[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.205' (ECDSA) to the list of known hosts. 2021/01/10 20:41:41 fuzzer started 2021/01/10 20:41:42 dialing manager at 10.128.0.105:45295 2021/01/10 20:41:44 syscalls: 3465 2021/01/10 20:41:44 code coverage: enabled 2021/01/10 20:41:44 comparison tracing: enabled 2021/01/10 20:41:44 extra coverage: enabled 2021/01/10 20:41:44 setuid sandbox: enabled 2021/01/10 20:41:44 namespace sandbox: enabled 2021/01/10 20:41:44 Android sandbox: /sys/fs/selinux/policy does not exist 2021/01/10 20:41:44 fault injection: enabled 2021/01/10 20:41:44 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/01/10 20:41:44 net packet injection: enabled 2021/01/10 20:41:44 net device setup: enabled 2021/01/10 20:41:44 concurrency sanitizer: enabled 2021/01/10 20:41:44 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/01/10 20:41:44 USB emulation: enabled 2021/01/10 20:41:44 hci packet injection: enabled 2021/01/10 20:41:44 wifi device emulation: enabled 2021/01/10 20:41:44 fetching corpus: 0, signal 0/0 (executing program) 2021/01/10 20:41:44 fetching corpus: 0, signal 0/0 (executing program) 2021/01/10 20:41:46 starting 6 fuzzer processes 20:41:46 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_QUERY(r1, 0x0, 0x0) 20:41:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000700)=[{&(0x7f0000000140)=""/166, 0xa6}], 0x1) 20:41:46 executing program 2: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f00000000c0)=[{}], 0x20) 20:41:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000013002b"], 0x54}}, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 20:41:47 executing program 4: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000340)="8f7d6191", 0x4}]) 20:41:47 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) syzkaller login: [ 35.789296][ T8452] IPVS: ftp: loaded support on port[0] = 21 [ 35.866269][ T8452] chnl_net:caif_netlink_parms(): no params data found [ 35.893203][ T8452] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.900372][ T8452] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.907800][ T8452] device bridge_slave_0 entered promiscuous mode [ 35.921864][ T8452] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.929049][ T8452] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.943188][ T8452] device bridge_slave_1 entered promiscuous mode [ 35.955044][ T8456] IPVS: ftp: loaded support on port[0] = 21 [ 35.970150][ T8452] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.981729][ T8452] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.003666][ T8452] team0: Port device team_slave_0 added [ 36.012841][ T8452] team0: Port device team_slave_1 added [ 36.027635][ T8452] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.034614][ T8452] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.060674][ T8452] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.072262][ T8452] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.079203][ T8452] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.107337][ T8452] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.161434][ T8452] device hsr_slave_0 entered promiscuous mode [ 36.168040][ T8452] device hsr_slave_1 entered promiscuous mode [ 36.181416][ T8458] IPVS: ftp: loaded support on port[0] = 21 [ 36.196107][ T8456] chnl_net:caif_netlink_parms(): no params data found [ 36.274895][ T8456] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.281945][ T8456] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.290342][ T8456] device bridge_slave_0 entered promiscuous mode [ 36.300254][ T8452] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 36.322357][ T8452] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 36.333867][ T8456] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.341577][ T8456] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.349379][ T8456] device bridge_slave_1 entered promiscuous mode [ 36.358954][ T8460] IPVS: ftp: loaded support on port[0] = 21 [ 36.364383][ T8452] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 36.373947][ T8452] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 36.391473][ T8456] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.423507][ T8452] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.430621][ T8452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.437861][ T8452] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.444931][ T8452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.466393][ T8456] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.489569][ T8458] chnl_net:caif_netlink_parms(): no params data found [ 36.537294][ T8462] IPVS: ftp: loaded support on port[0] = 21 [ 36.539279][ T8464] IPVS: ftp: loaded support on port[0] = 21 [ 36.583489][ T8456] team0: Port device team_slave_0 added [ 36.591723][ T8456] team0: Port device team_slave_1 added [ 36.629018][ T8460] chnl_net:caif_netlink_parms(): no params data found [ 36.644436][ T8456] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.651416][ T8456] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.677358][ T8456] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.690742][ T8456] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.697917][ T8456] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.723948][ T8456] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.772209][ T8458] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.779563][ T8458] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.787141][ T8458] device bridge_slave_0 entered promiscuous mode [ 36.795474][ T8456] device hsr_slave_0 entered promiscuous mode [ 36.802739][ T8456] device hsr_slave_1 entered promiscuous mode [ 36.809406][ T8456] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 36.817084][ T8456] Cannot create hsr debugfs directory [ 36.835666][ T8458] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.842688][ T8458] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.850220][ T8458] device bridge_slave_1 entered promiscuous mode [ 36.865629][ T8458] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.878810][ T8460] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.887388][ T8460] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.894962][ T8460] device bridge_slave_0 entered promiscuous mode [ 36.903622][ T8460] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.910887][ T8460] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.918466][ T8460] device bridge_slave_1 entered promiscuous mode [ 36.933807][ T8452] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.941846][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.950274][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.958675][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 36.969249][ T8458] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.995935][ T8460] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.015751][ T8458] team0: Port device team_slave_0 added [ 37.022945][ T8458] team0: Port device team_slave_1 added [ 37.038505][ T8458] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.046855][ T8458] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.072838][ T8458] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.084869][ T8460] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.094323][ T8458] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.101352][ T8458] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.127747][ T8458] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.139292][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.147784][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.167126][ T8464] chnl_net:caif_netlink_parms(): no params data found [ 37.179494][ T8452] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.194681][ T8462] chnl_net:caif_netlink_parms(): no params data found [ 37.211386][ T8460] team0: Port device team_slave_0 added [ 37.227283][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 37.235727][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.243796][ T3164] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.250889][ T3164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.264548][ T8460] team0: Port device team_slave_1 added [ 37.286612][ T8458] device hsr_slave_0 entered promiscuous mode [ 37.293183][ T8458] device hsr_slave_1 entered promiscuous mode [ 37.299785][ T8458] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.307541][ T8458] Cannot create hsr debugfs directory [ 37.330617][ T8462] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.337730][ T8462] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.345193][ T8462] device bridge_slave_0 entered promiscuous mode [ 37.352089][ T8460] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.359064][ T8460] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.385200][ T8460] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.405391][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 37.414208][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.422450][ T8857] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.429464][ T8857] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.438460][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 37.447211][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 37.461796][ T8462] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.469018][ T8462] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.476724][ T8462] device bridge_slave_1 entered promiscuous mode [ 37.483375][ T8460] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.490425][ T8460] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.516721][ T8460] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.536511][ T8464] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.543538][ T8464] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.552427][ T8464] device bridge_slave_0 entered promiscuous mode [ 37.562546][ T8464] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.570532][ T8464] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.578025][ T8464] device bridge_slave_1 entered promiscuous mode [ 37.594265][ T8456] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 37.602912][ T8456] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 37.626419][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 37.634823][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 37.643186][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 37.653816][ T8464] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.664299][ T8462] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.673367][ T8456] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 37.689443][ T8460] device hsr_slave_0 entered promiscuous mode [ 37.695875][ T8460] device hsr_slave_1 entered promiscuous mode [ 37.702247][ T8460] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.709812][ T8460] Cannot create hsr debugfs directory [ 37.717451][ T8464] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.727325][ T8462] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.736606][ T8456] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 37.749573][ T3754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 37.759235][ T3754] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 37.768032][ T3754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.776589][ T3754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.801821][ T8458] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 37.812776][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 37.825726][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.837303][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 37.846037][ T8857] Bluetooth: hci0: command 0x0409 tx timeout [ 37.853076][ T8462] team0: Port device team_slave_0 added [ 37.860684][ T8462] team0: Port device team_slave_1 added [ 37.866409][ T8458] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.875243][ T8464] team0: Port device team_slave_0 added [ 37.880914][ T8458] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 37.891343][ T8458] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 37.910044][ T8462] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.917897][ T8462] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.943889][ T8462] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.955925][ T8464] team0: Port device team_slave_1 added [ 37.961859][ T8462] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.968895][ T8462] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.993769][ T5] Bluetooth: hci1: command 0x0409 tx timeout [ 37.996997][ T8462] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.059243][ T8462] device hsr_slave_0 entered promiscuous mode [ 38.065860][ T8462] device hsr_slave_1 entered promiscuous mode [ 38.072316][ T8462] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 38.080000][ T8462] Cannot create hsr debugfs directory [ 38.086159][ T8464] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 38.093090][ T8464] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.119554][ T8464] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 38.138529][ T8452] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.152648][ T8464] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.159721][ T8464] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.160080][ T3164] Bluetooth: hci2: command 