executing program 3: 04:54:19 executing program 2: 04:54:19 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:19 executing program 0: 04:54:19 executing program 4: 04:54:19 executing program 3: 04:54:19 executing program 2: 04:54:19 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f8000003001b003003000098020000000000000000000000000000000000009802000098020000980200009802000098f2ffff0200000000000000000020affd1fffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000e83000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000080000000000000000000000000000000000000000000000000000000000000000000000000000000080150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff000000000000000000000000030000000700000000000000000000000000000048004354"], 0x1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:19 executing program 4: 04:54:19 executing program 0: 04:54:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[]}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:19 executing program 3: 04:54:19 executing program 3: 04:54:19 executing program 2: 04:54:19 executing program 0: 04:54:19 executing program 4: 04:54:19 executing program 2: 04:54:19 executing program 3: 04:54:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[]}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:19 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:19 executing program 4: 04:54:19 executing program 0: 04:54:19 executing program 2: 04:54:19 executing program 3: 04:54:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[]}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:19 executing program 3: 04:54:19 executing program 0: 04:54:19 executing program 2: 04:54:19 executing program 4: 04:54:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:20 executing program 3: 04:54:20 executing program 4: 04:54:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:20 executing program 2: 04:54:20 executing program 0: 04:54:20 executing program 3: 04:54:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:20 executing program 4: 04:54:20 executing program 2: 04:54:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:20 executing program 3: 04:54:20 executing program 0: 04:54:20 executing program 4: 04:54:20 executing program 2: 04:54:20 executing program 3: 04:54:20 executing program 0: 04:54:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:20 executing program 4: 04:54:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="8c0000000001ff060000000000000000000000003c0001002c000100358003008000000000000000000000000000000114000400fe8000010000000000000000000000bb0c00020005000100000000002400028c0c00020005000100006e000014000100080001000200000008000200e00000010800070000000000080015000000000008000800000000008feeac1ae24e0df68e3e601860fa32e32c822e02d52129d57006005e462a590af57582db8f47296092e5610868add595836b804ff9acacde4ca9a87202451cfc461dbcd4a399389758e16069a4eeeb98a781a90045738f87648adeb9e428262ac8d6998b3bc126ae1f56ef2305a907692d1622e8b1869396d3f7e3601d020000"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:20 executing program 0: 04:54:20 executing program 2: 04:54:20 executing program 3: 04:54:20 executing program 2: 04:54:20 executing program 0: 04:54:20 executing program 4: 04:54:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="8c0000000001ff060000000000000000000000003c0001002c000100358003008000000000000000000000000000000114000400fe8000010000000000000000000000bb0c00020005000100000000002400028c0c00020005000100006e000014000100080001000200000008000200e00000010800070000000000080015000000000008000800000000008feeac1ae24e0df68e3e601860fa32e32c822e02d52129d57006005e462a590af57582db8f47296092e5610868add595836b804ff9acacde4ca9a87202451cfc461dbcd4a399389758e16069a4eeeb98a781a90045738f87648adeb9e428262ac8d6998b3bc126ae1f56ef2305a907692d1622e8b1869396d3f7e3601d020000"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:20 executing program 3: 04:54:20 executing program 2: 04:54:20 executing program 4: 04:54:20 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:20 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$nl_rdma(0x10, 0x3, 0x14) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:20 executing program 3: 04:54:20 executing program 3: 04:54:20 executing program 2: 04:54:20 executing program 4: 04:54:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:20 executing program 2: 04:54:20 executing program 3: 04:54:20 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$nl_rdma(0x10, 0x3, 0x14) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:20 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:20 executing program 2: 04:54:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:21 executing program 4: 04:54:21 executing program 2: 04:54:21 executing program 3: 04:54:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:21 executing program 4: 04:54:21 executing program 2: 04:54:21 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$nl_rdma(0x10, 0x3, 0x14) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:21 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:21 executing program 3: 04:54:21 executing program 4: 04:54:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:21 executing program 2: 04:54:21 executing program 3: 04:54:21 executing program 4: 04:54:21 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:21 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$nl_rdma(0x10, 0x3, 0x14) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:21 executing program 2: 04:54:21 executing program 4: 04:54:21 executing program 3: 04:54:21 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f8000003001b003003000098020000000000000000000000000000000000009802000098020000980200009802000098f2ffff0200000000000000000020affd1fffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000e83000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000080000000000000000000000000000000000000000000000000000000000000000000000000000000080150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff000000000000000000000000030000000700000000000000000000000000000048004354"], 0x1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:21 executing program 2: 04:54:21 executing program 3: 04:54:21 executing program 4: 04:54:21 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$nl_rdma(0x10, 0x3, 0x14) dup2(r4, r3) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:21 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:21 executing program 4: 04:54:21 executing program 3: 04:54:21 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:21 executing program 2: 04:54:21 executing program 4: 04:54:21 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:21 executing program 3: 04:54:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:21 executing program 2: 04:54:21 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$nl_rdma(0x10, 0x3, 0x14) dup2(r4, r3) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:21 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f8000003001b003003000098020000000000000000000000000000000000009802000098020000980200009802000098f2ffff0200000000000000000020affd1fffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000e83000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000080000000000000000000000000000000000000000000000000000000000000000000000000000000080150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff000000000000000000000000030000000700000000000000000000000000000048004354"], 0x1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:21 executing program 4: 04:54:21 executing program 3: 04:54:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:21 executing program 2: 04:54:21 executing program 4: 04:54:22 executing program 3: 04:54:22 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f8000003001b003003000098020000000000000000000000000000000000009802000098020000980200009802000098f2ffff0200000000000000000020affd1fffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000e83000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000080000000000000000000000000000000000000000000000000000000000000000000000000000000080150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff000000000000000000000000030000000700000000000000000000000000000048004354"], 0x1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:22 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$nl_rdma(0x10, 0x3, 0x14) dup2(r4, r3) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:22 executing program 2: 04:54:22 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) preadv(r0, 0x0, 0x0, 0xdf4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x65ad) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r2, &(0x7f0000000080), 0x0) mkdir(0x0, 0x0) sendto$inet(r1, &(0x7f0000000100)="8c", 0x1, 0xc0d0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x4}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) recvmmsg(r1, &(0x7f0000002e40)=[{{0x0, 0x3a341, 0x0}}], 0x500, 0x0, 0x0) 04:54:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x7b) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_buf(r0, 0x29, 0x22, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 04:54:22 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r2 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:22 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x300}, 0x9c) 04:54:22 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:22 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) socket$inet6(0xa, 