0x0409 tx timeout [ 38.186208][ T8464] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.202993][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 38.210441][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 38.224370][ T8460] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 38.234639][ T8460] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 38.244649][ T8460] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 38.261803][ T8456] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.270959][ T8460] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 38.295642][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 38.306135][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.314057][ T9209] Bluetooth: hci3: command 0x0409 tx timeout [ 38.324392][ T8464] device hsr_slave_0 entered promiscuous mode [ 38.331476][ T8464] device hsr_slave_1 entered promiscuous mode [ 38.337936][ T8464] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 38.345692][ T8464] Cannot create hsr debugfs directory [ 38.380820][ T8452] device veth0_vlan entered promiscuous mode [ 38.391303][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.400454][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.408302][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 38.417628][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.426647][ T8456] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.449367][ T8458] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.456642][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.465935][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.473429][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 38.473785][ T5] Bluetooth: hci4: command 0x0409 tx timeout [ 38.481850][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.495770][ T3164] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.502782][ T3164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.510535][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 38.518951][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.527147][ T3164] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.534165][ T3164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.544220][ T8452] device veth1_vlan entered promiscuous mode [ 38.559653][ T8462] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 38.566479][ T9445] Bluetooth: hci5: command 0x0409 tx timeout [ 38.574825][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 38.582623][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 38.590954][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 38.605494][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 38.613380][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 38.623413][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 38.631687][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 38.651481][ T8462] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 38.660700][ T8462] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 38.674619][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 38.688200][ T8458] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.696725][ T8462] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 38.710820][ T8452] device veth0_macvtap entered promiscuous mode [ 38.718521][ T8464] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 38.730644][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.738332][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.746032][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 38.754264][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.762544][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 38.784582][ T8460] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.791448][ T8464] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 38.800803][ T8464] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 38.811757][ T8464] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 38.824233][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 38.832463][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 38.842020][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 38.850830][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.859817][ T3164] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.866900][ T3164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.876364][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 38.884524][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.892530][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 38.902456][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.910641][ T3164] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.917671][ T3164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.934115][ T8452] device veth1_macvtap entered promiscuous mode [ 38.942980][ T8456] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.953781][ T8456] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 38.966625][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 38.974486][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 38.982192][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.989992][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.998150][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 39.006382][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.014870][ T8460] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.031555][ T8452] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.041732][ T8452] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.054967][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 39.063203][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.071892][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 39.080556][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.089031][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 39.097641][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 39.112487][ T8456] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.122453][ T8452] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.133562][ T8452] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.142305][ T8452] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.151228][ T8452] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.164793][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 39.172293][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 39.180072][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 39.188803][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.199989][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.207266][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.241518][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 39.249346][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 39.257770][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 39.266316][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 39.275044][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 39.283301][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 39.292082][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.300559][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.307581][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.315580][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 39.323748][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.331859][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 39.352626][ T8458] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 39.365258][ T8458] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 39.383707][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 39.392521][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 39.402409][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.410736][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 39.419669][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 39.428081][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 39.442437][ T8464] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.465232][ T8462] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.479732][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 39.488091][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 39.490052][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 39.498173][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 39.511270][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.519695][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 39.528237][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 39.536937][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 39.545220][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.553206][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 39.561560][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.569570][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 39.581370][ T8460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 39.597167][ T8456] device veth0_vlan entered promiscuous mode [ 39.608488][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.616087][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.623575][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 39.631420][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.642107][ T8462] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.655644][ T298] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 39.659795][ T8464] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.670035][ T298] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 39.671138][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.685487][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.692959][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 39.700552][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 39.707947][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 39.715820][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.723383][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.734095][ T8458] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.741895][ T8456] device veth1_vlan entered promiscuous mode [ 39.761121][ T8460] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.770219][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 39.778440][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 39.803779][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 20:41:51 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_QUERY(r1, 0x0, 0x0) [ 39.812136][ T3164] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.819181][ T3164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.828708][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 39.840535][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.863522][ T3164] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.870551][ T3164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.889942][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 39.898613][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.907127][ T3164] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.913307][ T3754] Bluetooth: hci0: command 0x041b tx timeout [ 39.914157][ T3164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.928156][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 39.935932][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 39.943602][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 39.951916][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.960496][ T3164] bridge0: port 2(bridge_slave_1) entered blocking state 20:41:51 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_QUERY(r1, 0x0, 0x0) [ 39.967534][ T3164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.995395][ T8456] device veth0_macvtap entered promiscuous mode [ 40.011714][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 40.020309][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 40.028172][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 40.035998][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 40.044757][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 40.053796][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 40.062441][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 40.073292][ T3754] Bluetooth: hci1: command 0x041b tx timeout [ 40.073986][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.088639][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 40.097478][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.106233][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 40.115684][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 40.127636][ T8456] device veth1_macvtap entered promiscuous mode [ 40.143331][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 40.151608][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 40.160638][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 40.169152][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 40.177989][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 40.186602][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 40.195287][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 40.203414][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 20:41:52 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_QUERY(r1, 0x0, 0x0) [ 40.231397][ T8456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.242429][ T8456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.253249][ T8456] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.260845][ T9445] Bluetooth: hci2: command 0x041b tx timeout [ 40.267328][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 40.276903][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 40.285254][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.292784][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.300883][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 40.310274][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.319421][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 40.327915][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 40.336434][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 40.344735][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.352797][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 40.361165][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.369374][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 40.377813][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 40.386466][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 40.395067][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.407130][ T8458] device veth0_vlan entered promiscuous mode [ 40.414575][ T9789] Bluetooth: hci3: command 0x041b tx timeout [ 40.426473][ T8462] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 40.438392][ T8462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 40.448319][ T8464] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 40.459726][ T8460] device veth0_vlan entered promiscuous mode [ 40.466572][ T9789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 40.475264][ T9789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 20:41:52 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_QUERY(r1, 0x0, 0x0) [ 40.483955][ T9789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 40.492001][ T9789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.516141][ T8462] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.523673][ T8456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.536591][ T8456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.551203][ T8456] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.553177][ T7] Bluetooth: hci4: command 0x041b tx timeout [ 40.574979][ T9789] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.582560][ T9789] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.596855][ T9789] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 40.605105][ T9789] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 40.612495][ T9789] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 40.621260][ T9789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:41:52 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_QUERY(r1, 0x0, 0x0) [ 40.632031][ T8458] device veth1_vlan entered promiscuous mode [ 40.641993][ T8460] device veth1_vlan entered promiscuous mode [ 40.648469][ T9789] Bluetooth: hci5: command 0x041b tx timeout [ 40.658487][ T8456] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.669489][ T8456] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.686116][ T8456] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.698705][ T8456] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.723186][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 20:41:52 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_QUERY(r1, 0x0, 0x0) [ 40.730963][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 40.745736][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 40.755617][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 40.773492][ T8464] 8021q: adding VLAN 0 to HW filter on device batadv0 20:41:52 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_QUERY(r1, 0x0, 0x0) [ 40.844578][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 40.852474][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 40.866635][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 40.875175][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.886648][ T8460] device veth0_macvtap entered promiscuous mode [ 40.902069][ T8458] device veth0_macvtap entered promiscuous mode [ 40.913449][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 40.925585][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 40.940001][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 40.948110][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.960545][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 40.980545][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.990680][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 40.998906][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 41.008648][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 41.019270][ T8460] device veth1_macvtap entered promiscuous mode [ 41.039858][ T8458] device veth1_macvtap entered promiscuous mode [ 41.053840][ T8460] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.064480][ T8460] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.074445][ T8460] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.085013][ T8460] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.095764][ T8460] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.105519][ T453] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 41.114664][ T8462] device veth0_vlan entered promiscuous mode [ 41.120926][ T453] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 41.128134][ T8458] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.139335][ T8458] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.149224][ T8458] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.159721][ T8458] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.169582][ T8458] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.169596][ T8458] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.170667][ T8458] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.198284][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 41.206572][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 41.215784][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 41.224513][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.234395][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 41.242046][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 41.250545][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.260417][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 41.268784][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.280107][ T8460] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.290872][ T8460] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.300817][ T8460] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.311351][ T8460] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.322181][ T8460] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.335170][ T8460] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.344170][ T8460] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.355488][ T8460] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.369256][ T8460] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.389800][ T8458] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 20:41:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000700)=[{&(0x7f0000000140)=""/166, 0xa6}], 0x1) [ 41.403813][ T8458] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.415509][ T8458] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.426221][ T8458] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.437689][ T8458] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.448535][ T8458] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.465089][ T8458] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.472483][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.481287][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.491123][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 41.500215][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.510678][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 41.524507][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.536620][ T8462] device veth1_vlan entered promiscuous mode [ 41.561224][ T8458] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.570561][ T8458] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.579474][ T8458] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.588890][ T8458] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.603068][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 41.611486][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.620196][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 41.628557][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.642877][ T8464] device veth0_vlan entered promiscuous mode [ 41.653728][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.661319][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.701656][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 41.720114][ T8464] device veth1_vlan entered promiscuous mode [ 41.726386][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 41.745746][ T8462] device veth0_macvtap entered promiscuous mode [ 41.755832][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 41.765104][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 41.773480][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 41.781816][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.791205][ T9209] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 41.807808][ T298] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 41.810079][ T8462] device veth1_macvtap entered promiscuous mode [ 41.815661][ T298] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 41.857449][ T8464] device veth0_macvtap entered promiscuous mode [ 41.865383][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 41.873905][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 41.881504][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 41.890779][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 41.899330][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.922391][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.935405][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.948135][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.960611][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.970940][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.983586][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.992795][ T9209] Bluetooth: hci0: command 0x040f tx timeout [ 41.995261][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 42.009897][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.020928][ T8462] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.028286][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 42.037503][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 42.046532][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.058262][ T8464] device veth1_macvtap entered promiscuous mode [ 42.067963][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 42.083311][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.094302][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 42.105366][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.116490][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 42.127802][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.140283][ T8462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 42.150724][ T8462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.160664][ T9209] Bluetooth: hci1: command 0x040f tx timeout [ 42.165842][ T8462] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.183874][ T298] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 42.191717][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 42.201048][ T298] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 42.209230][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 42.219389][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.228217][ T3164] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 42.238193][ T8462] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.250327][ T8462] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.259183][ T8462] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.268044][ T8462] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.285034][ T24] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 42.285131][ T8464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 42.303680][ T24] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 42.304244][ T8464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.321515][ T9209] Bluetooth: hci2: command 0x040f tx timeout [ 42.321594][ T8464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 42.338103][ T8464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.348051][ T8464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 42.358622][ T8464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.369171][ T8464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 42.379752][ T8464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.389798][ T8464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 42.400492][ T8464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.411401][ T8464] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.422834][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 42.430589][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 42.439447][ T8857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.456412][ T8464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 42.466899][ T8464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.477192][ T7] Bluetooth: hci3: command 0x040f tx timeout [ 42.477369][ T8464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 42.494422][ T8464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.504231][ T8464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 42.514815][ T8464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.524614][ T8464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 42.535042][ T8464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.544858][ T8464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 42.555533][ T8464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.566604][ T8464] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.577241][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 42.587306][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.598616][ T8464] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.616004][ T8464] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 20:41:54 executing program 2: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f00000000c0)=[{}], 0x20) 20:41:54 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_QUERY(r1, 0x0, 0x0) [ 42.630330][ T8464] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.642562][ T7] Bluetooth: hci4: command 0x040f tx timeout [ 42.651965][ T8464] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.711037][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 42.723139][ T9789] Bluetooth: hci5: command 0x040f tx timeout [ 42.733261][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 42.748236][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 42.776425][ T453] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 42.798485][ T453] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 42.811519][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 42.826662][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 42.836068][ T9789] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 42.853021][ T9789] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 42.865693][ T453] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 42.882788][ T453] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 42.890173][ T9789] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 42.929107][ T9946] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 20:41:54 executing program 4: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000340)="8f7d6191", 0x4}]) [ 44.072636][ T7] Bluetooth: hci0: command 0x0419 tx timeout [ 44.232519][ T7] Bluetooth: hci1: command 0x0419 tx timeout [ 44.392716][ T7] Bluetooth: hci2: command 0x0419 tx timeout [ 44.552697][ T7] Bluetooth: hci3: command 0x0419 tx timeout [ 44.712296][ T7] Bluetooth: hci4: command 0x0419 tx timeout [ 44.792426][ T3164] Bluetooth: hci5: command 0x0419 tx timeout 20:41:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000700)=[{&(0x7f0000000140)=""/166, 0xa6}], 0x1) 20:41:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000013002b"], 0x54}}, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 20:41:57 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_QUERY(r1, 0x0, 0x0) 20:41:57 executing program 2: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f00000000c0)=[{}], 0x20) 20:41:57 executing program 4: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000340)="8f7d6191", 0x4}]) 20:41:57 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 20:41:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000700)=[{&(0x7f0000000140)=""/166, 0xa6}], 0x1) 20:41:57 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 20:41:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000013002b"], 0x54}}, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 20:41:57 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000001000000000ffffffff0000000000000000000000000000000000020000000000000000004000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e2a30456b880000145b41fe6900000079616d3000000000000000000000000079616d300000f200000000000000000076657468315f082f5f626f6e640000000180c20000000000000000110180c20000000000000000000000b000000067010000900100007374617469737469630000a42e4dbf055e11d2710000000000000020001800000000000000000000000000000000000000000000000000000000000000646e61740000000000000000ff0300000000000000000000000000000000000000010000000000000180c20000000000ffffffff000000006e666c6f67000000000000000000000000000000000000000000000000000000500000810000000000000000000022d4e27ebdf3b9dc569e338e2c551c2fc4a19597ba4c501c8b1f16fb7809c40aae86d9a0ef7981f4af1506f4fe16383d2afb577ed2bbe4ad733a925454bb9ac877d8206dd99f024b3f54ba0000000041554449540000000000000000000000000000000000000000000000000008000000000000200000000000000000"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 20:41:57 executing program 2: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f00000000c0)=[{}], 0x20) [ 46.033324][ T9998] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 [ 46.047425][ T9994] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 20:41:57 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000013002b"], 0x54}}, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 20:41:57 executing program 2: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) [ 46.076284][T10004] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 20:41:58 executing program 4: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000340)="8f7d6191", 0x4}]) 20:41:58 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000001000000000ffffffff0000000000000000000000000000000000020000000000000000004000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e2a30456b880000145b41fe6900000079616d3000000000000000000000000079616d300000f200000000000000000076657468315f082f5f626f6e640000000180c20000000000000000110180c20000000000000000000000b000000067010000900100007374617469737469630000a42e4dbf055e11d2710000000000000020001800000000000000000000000000000000000000000000000000000000000000646e61740000000000000000ff0300000000000000000000000000000000000000010000000000000180c20000000000ffffffff000000006e666c6f67000000000000000000000000000000000000000000000000000000500000810000000000000000000022d4e27ebdf3b9dc569e338e2c551c2fc4a19597ba4c501c8b1f16fb7809c40aae86d9a0ef7981f4af1506f4fe16383d2afb577ed2bbe4ad733a925454bb9ac877d8206dd99f024b3f54ba0000000041554449540000000000000000000000000000000000000000000000000008000000000000200000000000000000"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) [ 46.170106][T10014] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 [ 46.205456][T10026] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 20:41:58 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) [ 46.350850][T10037] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 20:42:00 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 20:42:00 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 20:42:00 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000001000000000ffffffff0000000000000000000000000000000000020000000000000000004000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e2a30456b880000145b41fe6900000079616d3000000000000000000000000079616d300000f200000000000000000076657468315f082f5f626f6e640000000180c20000000000000000110180c20000000000000000000000b000000067010000900100007374617469737469630000a42e4dbf055e11d2710000000000000020001800000000000000000000000000000000000000000000000000000000000000646e61740000000000000000ff0300000000000000000000000000000000000000010000000000000180c20000000000ffffffff000000006e666c6f67000000000000000000000000000000000000000000000000000000500000810000000000000000000022d4e27ebdf3b9dc569e338e2c551c2fc4a19597ba4c501c8b1f16fb7809c40aae86d9a0ef7981f4af1506f4fe16383d2afb577ed2bbe4ad733a925454bb9ac877d8206dd99f024b3f54ba0000000041554449540000000000000000000000000000000000000000000000000008000000000000200000000000000000"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) [ 49.027811][T10043] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 [ 49.082064][T10053] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 [ 49.085047][T10049] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 20:42:01 executing program 2: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 20:42:01 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) [ 49.174966][T10060] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 [ 49.240306][T10065] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 20:42:01 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) [ 49.369569][T10070] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 20:42:03 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 20:42:03 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000001000000000ffffffff0000000000000000000000000000000000020000000000000000004000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000006e2a30456b880000145b41fe6900000079616d3000000000000000000000000079616d300000f200000000000000000076657468315f082f5f626f6e640000000180c20000000000000000110180c20000000000000000000000b000000067010000900100007374617469737469630000a42e4dbf055e11d2710000000000000020001800000000000000000000000000000000000000000000000000000000000000646e61740000000000000000ff0300000000000000000000000000000000000000010000000000000180c20000000000ffffffff000000006e666c6f67000000000000000000000000000000000000000000000000000000500000810000000000000000000022d4e27ebdf3b9dc569e338e2c551c2fc4a19597ba4c501c8b1f16fb7809c40aae86d9a0ef7981f4af1506f4fe16383d2afb577ed2bbe4ad733a925454bb9ac877d8206dd99f024b3f54ba0000000041554449540000000000000000000000000000000000000000000000000008000000000000200000000000000000"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) [ 52.034414][T10076] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 20:42:03 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 20:42:04 executing program 2: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) [ 52.094165][T10082] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 [ 52.117541][T10086] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 20:42:04 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) [ 52.188055][T10093] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 20:42:04 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 20:42:04 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 20:42:04 executing program 4: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 20:42:06 executing program 5: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000340)="8f7d6191", 0x4}]) 20:42:06 executing program 0: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000340)="8f7d6191", 0x4}]) 20:42:06 executing program 1: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000340)="8f7d6191", 0x4}]) 20:42:07 executing program 5: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000340)="8f7d6191", 0x4}]) 20:42:07 executing program 2: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000340)="8f7d6191", 0x4}]) 20:42:07 executing program 0: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000340)="8f7d6191", 0x4}]) 20:42:07 executing program 1: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000340)="8f7d6191", 0x4}]) 20:42:07 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]}, 0x298) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 20:42:07 executing program 5: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000340)="8f7d6191", 0x4}]) 20:42:07 executing program 2: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000340)="8f7d6191", 0x4}]) 20:42:07 executing program 0: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000340)="8f7d6191", 0x4}]) 20:42:07 executing program 4: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f00000000c0)=[{}], 0x20) 20:42:07 executing program 1: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000340)="8f7d6191", 0x4}]) [ 55.411705][T10172] xt_check_match: 4 callbacks suppressed [ 55.411718][T10172] x_tables: eb_tables: statistic.0 match: invalid size 24 (kernel) != (user) 0 20:42:07 executing program 4: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f00000000c0)=[{}], 0x20) 20:42:07 executing program 4: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f00000000c0)=[{}], 0x20) 20:42:07 executing program 4: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f00000000c0)=[{}], 0x20) 20:42:07 executing program 5: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f00000000c0)=[{}], 0x20) 20:42:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000013002b"], 0x54}}, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 20:42:07 executing program 4: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f00000000c0)=[{}], 0x20) 20:42:10 executing program 4: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f00000000c0)=[{}], 0x20) 20:42:10 executing program 2: io_setup(0x1, &(0x7f0000000300)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x4c, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)) io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000340)="8f7d6191", 0x4}]) 20:42:10 executing program 5: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f00000000c0)=[{}], 0x20) 20:42:10 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000013002b"], 0x54}}, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 