0x2, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:22 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x300}, 0x9c) 04:54:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:22 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:22 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/locks\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) modify_ldt$write2(0x11, 0x0, 0x0) 04:54:22 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) socket$inet6(0xa, 0x2, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) preadv(r0, 0x0, 0x0, 0xdf4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x65ad) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r2, &(0x7f0000000080), 0x0) mkdir(0x0, 0x0) sendto$inet(r1, &(0x7f0000000100)="8c", 0x1, 0xc0d0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x4}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) recvmmsg(r1, &(0x7f0000002e40)=[{{0x0, 0x3a341, 0x0}}], 0x500, 0x0, 0x0) 04:54:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x108, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0xf4, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}]}]}, 0x108}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x40) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe4000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000080)=0x4) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:54:22 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:22 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0xc, 0x2, [@TCA_TCINDEX_HASH={0x8}]}}]}, 0x3c}}, 0x0) 04:54:22 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[], 0x0) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:22 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) socket$inet6(0xa, 0x2, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:22 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[], 0x0) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) [ 146.111928][ T9170] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 04:54:22 executing program 3: 04:54:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:22 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[], 0x0) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) preadv(r0, 0x0, 0x0, 0xdf4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x65ad) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r2, &(0x7f0000000080), 0x0) mkdir(0x0, 0x0) sendto$inet(r1, &(0x7f0000000100)="8c", 0x1, 0xc0d0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x4}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) recvmmsg(r1, &(0x7f0000002e40)=[{{0x0, 0x3a341, 0x0}}], 0x500, 0x0, 0x0) 04:54:22 executing program 3: 04:54:22 executing program 2: 04:54:22 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:22 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="8c0000000001ff060000000000000000000000003c0001002c000100358003008000000000000000000000000000000114000400fe8000010000000000000000000000bb0c00020005000100000000002400028c0c00020005000100006e000014000100080001000200000008000200e00000010800070000000000080015000000000008000800000000008feeac1ae24e0df68e3e601860fa32e32c822e02d52129d57006005e462a590af57582db8f47296092e5610868add595836b804ff9acacde4ca9a87202451cfc461dbcd4a399389758e16069a4eeeb98a781a90045738f87648adeb9e428262ac8d6998b3bc126ae1f56ef2305a907692d1622e8b1869396d3f7e3601d02000000000000546f07fcc0eacf06af6effb4d11333b28ffbac442b1075734fc60ff978609033aeca5a1b0261f4a9297a93ee88b36d72b47b200000000000000000ae0392c4e621a77316d89b4c7c8f3e07385bd150682e5eac017b2e4f30caf3fe0edaff78dc886f7d89639bdfd2f4b5dd4aa183509c2a4629af2185f432850f4378ee3d7a3cac7a382e85a1fde2717cdf1641a6dbc2165e44d3b7c4b772464c657e80d6b05715314bca6d62f3e3de1723d17696220c17758ddb0000000500000000007af2643a9bf609de061fe3018a2ebe40f25a5ed0a94dbb64be596805a029b77b496beb8059c06aeda6321fe54a051f4eb95c6129ddcf6b4fd573a22c89000000000000000000"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:23 executing program 3: 04:54:23 executing program 2: 04:54:23 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:23 executing program 2: 04:54:23 executing program 3: 04:54:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) preadv(r0, 0x0, 0x0, 0xdf4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x65ad) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r2, &(0x7f0000000080), 0x0) mkdir(0x0, 0x0) sendto$inet(r1, &(0x7f0000000100)="8c", 0x1, 0xc0d0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x4}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) recvmmsg(r1, &(0x7f0000002e40)=[{{0x0, 0x3a341, 0x0}}], 0x500, 0x0, 0x0) 04:54:23 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:23 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/533], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:23 executing program 2: 04:54:23 executing program 3: 04:54:23 executing program 3: 04:54:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="8c0000000001ff060000000000000000000000003c0001002c000100358003008000000000000000000000000000000114000400fe8000010000000000000000000000bb0c00020005000100000000002400028c0c00020005000100006e000014000100080001000200000008000200e00000010800070000000000080015000000000008000800000000008feeac1ae24e0df68e3e601860fa32e32c822e02d52129d57006005e462a590af57582db8f47296092e5610868add595836b804ff9acacde4ca9a87202451cfc461dbcd4a399389758e16069a4eeeb98a781a90045738f87648adeb9e428262ac8d6998b3bc126ae1f56ef2305a907692d1622e8b1869396d3f7e3601d02000000000000546f07fcc0eacf06af6effb4d11333b28ffbac442b1075734fc60ff978609033aeca5a1b0261f4a9297a93ee88b36d72b47b200000000000000000ae0392c4e621a77316d89b4c7c8f3e07385bd150682e5eac017b2e4f30caf3fe0edaff78dc886f7d89639bdfd2f4b5dd4aa183509c2a4629af2185f432850f4378ee3d7a3cac7a382e85a1fde2717cdf1641a6dbc2165e44d3b7c4b772464c657e80d6b05715314bca6d62f3e3de1723d17696220c17758ddb0000000500000000007af2643a9bf609de061fe3018a2ebe40f25a5ed0a94dbb64be596805a029b77b496beb8059c06aeda6321fe54a051f4eb95c6129ddcf6b4fd573a22c8900"/533], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:23 executing program 2: 04:54:23 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:23 executing program 3: 04:54:23 executing program 2: 04:54:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) preadv(r0, 0x0, 0x0, 0xdf4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x65ad) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r2, &(0x7f0000000080), 0x0) mkdir(0x0, 0x0) sendto$inet(r1, &(0x7f0000000100)="8c", 0x1, 0xc0d0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x4}, 0x40) recvmmsg(r1, &(0x7f0000002e40)=[{{0x0, 0x3a341, 0x0}}], 0x500, 0x0, 0x0) 04:54:23 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="8c0000000001ff060000000000000000000000003c0001002c000100358003008000000000000000000000000000000114000400fe8000010000000000000000000000bb0c00020005000100000000002400028c0c00020005000100006e000014000100080001000200000008000200e00000010800070000000000080015000000000008000800000000008feeac1ae24e0df68e3e601860fa32e32c822e02d52129d57006005e462a590af57582db8f47296092e5610868add595836b804ff9acacde4ca9a87202451cfc461dbcd4a399389758e16069a4eeeb98a781a90045738f87648adeb9e428262ac8d6998b3bc126ae1f56ef2305a907692d1622e8b1869396d3f7e3601d02000000000000546f07fcc0eacf06af6effb4d11333b28ffbac442b1075734fc60ff978609033aeca5a1b0261f4a9297a93ee88b36d72b47b200000000000000000ae0392c4e621a77316d89b4c7c8f3e07385bd150682e5eac017b2e4f30caf3fe0edaff78dc886f7d89639bdfd2f4b5dd4aa183509c2a4629af2185f432850f4378ee3d7a3cac7a382e85a1fde2717cdf1641a6dbc2165e44d3b7c4b772464c657e80d6b05715314bca6d62f3e3de1723d17696220c17758ddb0000000500000000007af2643a9bf609de061fe3018a2ebe40f25a5ed0a94dbb64be596805a029b77b496beb8059c06aeda6321fe54a051f4eb95c6129ddcf6b4fd573a22c8900"/533], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:23 executing program 3: 04:54:23 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:23 executing program 2: 04:54:23 executing program 2: 04:54:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/534], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:23 executing program 3: 04:54:23 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:23 executing program 3: 04:54:23 executing program 2: 04:54:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) preadv(r0, 0x0, 0x0, 0xdf4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x65ad) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r2, &(0x7f0000000080), 0x0) mkdir(0x0, 0x0) sendto$inet(r1, &(0x7f0000000100)="8c", 0x1, 0xc0d0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x4}, 0x40) recvmmsg(r1, &(0x7f0000002e40)=[{{0x0, 0x3a341, 0x0}}], 0x500, 0x0, 0x0) 04:54:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/534], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:24 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = dup2(r3, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:24 executing program 3: 04:54:24 executing program 2: 04:54:24 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/409], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:24 executing program 2: 04:54:24 executing program 3: 