20:42:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000013002b"], 0x54}}, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 20:42:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000013002b"], 0x54}}, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 20:42:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000013002b"], 0x54}}, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 20:42:10 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000013002b"], 0x54}}, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 20:42:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000013002b"], 0x54}}, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 20:42:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000013002b"], 0x54}}, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 20:42:10 executing program 5: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f00000000c0)=[{}], 0x20) 20:42:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000013002b"], 0x54}}, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 20:42:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000700)=[{&(0x7f0000000140)=""/166, 0xa6}], 0x1) 20:42:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000013002b"], 0x54}}, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 20:42:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000700)=[{&(0x7f0000000140)=""/166, 0xa6}], 0x1) 20:42:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000700)=[{&(0x7f0000000140)=""/166, 0xa6}], 0x1) 20:42:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000013002b"], 0x54}}, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 20:42:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000700)=[{&(0x7f0000000140)=""/166, 0xa6}], 0x1) 20:42:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400000013002b"], 0x54}}, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 20:42:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000700)=[{&(0x7f0000000140)=""/166, 0xa6}], 0x1) 20:42:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_QUERY(r1, 0x0, 0x0) 20:42:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000700)=[{&(0x7f0000000140)=""/166, 0xa6}], 0x1) 20:42:10 executing program 3: set_mempolicy(0x1, &(0x7f0000000080)=0xa, 0x81) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f00000000c0)="01", 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000009c0)='user\x00', &(0x7f0000000a00)={'syz', 0x3}, &(0x7f0000000240)="6a1a53561fd80677d9504983468d6fbe82e04e17628f9603c8b401bd22052525bcae35a56f76a02c16d98f432e2c5daf6f099f8da2e063252c8011a16a60363ccf9381fa86230fc032cd122377597cb0edf1498bb9bd724f06303394fec8155663b73ac89fedf050ca02d9297cb029ef9cdd5c4aa086a3fac3623349b11c1fc046ac0e6221ea0aac59cc1a2ec309a07b4fc000251f8e1458c1e46db196b87fb611d1d4a3368a4e2d320ddaa995f193278dcac76e681c449ac2180f4f92657a93", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r1, r0}, &(0x7f0000000400)=""/246, 0xf6, &(0x7f0000000180)={&(0x7f00000001c0)={'poly1305-simd\x00'}}) 20:42:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000700)=[{&(0x7f0000000140)=""/166, 0xa6}], 0x1) 20:42:10 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000700)=[{&(0x7f0000000140)=""/166, 0xa6}], 0x1) 20:42:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_QUERY(r1, 0x0, 0x0) 20:42:10 executing program 2: unshare(0x24040400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 20:42:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'nhpoly1305-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000700)=[{&(0x7f0000000140)=""/166, 0xa6}], 0x1) 20:42:10 executing program 3: set_mempolicy(0x1, &(0x7f0000000080)=0xa, 0x81) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f00000000c0)="01", 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000009c0)='user\x00', &(0x7f0000000a00)={'syz', 0x3}, &(0x7f0000000240)="6a1a53561fd80677d9504983468d6fbe82e04e17628f9603c8b401bd22052525bcae35a56f76a02c16d98f432e2c5daf6f099f8da2e063252c8011a16a60363ccf9381fa86230fc032cd122377597cb0edf1498bb9bd724f06303394fec8155663b73ac89fedf050ca02d9297cb029ef9cdd5c4aa086a3fac3623349b11c1fc046ac0e6221ea0aac59cc1a2ec309a07b4fc000251f8e1458c1e46db196b87fb611d1d4a3368a4e2d320ddaa995f193278dcac76e681c449ac2180f4f92657a93", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r1, r0}, &(0x7f0000000400)=""/246, 0xf6, &(0x7f0000000180)={&(0x7f00000001c0)={'poly1305-simd\x00'}}) 20:42:10 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:10 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$RDMA_USER_CM_CMD_QUERY(r1, 0x0, 0x0) [ 58.898212][T10289] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 20:42:10 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:10 executing program 3: set_mempolicy(0x1, &(0x7f0000000080)=0xa, 0x81) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f00000000c0)="01", 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000009c0)='user\x00', &(0x7f0000000a00)={'syz', 0x3}, &(0x7f0000000240)="6a1a53561fd80677d9504983468d6fbe82e04e17628f9603c8b401bd22052525bcae35a56f76a02c16d98f432e2c5daf6f099f8da2e063252c8011a16a60363ccf9381fa86230fc032cd122377597cb0edf1498bb9bd724f06303394fec8155663b73ac89fedf050ca02d9297cb029ef9cdd5c4aa086a3fac3623349b11c1fc046ac0e6221ea0aac59cc1a2ec309a07b4fc000251f8e1458c1e46db196b87fb611d1d4a3368a4e2d320ddaa995f193278dcac76e681c449ac2180f4f92657a93", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r1, r0}, &(0x7f0000000400)=""/246, 0xf6, &(0x7f0000000180)={&(0x7f00000001c0)={'poly1305-simd\x00'}}) 20:42:10 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:10 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:10 executing program 2: unshare(0x24040400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 20:42:10 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:10 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:10 executing program 1: unshare(0x24040400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 20:42:10 executing program 3: set_mempolicy(0x1, &(0x7f0000000080)=0xa, 0x81) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f00000000c0)="01", 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000009c0)='user\x00', &(0x7f0000000a00)={'syz', 0x3}, &(0x7f0000000240)="6a1a53561fd80677d9504983468d6fbe82e04e17628f9603c8b401bd22052525bcae35a56f76a02c16d98f432e2c5daf6f099f8da2e063252c8011a16a60363ccf9381fa86230fc032cd122377597cb0edf1498bb9bd724f06303394fec8155663b73ac89fedf050ca02d9297cb029ef9cdd5c4aa086a3fac3623349b11c1fc046ac0e6221ea0aac59cc1a2ec309a07b4fc000251f8e1458c1e46db196b87fb611d1d4a3368a4e2d320ddaa995f193278dcac76e681c449ac2180f4f92657a93", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r1, r0}, &(0x7f0000000400)=""/246, 0xf6, &(0x7f0000000180)={&(0x7f00000001c0)={'poly1305-simd\x00'}}) 20:42:10 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:11 executing program 3: unshare(0x24040400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 20:42:11 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:11 executing program 4: unshare(0x24040400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 20:42:11 executing program 2: unshare(0x24040400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 20:42:11 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:11 executing program 1: unshare(0x24040400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 20:42:11 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:11 executing program 4: unshare(0x24040400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 20:42:11 executing program 2: unshare(0x24040400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 20:42:11 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:11 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:11 executing program 3: unshare(0x24040400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 20:42:11 executing program 1: unshare(0x24040400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 20:42:11 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:11 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:11 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:11 executing program 2: set_mempolicy(0x1, &(0x7f0000000080)=0xa, 0x81) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f00000000c0)="01", 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000009c0)='user\x00', &(0x7f0000000a00)={'syz', 0x3}, &(0x7f0000000240)="6a1a53561fd80677d9504983468d6fbe82e04e17628f9603c8b401bd22052525bcae35a56f76a02c16d98f432e2c5daf6f099f8da2e063252c8011a16a60363ccf9381fa86230fc032cd122377597cb0edf1498bb9bd724f06303394fec8155663b73ac89fedf050ca02d9297cb029ef9cdd5c4aa086a3fac3623349b11c1fc046ac0e6221ea0aac59cc1a2ec309a07b4fc000251f8e1458c1e46db196b87fb611d1d4a3368a4e2d320ddaa995f193278dcac76e681c449ac2180f4f92657a93", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r1, r0}, &(0x7f0000000400)=""/246, 0xf6, &(0x7f0000000180)={&(0x7f00000001c0)={'poly1305-simd\x00'}}) 20:42:11 executing program 4: unshare(0x24040400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 20:42:11 executing program 5: set_mempolicy(0x1, &(0x7f0000000080)=0xa, 0x81) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f00000000c0)="01", 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000009c0)='user\x00', &(0x7f0000000a00)={'syz', 0x3}, &(0x7f0000000240)="6a1a53561fd80677d9504983468d6fbe82e04e17628f9603c8b401bd22052525bcae35a56f76a02c16d98f432e2c5daf6f099f8da2e063252c8011a16a60363ccf9381fa86230fc032cd122377597cb0edf1498bb9bd724f06303394fec8155663b73ac89fedf050ca02d9297cb029ef9cdd5c4aa086a3fac3623349b11c1fc046ac0e6221ea0aac59cc1a2ec309a07b4fc000251f8e1458c1e46db196b87fb611d1d4a3368a4e2d320ddaa995f193278dcac76e681c449ac2180f4f92657a93", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r1, r0}, &(0x7f0000000400)=""/246, 0xf6, &(0x7f0000000180)={&(0x7f00000001c0)={'poly1305-simd\x00'}}) 20:42:11 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:11 executing program 3: unshare(0x24040400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000023c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) 20:42:11 executing program 0: set_mempolicy(0x1, &(0x7f0000000080)=0xa, 0x81) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f00000000c0)="01", 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000009c0)='user\x00', &(0x7f0000000a00)={'syz', 0x3}, &(0x7f0000000240)="6a1a53561fd80677d9504983468d6fbe82e04e17628f9603c8b401bd22052525bcae35a56f76a02c16d98f432e2c5daf6f099f8da2e063252c8011a16a60363ccf9381fa86230fc032cd122377597cb0edf1498bb9bd724f06303394fec8155663b73ac89fedf050ca02d9297cb029ef9cdd5c4aa086a3fac3623349b11c1fc046ac0e6221ea0aac59cc1a2ec309a07b4fc000251f8e1458c1e46db196b87fb611d1d4a3368a4e2d320ddaa995f193278dcac76e681c449ac2180f4f92657a93", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r1, r0}, &(0x7f0000000400)=""/246, 0xf6, &(0x7f0000000180)={&(0x7f00000001c0)={'poly1305-simd\x00'}}) 20:42:11 executing program 5: set_mempolicy(0x1, &(0x7f0000000080)=0xa, 0x81) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f00000000c0)="01", 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000009c0)='user\x00', &(0x7f0000000a00)={'syz', 0x3}, &(0x7f0000000240)="6a1a53561fd80677d9504983468d6fbe82e04e17628f9603c8b401bd22052525bcae35a56f76a02c16d98f432e2c5daf6f099f8da2e063252c8011a16a60363ccf9381fa86230fc032cd122377597cb0edf1498bb9bd724f06303394fec8155663b73ac89fedf050ca02d9297cb029ef9cdd5c4aa086a3fac3623349b11c1fc046ac0e6221ea0aac59cc1a2ec309a07b4fc000251f8e1458c1e46db196b87fb611d1d4a3368a4e2d320ddaa995f193278dcac76e681c449ac2180f4f92657a93", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r1, r0}, &(0x7f0000000400)=""/246, 0xf6, &(0x7f0000000180)={&(0x7f00000001c0)={'poly1305-simd\x00'}}) 20:42:11 executing program 2: set_mempolicy(0x1, &(0x7f0000000080)=0xa, 0x81) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f00000000c0)="01", 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000009c0)='user\x00', &(0x7f0000000a00)={'syz', 0x3}, &(0x7f0000000240)="6a1a53561fd80677d9504983468d6fbe82e04e17628f9603c8b401bd22052525bcae35a56f76a02c16d98f432e2c5daf6f099f8da2e063252c8011a16a60363ccf9381fa86230fc032cd122377597cb0edf1498bb9bd724f06303394fec8155663b73ac89fedf050ca02d9297cb029ef9cdd5c4aa086a3fac3623349b11c1fc046ac0e6221ea0aac59cc1a2ec309a07b4fc000251f8e1458c1e46db196b87fb611d1d4a3368a4e2d320ddaa995f193278dcac76e681c449ac2180f4f92657a93", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r1, r0}, &(0x7f0000000400)=""/246, 0xf6, &(0x7f0000000180)={&(0x7f00000001c0)={'poly1305-simd\x00'}}) 20:42:11 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000b75fd4)={0x2000000000000e, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) 20:42:11 executing program 4: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) timer_delete(r0) 20:42:11 executing program 5: set_mempolicy(0x1, &(0x7f0000000080)=0xa, 0x81) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f00000000c0)="01", 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000009c0)='user\x00', &(0x7f0000000a00)={'syz', 0x3}, &(0x7f0000000240)="6a1a53561fd80677d9504983468d6fbe82e04e17628f9603c8b401bd22052525bcae35a56f76a02c16d98f432e2c5daf6f099f8da2e063252c8011a16a60363ccf9381fa86230fc032cd122377597cb0edf1498bb9bd724f06303394fec8155663b73ac89fedf050ca02d9297cb029ef9cdd5c4aa086a3fac3623349b11c1fc046ac0e6221ea0aac59cc1a2ec309a07b4fc000251f8e1458c1e46db196b87fb611d1d4a3368a4e2d320ddaa995f193278dcac76e681c449ac2180f4f92657a93", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r1, r0}, &(0x7f0000000400)=""/246, 0xf6, &(0x7f0000000180)={&(0x7f00000001c0)={'poly1305-simd\x00'}}) 20:42:11 executing program 2: set_mempolicy(0x1, &(0x7f0000000080)=0xa, 0x81) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f00000000c0)="01", 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000009c0)='user\x00', &(0x7f0000000a00)={'syz', 0x3}, &(0x7f0000000240)="6a1a53561fd80677d9504983468d6fbe82e04e17628f9603c8b401bd22052525bcae35a56f76a02c16d98f432e2c5daf6f099f8da2e063252c8011a16a60363ccf9381fa86230fc032cd122377597cb0edf1498bb9bd724f06303394fec8155663b73ac89fedf050ca02d9297cb029ef9cdd5c4aa086a3fac3623349b11c1fc046ac0e6221ea0aac59cc1a2ec309a07b4fc000251f8e1458c1e46db196b87fb611d1d4a3368a4e2d320ddaa995f193278dcac76e681c449ac2180f4f92657a93", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r1, r0}, &(0x7f0000000400)=""/246, 0xf6, &(0x7f0000000180)={&(0x7f00000001c0)={'poly1305-simd\x00'}}) 20:42:11 executing program 0: set_mempolicy(0x1, &(0x7f0000000080)=0xa, 0x81) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f00000000c0)="01", 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000009c0)='user\x00', &(0x7f0000000a00)={'syz', 0x3}, &(0x7f0000000240)="6a1a53561fd80677d9504983468d6fbe82e04e17628f9603c8b401bd22052525bcae35a56f76a02c16d98f432e2c5daf6f099f8da2e063252c8011a16a60363ccf9381fa86230fc032cd122377597cb0edf1498bb9bd724f06303394fec8155663b73ac89fedf050ca02d9297cb029ef9cdd5c4aa086a3fac3623349b11c1fc046ac0e6221ea0aac59cc1a2ec309a07b4fc000251f8e1458c1e46db196b87fb611d1d4a3368a4e2d320ddaa995f193278dcac76e681c449ac2180f4f92657a93", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r1, r0}, &(0x7f0000000400)=""/246, 0xf6, &(0x7f0000000180)={&(0x7f00000001c0)={'poly1305-simd\x00'}}) 20:42:11 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:11 executing program 1: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x1c) 20:42:11 executing program 2: r0 = socket$inet6(0x2, 0x3, 0x3) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x89e1, 0x0) 20:42:11 executing program 4: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) timer_delete(r0) 20:42:11 executing program 0: set_mempolicy(0x1, &(0x7f0000000080)=0xa, 0x81) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f00000000c0)="01", 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000009c0)='user\x00', &(0x7f0000000a00)={'syz', 0x3}, &(0x7f0000000240)="6a1a53561fd80677d9504983468d6fbe82e04e17628f9603c8b401bd22052525bcae35a56f76a02c16d98f432e2c5daf6f099f8da2e063252c8011a16a60363ccf9381fa86230fc032cd122377597cb0edf1498bb9bd724f06303394fec8155663b73ac89fedf050ca02d9297cb029ef9cdd5c4aa086a3fac3623349b11c1fc046ac0e6221ea0aac59cc1a2ec309a07b4fc000251f8e1458c1e46db196b87fb611d1d4a3368a4e2d320ddaa995f193278dcac76e681c449ac2180f4f92657a93", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r1, r0}, &(0x7f0000000400)=""/246, 0xf6, &(0x7f0000000180)={&(0x7f00000001c0)={'poly1305-simd\x00'}}) 20:42:11 executing program 2: r0 = socket$inet6(0x2, 0x3, 0x3) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x89e1, 0x0) [ 60.019543][ C1] hrtimer: interrupt took 26670 ns 20:42:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x1c) 20:42:11 executing program 4: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) timer_delete(r0) 20:42:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x1c) 20:42:12 executing program 2: r0 = socket$inet6(0x2, 0x3, 0x3) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x89e1, 0x0) 20:42:12 executing program 4: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) timer_delete(r0) [ 60.144054][T10436] loop1: detected capacity change from 514 to 0 [ 60.155219][T10436] tmpfs: Bad value for 'mpol' 20:42:12 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:12 executing program 2: r0 = socket$inet6(0x2, 0x3, 0x3) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x89e1, 0x0) 20:42:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x1c) 20:42:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x1c) 20:42:12 executing program 1: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:12 executing program 4: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:12 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x1c) 20:42:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x1c) 20:42:12 executing program 1: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="baa1f7f5eca0ecaf6653ff44101e49a5d98816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f7c0bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb5f747b093c8e57a24ac93d622fc8de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d02ad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a65f80263791f92d60d3eac8e2106845010320fff84825521404156b94ff76d7e2cf612f5fd523f8eddaa8feded84f722b1ee31383f451b94208d7d1c2f5ee13e90f0d085b0d1e804ee7aba55bdcfa7e3284feed41987c1d4651672761f386f3ad169490c2db46739c8c4ecc939b58489e1b64f20d565e8e5778d04776", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:12 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:12 executing program 1: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:13 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:13 executing program 4: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:13 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:13 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:13 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:13 executing program 4: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:13 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:13 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:14 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:14 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:14 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:14 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:14 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:14 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:15 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:15 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:15 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:15 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:15 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:15 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:16 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:16 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:16 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:16 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:16 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:16 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:17 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:17 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:17 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:17 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:17 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:17 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:17 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:18 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:18 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:18 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:18 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:18 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:18 executing program 5: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:18 executing program 1: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:18 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:19 executing program 5: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:19 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:19 executing program 1: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="baa1f7f5eca0ecaf6653ff44101e49a5d98816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f7c0bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb5f747b093c8e57a24ac93d622fc8de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d02ad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a65f80263791f92d60d3eac8e2106845010320fff84825521404156b94ff76d7e2cf612f5fd523f8eddaa8feded84f722b1ee31383f451b94208d7d1c2f5ee13e90f0d085b0d1e804ee7aba55bdcfa7e3284feed41987c1d4651672761f386f3ad169490c2db46739c8c4ecc939b58489e1b64f20d565e8e5778d04776", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:19 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:19 executing program 5: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="baa1f7f5eca0ecaf6653ff44101e49a5d98816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f7c0bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb5f747b093c8e57a24ac93d622fc8de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d02ad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a65f80263791f92d60d3eac8e2106845010320fff84825521404156b94ff76d7e2cf612f5fd523f8eddaa8feded84f722b1ee31383f451b94208d7d1c2f5ee13e90f0d085b0d1e804ee7aba55bdcfa7e3284feed41987c1d4651672761f386f3ad169490c2db46739c8c4ecc939b58489e1b64f20d565e8e5778d04776", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:19 executing program 4: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:19 executing program 5: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:19 executing program 1: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:19 executing program 4: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="baa1f7f5eca0ecaf6653ff44101e49a5d98816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f7c0bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb5f747b093c8e57a24ac93d622fc8de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d02ad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a65f80263791f92d60d3eac8e2106845010320fff84825521404156b94ff76d7e2cf612f5fd523f8eddaa8feded84f722b1ee31383f451b94208d7d1c2f5ee13e90f0d085b0d1e804ee7aba55bdcfa7e3284feed41987c1d4651672761f386f3ad169490c2db46739c8c4ecc939b58489e1b64f20d565e8e5778d04776", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:19 executing program 5: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:19 executing program 1: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:19 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:19 executing program 4: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="baa1f7f5eca0ecaf6653ff44101e49a5d98816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f7c0bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb5f747b093c8e57a24ac93d622fc8de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d02ad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a65f80263791f92d60d3eac8e2106845010320fff84825521404156b94ff76d7e2cf612f5fd523f8eddaa8feded84f722b1ee31383f451b94208d7d1c2f5ee13e90f0d085b0d1e804ee7aba55bdcfa7e3284feed41987c1d4651672761f386f3ad169490c2db46739c8c4ecc939b58489e1b64f20d565e8e5778d04776", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:19 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:19 executing program 5: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:20 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') recvmmsg(r0, &(0x7f000000a200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r1, 0x5e4c6b9427f10f43}, 0x14}}, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @empty}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r4 = syz_genetlink_get_family_id$netlbl_calipso(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRESOCT=r4, @ANYRES16=r4, @ANYRES64, @ANYRES16, @ANYRESDEC], 0x100000530) 20:42:20 executing program 1: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:20 executing program 4: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:20 executing program 5: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="baa1f7f5eca0ecaf6653ff44101e49a5d98816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f7c0bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb5f747b093c8e57a24ac93d622fc8de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d02ad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a65f80263791f92d60d3eac8e2106845010320fff84825521404156b94ff76d7e2cf612f5fd523f8eddaa8feded84f722b1ee31383f451b94208d7d1c2f5ee13e90f0d085b0d1e804ee7aba55bdcfa7e3284feed41987c1d4651672761f386f3ad169490c2db46739c8c4ecc939b58489e1b64f20d565e8e5778d04776", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:20 executing program 4: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:20 executing program 5: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="baa1f7f5eca0ecaf6653ff44101e49a5d98816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f7c0bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb5f747b093c8e57a24ac93d622fc8de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d02ad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a65f80263791f92d60d3eac8e2106845010320fff84825521404156b94ff76d7e2cf612f5fd523f8eddaa8feded84f722b1ee31383f451b94208d7d1c2f5ee13e90f0d085b0d1e804ee7aba55bdcfa7e3284feed41987c1d4651672761f386f3ad169490c2db46739c8c4ecc939b58489e1b64f20d565e8e5778d04776", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:20 executing program 