04:54:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="8c0000000001ff060000000000000000000000003c0001002c000100358003008000000000000000000000000000000114000400fe8000010000000000000000000000bb0c00020005000100000000002400028c0c00020005000100006e000014000100080001000200000008000200e00000010800070000000000080015000000000008000800000000008feeac1ae24e0df68e3e601860fa32e32c822e02d52129d57006005e462a590af57582db8f47296092e5610868add595836b804ff9acacde4ca9a87202451cfc461dbcd4a399389758e16069a4eeeb98a781a90045738f87648adeb9e428262ac8d6998b3bc126ae1f56ef2305a907692d1622e8b1869396d3f7e3601d02000000000000546f07fcc0eacf06af6effb4d11333b28ffbac442b1075734fc60ff978609033aeca5a1b0261f4a9297a93ee88b36d72b47b200000000000000000ae0392c4e621a77316d89b4c7c8f3e07385bd150682e5eac017b2e4f30caf3fe0edaff78dc886f7d89639bdfd2f4b5dd4aa183509c2a4629af2185f432850f4378ee3d7a3cac7a382e85a1fde2717cdf1641a6dbc2165e44d3b7c4b772464c657e80d6b05715314bca6d62f3e3de1723d17696220c17758ddb0000000500000000007af2643a9bf609de061fe3018a2ebe40f25a5ed0a94dbb64be596805a029b77b496beb8059c06aeda6321fe54a051f4eb95c6129ddcf6b4fd573a22c8900"/534], 0x1}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:24 executing program 2: 04:54:24 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/409], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:24 executing program 3: 04:54:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) preadv(r0, 0x0, 0x0, 0xdf4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x65ad) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r2, &(0x7f0000000080), 0x0) mkdir(0x0, 0x0) sendto$inet(r1, &(0x7f0000000100)="8c", 0x1, 0xc0d0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x4}, 0x40) recvmmsg(r1, &(0x7f0000002e40)=[{{0x0, 0x3a341, 0x0}}], 0x500, 0x0, 0x0) 04:54:24 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = dup2(r3, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:24 executing program 2: 04:54:24 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/535], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:24 executing program 3: 04:54:24 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/409], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:24 executing program 3: 04:54:24 executing program 2: 04:54:24 executing program 3: 04:54:24 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/535], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:24 executing program 2: 04:54:24 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = dup2(r3, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r2, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) preadv(r0, 0x0, 0x0, 0xdf4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x65ad) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r2, &(0x7f0000000080), 0x0) mkdir(0x0, 0x0) sendto$inet(r1, &(0x7f0000000100)="8c", 0x1, 0xc0d0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) recvmmsg(r1, &(0x7f0000002e40)=[{{0x0, 0x3a341, 0x0}}], 0x500, 0x0, 0x0) 04:54:24 executing program 3: 04:54:24 executing program 2: 04:54:24 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/477], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:24 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="8c0000000001ff060000000000000000000000003c0001002c000100358003008000000000000000000000000000000114000400fe8000010000000000000000000000bb0c00020005000100000000002400028c0c00020005000100006e000014000100080001000200000008000200e00000010800070000000000080015000000000008000800000000008feeac1ae24e0df68e3e601860fa32e32c822e02d52129d57006005e462a590af57582db8f47296092e5610868add595836b804ff9acacde4ca9a87202451cfc461dbcd4a399389758e16069a4eeeb98a781a90045738f87648adeb9e428262ac8d6998b3bc126ae1f56ef2305a907692d1622e8b1869396d3f7e3601d02000000000000546f07fcc0eacf06af6effb4d11333b28ffbac442b1075734fc60ff978609033aeca5a1b0261f4a9297a93ee88b36d72b47b200000000000000000ae0392c4e621a77316d89b4c7c8f3e07385bd150682e5eac017b2e4f30caf3fe0edaff78dc886f7d89639bdfd2f4b5dd4aa183509c2a4629af2185f432850f4378ee3d7a3cac7a382e85a1fde2717cdf1641a6dbc2165e44d3b7c4b772464c657e80d6b05715314bca6d62f3e3de1723d17696220c17758ddb0000000500000000007af2643a9bf609de061fe3018a2ebe40f25a5ed0a94dbb64be596805a029b77b496beb8059c06aeda6321fe54a051f4eb95c6129ddcf6b4fd573a22c8900"/535], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 04:54:24 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(0x0, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="8c0000000001ff060000000000000000000000003c0001002c000100358003008000000000000000000000000000000114000400fe8000010000000000000000000000bb0c00020005000100000000002400028c0c00020005000100006e000014000100080001000200000008000200e00000010800070000000000080015000000000008000800000000008feeac1ae24e0df68e3e601860fa32e32c822e02d52129d57006005e462a590af57582db8f47296092e5610868add595836b804ff9acacde4ca9a87202451cfc461dbcd4a399389758e16069a4eeeb98a781a90045738f87648adeb9e428262ac8d6998b3bc126ae1f56ef2305a907692d1622e8b1869396d3f7e3601d02000000000000546f07fcc0eacf06af6effb4d11333b28ffbac442b1075734fc60ff978609033aeca5a1b0261f4a9297a93ee88b36d72b47b200000000000000000ae0392c4e621a77316d89b4c7c8f3e07385bd150682e5eac017b2e4f30caf3fe0edaff78dc886f7d89639bdfd2f4b5dd4aa183509c2a4629af2185f432850f4378ee3d7a3cac7a382e85a1fde2717cdf1641a6dbc2165e44d3b7c4b772464c657e80d6b05715314bca6d62f3e3de1723d17696220c17758ddb0000000500000000007af2643a9bf609de061fe3018a2ebe40f25a5ed0a94dbb64be596805a029b77b496beb8059c06aeda6321fe54a051f4eb95c6129ddcf6b4fd573a22c8900"/535], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, 