1: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="baa1f7f5eca0ecaf6653ff44101e49a5d98816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f7c0bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb5f747b093c8e57a24ac93d622fc8de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d02ad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a65f80263791f92d60d3eac8e2106845010320fff84825521404156b94ff76d7e2cf612f5fd523f8eddaa8feded84f722b1ee31383f451b94208d7d1c2f5ee13e90f0d085b0d1e804ee7aba55bdcfa7e3284feed41987c1d4651672761f386f3ad169490c2db46739c8c4ecc939b58489e1b64f20d565e8e5778d04776", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:20 executing program 5: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 68.611761][T10873] loop5: detected capacity change from 514 to 0 [ 68.622424][T10873] tmpfs: Bad value for 'mpol' 20:42:20 executing program 5: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:20 executing program 4: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="baa1f7f5eca0ecaf6653ff44101e49a5d98816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f7c0bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb5f747b093c8e57a24ac93d622fc8de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d02ad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a65f80263791f92d60d3eac8e2106845010320fff84825521404156b94ff76d7e2cf612f5fd523f8eddaa8feded84f722b1ee31383f451b94208d7d1c2f5ee13e90f0d085b0d1e804ee7aba55bdcfa7e3284feed41987c1d4651672761f386f3ad169490c2db46739c8c4ecc939b58489e1b64f20d565e8e5778d04776", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:20 executing program 3: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:20 executing program 2: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:20 executing program 5: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:20 executing program 4: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="baa1f7f5eca0ecaf6653ff44101e49a5d98816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f7c0bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb5f747b093c8e57a24ac93d622fc8de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d02ad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a65f80263791f92d60d3eac8e2106845010320fff84825521404156b94ff76d7e2cf612f5fd523f8eddaa8feded84f722b1ee31383f451b94208d7d1c2f5ee13e90f0d085b0d1e804ee7aba55bdcfa7e3284feed41987c1d4651672761f386f3ad169490c2db46739c8c4ecc939b58489e1b64f20d565e8e5778d04776", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:20 executing program 1: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:20 executing program 0: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:21 executing program 3: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:21 executing program 2: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="baa1f7f5eca0ecaf6653ff44101e49a5d98816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f7c0bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb5f747b093c8e57a24ac93d622fc8de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d02ad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a65f80263791f92d60d3eac8e2106845010320fff84825521404156b94ff76d7e2cf612f5fd523f8eddaa8feded84f722b1ee31383f451b94208d7d1c2f5ee13e90f0d085b0d1e804ee7aba55bdcfa7e3284feed41987c1d4651672761f386f3ad169490c2db46739c8c4ecc939b58489e1b64f20d565e8e5778d04776", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:21 executing program 5: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:21 executing program 3: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="baa1f7f5eca0ecaf6653ff44101e49a5d98816ccc870cd5fe187851ba9082509ef2e61a9ecb54e298c631c940cdd34fdc00ae947e90cc6be2ca5bbc7fab51c9f7c0bec59c74f2a41eb570e7d9b9b53944920068653a0ab6d5822a61f556e66c9bb1be12b00a1266ddd80bc585e31271bf1916c0f3f6bb5f747b093c8e57a24ac93d622fc8de7d92ef017e7776d19eca25bce070a3ff84cb39d39a04c46126f8de8ac91b659e2fe625c419717549bec04fcf6cb09909944d7ff12491d02ad96c3ad868859c7752e29d1c734e8f3bd9864cdb932f8297a76a65f80263791f92d60d3eac8e2106845010320fff84825521404156b94ff76d7e2cf612f5fd523f8eddaa8feded84f722b1ee31383f451b94208d7d1c2f5ee13e90f0d085b0d1e804ee7aba55bdcfa7e3284feed41987c1d4651672761f386f3ad169490c2db46739c8c4ecc939b58489e1b64f20d565e8e5778d04776", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:21 executing program 2: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:21 executing program 4: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:21 executing program 1: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:21 executing program 0: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:21 executing program 1: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:21 executing program 0: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:21 executing program 5: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) timer_delete(r0) 20:42:21 executing program 4: sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000001000), 0xc, &(0x7f0000001100)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x54}, 0x4048880) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001040)='/proc/sysvipc/sem\x00', 0x0, 0x0) unshare(0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001180)={&(0x7f0000001080)=ANY=[@ANYBLOB="05000000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25160000000500040001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x3b, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x400, 0x422, &(0x7f0000001800)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x80, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xffff}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x7}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3f}]}, 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40040) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee01, r4, 0xffffffffffffffff) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{&(0x7f0000000800)="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", 0x154, 0x5}, {&(0x7f0000001480)="a4de6534115465acd7d406b5af737270b0dc6993ef6f8e0b4c7f2e37ec0dea", 0x1f, 0x20200}, {0x0}, {&(0x7f0000001540)="673f2b41235db17342a2b34a9cef90793bf7434fc7a209c446b1c0ee364887d97f5ac138f3ab7bf93d867fd1a90cf6238cb923c847e3e63482dbe7540e598c79103bfbac632c1a10818f824a8af28510e1ceb7d1805ce6f6c55ff83f16f0c099e1f7b08c702c521f9aa2f6af05d0e38ad88ac18ae5394aacd0b687389928ee1cce3b9c08c03b32795ee44a1ac2f82d949ceebb7e22c95f15cb7fe374d3e7bc42a8851f7a7dfe7c786295a33b6128e4eea25d16bba952e87ae35ae92c1b30efd6563d9ba64840c2f0473bfe5c56cc82820bcba59cff138a3ab8f4210ddf78e2309c114e425a11495e8088270d04bee08a", 0xf0, 0x8}], 0x0, &(0x7f0000000680)={[{@huge_advise='huge=advise'}, {@mode={'mode', 0x3d, 0x1ff}}, {@huge_advise='huge=advise'}, {@huge_always='huge=always'}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x31, 0x3a, 0x2c, 0x2d, 0x2f, 0x32, 0x32, 0x31, 0x3a]}}}}], [{@hash='hash'}, {@uid_eq={'uid'}}, {@obj_type={'obj_type', 0x3d, 'hugetlbfs\x00'}}, {@obj_type={'obj_type', 0x3d, ':'}}, {@euid_gt={'euid>'}}, {@subj_role={'subj_role', 0x3d, '\x00j\x9a\xfdP\xd8\x99\x9d\xb5c\x9f\xcd\xbc\x03Q1\xfc*UG\xae\xb5\x10\xf21\x88J\x8eR\xd4&m\xff\xd2\xf9\xbb\xe6lN\xb2\x04\a\xa3\xd7\x05\x1e\x0e\x9f\xda\xdf\xcf{n\x8b\xbc\xf2\'/\xcf:\xa4\'\xd9\xba=\xef \xa3\x7f.\xed\xc2\xe8\xb2\xb3\x1c\xa0%\xaa\x8cb \x12e\x9c\b\xb2\x14\xf6\xfe\xbc\xf2\xf4\x96\xc6\xdb\xd9]d\xe2\x88\x1d\xdd\xb2\xea\xd3\x98\x13\x9c\nu\xff'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/loop-control\x00'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 20:42:21 executing program 2: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) timer_delete(r0) 20:42:21 executing program 3: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) timer_delete(r0) 20:42:21 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) timer_delete(r0) 20:42:21 executing program 5: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) timer_delete(r0) 20:42:21 executing program 2: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) timer_delete(r0) 20:42:21 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0)={'gre0'}, 0x7) 20:42:21 executing program 3: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) timer_delete(r0) 20:42:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x606cf9c2, 0x0) preadv(r0, &(0x7f00000017c0), 0x218, 0x5b, 0x0) 20:42:21 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0)={'gre0'}, 0x7) 20:42:21 executing program 2: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) timer_delete(r0) 20:42:21 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) timer_delete(r0) 20:42:21 executing program 5: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) timer_delete(r0) 20:42:21 executing program 3: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) timer_delete(r0) 20:42:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x606cf9c2, 0x0) preadv(r0, &(0x7f00000017c0), 0x218, 0x5b, 0x0) 20:42:21 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x77359400}}, 0x0) timer_create(0x2, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) timer_delete(r0) 20:42:21 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x606cf9c2, 0x0) preadv(r0, &(0x7f00000017c0), 0x218, 0x5b, 0x0) 20:42:21 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0)={'gre0'}, 0x7) 20:42:21 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x606cf9c2, 0x0) preadv(r0, &(0x7f00000017c0), 0x218, 0x5b, 0x0) 20:42:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x606cf9c2, 0x0) preadv(r0, &(0x7f00000017c0), 0x218, 0x5b, 0x0) 20:42:21 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x606cf9c2, 0x0) preadv(r0, &(0x7f00000017c0), 0x218, 0x5b, 0x0) 20:42:21 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0)={'gre0'}, 0x7) 20:42:21 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x606cf9c2, 0x0) preadv(r0, &(0x7f00000017c0), 0x218, 0x5b, 0x0) 20:42:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x606cf9c2, 0x0) preadv(r0, &(0x7f00000017c0), 0x218, 0x5b, 0x0) 20:42:21 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x606cf9c2, 0x0) preadv(r0, &(0x7f00000017c0), 0x218, 0x5b, 0x0) 20:42:21 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x606cf9c2, 0x0) preadv(r0, &(0x7f00000017c0), 0x218, 0x5b, 0x0) 20:42:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x606cf9c2, 0x0) preadv(r0, &(0x7f00000017c0), 0x218, 0x5b, 0x0) 20:42:22 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x606cf9c2, 0x0) preadv(r0, &(0x7f00000017c0), 0x218, 0x5b, 0x0) 20:42:22 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0)={'gre0'}, 0x7) 20:42:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x606cf9c2, 0x0) preadv(r0, &(0x7f00000017c0), 0x218, 0x5b, 0x0) 20:42:22 executing program 2: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x606cf9c2, 0x0) preadv(r0, &(0x7f00000017c0), 0x218, 0x5b, 0x0) 20:42:22 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x606cf9c2, 0x0) preadv(r0, &(0x7f00000017c0), 0x218, 0x5b, 0x0) 20:42:22 executing program 1: syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000013c0)=""/4089, 0xff9}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/154, 0x9a}], 0x1, 0x606cf9c2, 0x0) preadv(r0, &(0x7f00000017c0), 0x218, 0x5b, 0x0) 20:42:22 executing program 4: syz_mount_image$vfat(&(0x7f0000002840)='vfat\x00', &(0x7f0000002880)='./file0\x00', 0x0, 0x0, &(0x7f0000002d80), 0x180c40d, &(0x7f0000002e40)) 20:42:22 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0)={'gre0'}, 0x7) 20:42:22 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000200)="c0f6209d7636b6e337057c367a8ad130", 0x10}], 0x2) 20:42:22 executing program 5: pipe(&(0x7f0000000700)={0xffffffffffffffff}) ioctl$SIOCX25GFACILITIES(r0, 0x541b, &(0x7f0000000200)) 20:42:22 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0)={'gre0'}, 0x7) 20:42:22 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x4) 20:42:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x50, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 20:42:22 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000200)="c0f6209d7636b6e337057c367a8ad130", 0x10}], 0x2) 20:42:22 executing program 5: pipe(&(0x7f0000000700)={0xffffffffffffffff}) ioctl$SIOCX25GFACILITIES(r0, 0x541b, &(0x7f0000000200)) 20:42:22 executing program 4: syz_mount_image$vfat(&(0x7f0000002840)='vfat\x00', &(0x7f0000002880)='./file0\x00', 0x0, 0x0, &(0x7f0000002d80), 0x180c40d, &(0x7f0000002e40)) 20:42:22 executing program 0: pipe(&(0x7f0000000700)={0xffffffffffffffff}) ioctl$SIOCX25GFACILITIES(r0, 0x541b, &(0x7f0000000200)) 20:42:22 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000200)="c0f6209d7636b6e337057c367a8ad130", 0x10}], 0x2) 20:42:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x50, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 20:42:22 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x4) 20:42:22 executing program 5: pipe(&(0x7f0000000700)={0xffffffffffffffff}) ioctl$SIOCX25GFACILITIES(r0, 0x541b, &(0x7f0000000200)) 20:42:22 executing program 0: pipe(&(0x7f0000000700)={0xffffffffffffffff}) ioctl$SIOCX25GFACILITIES(r0, 0x541b, &(0x7f0000000200)) 20:42:22 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x4) 20:42:22 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000200)="c0f6209d7636b6e337057c367a8ad130", 0x10}], 0x2) 20:42:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x50, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 20:42:22 executing program 4: syz_mount_image$vfat(&(0x7f0000002840)='vfat\x00', &(0x7f0000002880)='./file0\x00', 0x0, 0x0, &(0x7f0000002d80), 0x180c40d, &(0x7f0000002e40)) 20:42:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x50, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 