0x0, 0x0) 04:54:24 executing program 3: 04:54:24 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(0x0, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:24 executing program 3: 04:54:24 executing program 2: 04:54:24 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/477], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) preadv(r0, 0x0, 0x0, 0xdf4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x65ad) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r2, &(0x7f0000000080), 0x0) mkdir(0x0, 0x0) sendto$inet(r1, &(0x7f0000000100)="8c", 0x1, 0xc0d0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) recvmmsg(r1, &(0x7f0000002e40)=[{{0x0, 0x3a341, 0x0}}], 0x500, 0x0, 0x0) 04:54:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/535], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, 0x0, 0x0) 04:54:25 executing program 3: 04:54:25 executing program 2: 04:54:25 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(0x0, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:25 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/477], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/535], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, 0x0, 0x0) 04:54:25 executing program 2: 04:54:25 executing program 3: 04:54:25 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:25 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:25 executing program 2: 04:54:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) preadv(r0, 0x0, 0x0, 0xdf4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x65ad) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r2, &(0x7f0000000080), 0x0) mkdir(0x0, 0x0) sendto$inet(r1, &(0x7f0000000100)="8c", 0x1, 0xc0d0, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) recvmmsg(r1, &(0x7f0000002e40)=[{{0x0, 0x3a341, 0x0}}], 0x500, 0x0, 0x0) 04:54:25 executing program 3: 04:54:25 executing program 2: 04:54:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/535], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8}, 0x0) 04:54:25 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:25 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="8c0000000001ff060000000000000000000000003c0001002c000100358003008000000000000000000000000000000114000400fe8000010000000000000000000000bb0c00020005000100000000002400028c0c00020005000100006e000014000100080001000200000008000200e00000010800070000000000080015000000000008000800000000008feeac1ae24e0df68e3e601860fa32e32c822e02d52129d57006005e462a590af57582db8f47296092e5610868add595836b804ff9acacde4ca9a87202451cfc461dbcd4a399389758e16069a4eeeb98a781a90045738f87648adeb9e428262ac8d6998b3bc126ae1f56ef2305a907692d1622e8b1869396d3f7e3601d02000000000000546f07fcc0eacf06af6effb4d11333b28ffbac442b1075734fc60ff978609033aeca5a1b0261f4a9297a93ee88b36d72b47b200000000000000000ae0392c4e621a77316d89b4c7c8f3e07385bd150682e5eac017b2e4f30caf3fe0edaff78dc886f7d89639bdfd2f4b5dd4aa183509c2a4629af2185f432850f4378ee3d7a3cac7a382e85a1fde2717cdf1641a6dbc2165e44d3b7c4b772464c657e80d6b05715314bca6d62f3e3de1723d17696220c17758ddb0000000500000000007af2643a9bf609de061fe3018a2ebe40f25a5ed0a94dbb64be596805a029b77b496beb8059c06aeda6321fe54a051f4eb95c6129ddcf6b4fd573a22c8900"/535], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8}, 0x0) 04:54:25 executing program 3: 04:54:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/535], 0x8c}}, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8}, 0x0) 04:54:25 executing program 2: 04:54:25 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:25 executing program 1: 04:54:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) preadv(r0, 0x0, 0x0, 0xdf4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x65ad) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r2, &(0x7f0000000080), 0x0) mkdir(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x4}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) recvmmsg(r1, &(0x7f0000002e40)=[{{0x0, 0x3a341, 0x0}}], 0x500, 0x0, 0x0) 04:54:25 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:25 executing program 3: 04:54:25 executing program 2: 04:54:25 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:25 executing program 1: 04:54:25 executing program 3: 04:54:25 executing program 2: 04:54:25 executing program 1: 04:54:25 executing program 2: 04:54:25 executing program 1: 04:54:26 executing program 2: 04:54:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) preadv(r0, 0x0, 0x0, 0xdf4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x65ad) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r2, &(0x7f0000000080), 0x0) mkdir(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x4}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) recvmmsg(r1, &(0x7f0000002e40)=[{{0x0, 0x3a341, 0x0}}], 0x500, 0x0, 0x0) 04:54:26 executing program 3: 04:54:26 executing program 0: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:26 executing program 2: 04:54:26 executing program 1: 04:54:26 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:26 executing program 2: 04:54:26 executing program 1: 04:54:26 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000002c0)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x4, [{{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @rand_addr="72b1f34e0f76d63bf922d414be864dce"}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, {{0xa, 0x0, 0x1ff, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}]}, 0x290) 04:54:26 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x58, 0x0, 0x9, 0x301, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x24, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x5}}, @NFCTH_PRIV_DATA_LEN={0x8}]}, 0x58}}, 0x0) 04:54:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) preadv(r0, 0x0, 0x0, 0xdf4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x65ad) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r2, &(0x7f0000000080), 0x0) mkdir(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x4}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) recvmmsg(r1, &(0x7f0000002e40)=[{{0x0, 0x3a341, 0x0}}], 0x500, 0x0, 0x0) 04:54:26 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 04:54:27 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0xffffffff, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000002c0)={0x9}) 04:54:27 executing program 0: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000}]) [ 150.416785][ T9446] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 150.448186][ T9446] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 04:54:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) preadv(r0, 0x0, 0x0, 0xdf4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x65ad) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r2, &(0x7f0000000080), 0x0) sendto$inet(r1, &(0x7f0000000100)="8c", 0x1, 0xc0d0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x4}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) recvmmsg(r1, &(0x7f0000002e40)=[{{0x0, 0x3a341, 0x0}}], 0x500, 0x0, 0x0) [ 150.485491][ T9446] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 04:54:27 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f8000003001b003003000098020000000000000000000000000000000000009802000098020000980200009802000098f2ffff0200000000000000000020affd1fffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000e83000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000080000000000000000000000000000000000000000000000000000000000000000000000000000000080150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff000000000000000000000000030000000700"/537], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x2000011, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_coalesce={0xf}}) 04:54:27 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66731f66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 04:54:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x44, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x44}}, 0x0) 04:54:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) preadv(r0, 0x0, 0x0, 0xdf4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x65ad) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r2, &(0x7f0000000080), 0x0) sendto$inet(r1, &(0x7f0000000100)="8c", 0x1, 0xc0d0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x4}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) recvmmsg(r1, &(0x7f0000002e40)=[{{0x0, 0x3a341, 0x0}}], 0x500, 0x0, 0x0) 04:54:27 executing program 5: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/537], 0x1) r3 = memfd_create(&(0x7f0000000140)='/dev/auts\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='auxv\x00') 04:54:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000080)="0f20d80f22d8b9800000c00f3235008000000f30660f71f1a936f3a565f30fa6d00f0fefa0f420e035000020000f22e08fc8e0a3e462c4e1f950e60f01c4", 0x3e}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB], 0x5}}, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:54:27 executing program 0: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000}]) 04:54:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}, @IFLA_GENEVE_UDP_CSUM={0x5}]}}}]}, 0x44}}, 0x0) [ 150.853101][ T27] audit: type=1804 audit(1585284867.381:8): pid=9488 uid=0 auid=0 ses=4 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir313194324/syzkaller.LaEGvc/81/file0/file0" dev="loop3" ino=22 res=1 04:54:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) preadv(r0, 0x0, 0x0, 0xdf4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x65ad) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) write(r2, &(0x7f0000000080), 0x0) sendto$inet(r1, &(0x7f0000000100)="8c", 0x1, 0xc0d0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x4}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) recvmmsg(r1, &(0x7f0000002e40)=[{{0x0, 0x3a341, 0x0}}], 0x500, 0x0, 0x0) [ 150.923852][ T9490] kvm: emulating exchange as write [ 150.972020][ T9490] BUG: kernel NULL pointer dereference, address: 0000000000000086 [ 150.980318][ T9490] #PF: supervisor instruction fetch in kernel mode [ 150.986823][ T9490] #PF: error_code(0x0010) - not-present page [ 150.992787][ T9490] PGD 9e713067 P4D 9e713067 PUD 9e44a067 PMD 0 [ 150.999021][ T9490] Oops: 0010 [#1] PREEMPT SMP KASAN [ 151.004357][ T9490] CPU: 1 PID: 9490 Comm: syz-executor.1 Not tainted 5.6.0-rc7-syzkaller #0 [ 151.012956][ T9490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.023028][ T9490] RIP: 0010:0x86 [ 151.026580][ T9490] Code: Bad RIP value. [ 151.030625][ T9490] RSP: 0018:ffffc900018e7998 EFLAGS: 00010086 [ 151.036669][ T9490] RAX: ffffc900018e79c8 RBX: fffffe0000000000 RCX: 0000000000040000 [ 151.044621][ T9490] RDX: ffffc90004479000 RSI: 000000000001f8db RDI: 000000000001f8dc [ 151.052668][ T9490] RBP: 0000000000000ec0 R08: ffffffff8398c3c3 R09: ffffffff811c7eca [ 151.061586][ T9490] R10: ffff888048a86100 R11: 0000000000000002 R12: dffffc0000000000 [ 151.069546][ T9490] R13: fffffe0000000ec8 R14: ffffffff880016f0 R15: fffffe0000000ecb [ 151.077513][ T9490] FS: 00007f1ad7e11700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 151.086431][ T9490] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 151.093006][ T9490] CR2: 000000000000005c CR3: 000000009dd2f000 CR4: 00000000001426e0 [ 151.100958][ T9490] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 151.108911][ T9490] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 151.117736][ T9490] Call Trace: [ 151.121029][ T9490] ? handle_external_interrupt_irqoff+0x154/0x280 [ 151.127434][ T9490] ? handle_external_interrupt_irqoff+0x132/0x280 [ 151.133941][ T9490] ? __irqentry_text_start+0x8/0x8 [ 151.139043][ T9490] ? vcpu_enter_guest+0x6c77/0x9290 [ 151.144226][ T9490] ? kvm_arch_vcpu_load+0x53e/0x810 [ 151.149419][ T9490] ? finish_task_switch+0x2e2/0x550 [ 151.154602][ T9490] ? __lock_acquire+0xc5a/0x1bc0 [ 151.159527][ T9490] ? retint_kernel+0x2b/0x2b [ 151.164238][ T9490] ? lock_acquire+0x154/0x250 [ 151.168920][ T9490] ? rcu_lock_acquire+0x9/0x30 [ 151.173673][ T9490] ? kvm_check_async_pf_completion+0x34e/0x360 [ 151.179809][ T9490] ? vcpu_run+0x3a3/0xd50 [ 151.184130][ T9490] ? kvm_arch_vcpu_ioctl_run+0x419/0x880 [ 151.189740][ T9490] ? kvm_vcpu_ioctl+0x67c/0xa80 [ 151.194573][ T9490] ? kvm_vm_release+0x50/0x50 [ 151.199249][ T9490] ? __se_sys_ioctl+0xf9/0x160 [ 151.204006][ T9490] ? do_syscall_64+0xf3/0x1b0 [ 151.208688][ T9490] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 151.214749][ T9490] Modules linked in: [ 151.218629][ T9490] CR2: 0000000000000086 [ 151.222771][ T9490] ---[ end trace e93f610742cfed00 ]--- [ 151.228210][ T9490] RIP: 0010:0x86 [ 151.231742][ T9490] Code: Bad RIP value. [ 151.235791][ T9490] RSP: 0018:ffffc900018e7998 EFLAGS: 00010086 [ 151.241833][ T9490] RAX: ffffc900018e79c8 RBX: fffffe0000000000 RCX: 0000000000040000 [ 151.249921][ T9490] RDX: ffffc90004479000 RSI: 000000000001f8db RDI: 000000000001f8dc [ 151.257911][ T9490] RBP: 0000000000000ec0 R08: ffffffff8398c3c3 R09: ffffffff811c7eca [ 151.265879][ T9490] R10: ffff888048a86100 R11: 0000000000000002 R12: dffffc0000000000 [ 151.273844][ T9490] R13: fffffe0000000ec8 R14: ffffffff880016f0 R15: fffffe0000000ecb [ 151.281803][ T9490] FS: 00007f1ad7e11700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 151.290714][ T9490] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 151.297288][ T9490] CR2: 000000000000005c CR3: 000000009dd2f000 CR4: 00000000001426e0 [ 151.305267][ T9490] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 151.313225][ T9490] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 151.321584][ T9490] Kernel panic - not syncing: Fatal exception [ 151.329052][ T9490] Kernel Offset: disabled [ 151.333379][ T9490] Rebooting in 86400 seconds..