20:42:22 executing program 0: pipe(&(0x7f0000000700)={0xffffffffffffffff}) ioctl$SIOCX25GFACILITIES(r0, 0x541b, &(0x7f0000000200)) 20:42:22 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x4) 20:42:22 executing program 5: pipe(&(0x7f0000000700)={0xffffffffffffffff}) ioctl$SIOCX25GFACILITIES(r0, 0x541b, &(0x7f0000000200)) 20:42:22 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x4) 20:42:22 executing program 4: syz_mount_image$vfat(&(0x7f0000002840)='vfat\x00', &(0x7f0000002880)='./file0\x00', 0x0, 0x0, &(0x7f0000002d80), 0x180c40d, &(0x7f0000002e40)) 20:42:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x50, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 20:42:22 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000200)="c0f6209d7636b6e337057c367a8ad130", 0x10}], 0x2) 20:42:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="c4864432", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000000bc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="300000000000000084000000010000000000000004"], 0x30}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x79, &(0x7f0000000100), 0x8) 20:42:22 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x4) 20:42:22 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 20:42:22 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000200)="c0f6209d7636b6e337057c367a8ad130", 0x10}], 0x2) 20:42:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x50, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 20:42:22 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x4) 20:42:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f00000001c0)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x2da) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x1c500) [ 70.944971][T11125] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 20:42:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x50, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 20:42:22 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000200)="c0f6209d7636b6e337057c367a8ad130", 0x10}], 0x2) 20:42:22 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) getrusage(0x0, &(0x7f0000000040)) [ 70.997442][ T35] audit: type=1804 audit(1610311342.854:2): pid=11132 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir140900023/syzkaller.bwLE2R/53/file0" dev="sda1" ino=15829 res=1 errno=0 20:42:22 executing program 2: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") 20:42:22 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x200044) wait4(0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) [ 71.152391][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 71.152739][ T35] audit: type=1326 audit(1610311343.014:3): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=11140 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x7ffc0000 [ 71.202627][ T35] audit: type=1326 audit(1610311343.044:4): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=11140 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e219 code=0x7ffc0000 [ 71.290388][ T35] audit: type=1326 audit(1610311343.044:5): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=11140 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e219 code=0x7ffc0000 [ 71.396035][ T35] audit: type=1326 audit(1610311343.084:6): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=11140 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x7ffc0000 [ 71.477748][ T35] audit: type=1326 audit(1610311343.084:7): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=11140 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=157 compat=0 ip=0x45e219 code=0x7ffc0000 [ 71.539842][T11125] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING [ 71.570374][ T35] audit: type=1326 audit(1610311343.084:8): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=11140 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x7ffc0000 [ 71.595672][ T35] audit: type=1326 audit(1610311343.084:9): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=11140 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e219 code=0x7ffc0000 [ 71.621991][ T35] audit: type=1326 audit(1610311343.084:10): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=11140 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45e219 code=0x7ffc0000 [ 71.646827][ T35] audit: type=1326 audit(1610311343.084:11): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=11140 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0x7ffc0000 20:42:23 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) getrusage(0x0, &(0x7f0000000040)) 20:42:23 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x200044) wait4(0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 20:42:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="c4864432", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000000bc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="300000000000000084000000010000000000000004"], 0x30}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x79, &(0x7f0000000100), 0x8) 20:42:23 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 20:42:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f00000001c0)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x2da) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x1c500) 20:42:23 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) getrusage(0x0, &(0x7f0000000040)) 20:42:23 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x200044) wait4(0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) [ 71.813976][T11171] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 20:42:23 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffc0001}]}) getrusage(0x0, &(0x7f0000000040)) 20:42:23 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x200044) wait4(0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) 20:42:23 executing program 2: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") 20:42:23 executing program 5: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") [ 72.122552][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:42:24 executing program 1: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") [ 72.232207][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 72.314289][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:42:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f00000001c0)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c", 0x2da) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x1c500) 20:42:24 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) [ 72.587540][T11218] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 20:42:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="c4864432", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000000bc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="300000000000000084000000010000000000000004"], 0x30}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x79, &(0x7f0000000100), 0x8) 20:42:24 executing program 2: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") 20:42:24 executing program 5: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") [ 73.099704][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:42:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f00000001c0)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c", 0x2da) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x1c500) 20:42:25 executing program 1: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") 20:42:25 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000c1030000030000002004000000000000800200000000000000000000808000005003000050030000500300005003000050030000030000000000000000000000fe8000000000000000000000000000bbff020000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f626f6e640000006e657470636930000000000000000000000000000000000000000000000000000000000000800000001d000000000000000000000000000000000000500280020000000001000000000000000000000000000000000000005001686173686c696d69740000000000000000000000000000000000010000027465616d5f736c6176655f3100080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000400000000000020b61a000800000000000000000000000000005800686173686c696d697400000000000000000000000000000000000000000173797a6b616c6c657231000000000000000000000000000004000000000000000000000005000000a600000000000000005f0200000000003000434f4e4e4d41524b00000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000a800d0000000000000000000000000000000000000000000000000002800434c4153534946590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000212f00000000000000000000feffffff"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) [ 73.152856][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 73.248418][T11240] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING [ 73.265146][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:42:25 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="c4864432", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000000bc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="300000000000000084000000010000000000000004"], 0x30}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x79, &(0x7f0000000100), 0x8) 20:42:25 executing program 3: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") [ 73.712189][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:42:25 executing program 4: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") [ 73.845883][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:42:25 executing program 2: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") 20:42:25 executing program 5: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") [ 73.961544][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:42:25 executing program 1: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") 20:42:26 executing program 0: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") 20:42:26 executing program 3: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") 20:42:26 executing program 4: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") 20:42:26 executing program 2: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") 20:42:26 executing program 5: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") 20:42:26 executing program 1: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") 20:42:27 executing program 0: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") 20:42:27 executing program 3: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") 20:42:27 executing program 4: socket$inet6(0xa, 0x803, 0x2) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0xa00b1000, &(0x7f00000000c0), 0x0, &(0x7f00000001c0), &(0x7f00000002c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) clone(0x0, &(0x7f00000003c0)="5e7bc5c90cd238268eaeaabfd1c41d35a632b4fc6d5b4f995b4cf6220ad21de6b8ce4eea414ee1500a3aee9f8e10600a8f6c617fc784c6757e7b3b8d785ad86d8b493a2cd0b2b73166c9cbfc8a38a242bcfdbf13dcde6f017613248ea2812f3219d13991f3330815c2f965558c00f1a6fb218357d0974f1b5244f3397c794924f9d32ee3d8ef83aac2757116ff9a35fcd97f7b4e97690ef36c2b4cb38814e76a4a0792da06cf147df8321875644269db1bcc5f090a2470591e38f669aea44606fbaf5f4b7e3860aa401f7f0bda6f74363905607699f3485d08fe1887a580f9aca2bdb74f686794bb0864", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="a79d2729ffd5222233f30c5094b1ad57d0cf559246061975568dfa31fa7dfa1411db1654fbb3fd4a81dea6bb1d67b9e6971122c58ba55d40081839b95b3997d1d3e983e3768faa5b07004bb792e5450f6c1d57a9f5daae7a5b632b23bde1fbb17a1a6c5b7cf830f964020a1b45d4a381752c8c1bd2fc44a993ee21d572b8ee29717ece2091ea41ad2717867e358707f983bd41f639d5d130d7") [ 75.648688][T11329] ================================================================== [ 75.656782][T11329] BUG: KCSAN: data-race in do_exit / get_signal [ 75.663025][T11329] [ 75.665328][T11329] read-write to 0xffff88812dac602c of 4 bytes by task 11325 on cpu 0: [ 75.673460][T11329] get_signal+0xcaa/0x1440 [ 75.677877][T11329] arch_do_signal_or_restart+0x2a/0x270 [ 75.683407][T11329] exit_to_user_mode_prepare+0x109/0x1a0 [ 75.689017][T11329] syscall_exit_to_user_mode+0x20/0x40 [ 75.694453][T11329] do_syscall_64+0x45/0x80 [ 75.698850][T11329] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 75.704725][T11329] [ 75.707038][T11329] read to 0xffff88812dac602c of 4 bytes by task 11329 on cpu 1: [ 75.714644][T11329] do_exit+0x59c/0x1690 [ 75.718780][T11329] do_group_exit+0xc8/0x170 [ 75.723263][T11329] get_signal+0xd5e/0x1440 [ 75.727677][T11329] arch_do_signal_or_restart+0x2a/0x270 [ 75.733202][T11329] exit_to_user_mode_prepare+0x109/0x1a0 [ 75.738816][T11329] syscall_exit_to_user_mode+0x20/0x40 [ 75.744250][T11329] do_syscall_64+0x45/0x80 [ 75.748657][T11329] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 75.754527][T11329] [ 75.756826][T11329] Reported by Kernel Concurrency Sanitizer on: [ 75.762948][T11329] CPU: 1 PID: 11329 Comm: syz-executor.2 Not tainted 5.11.0-rc2-syzkaller #0 [ 75.771683][T11329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.781713][T11329] ================================================================== [ 75.789760][T11329] Kernel panic - not syncing: panic_on_warn set ... [ 75.796315][T11329] CPU: 1 PID: 11329 Comm: syz-executor.2 Not tainted 5.11.0-rc2-syzkaller #0 [ 75.805052][T11329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.815082][T11329] Call Trace: [ 75.818343][T11329] dump_stack+0x116/0x15d [ 75.822655][T11329] panic+0x1e7/0x5fa [ 75.826529][T11329] ? vprintk_emit+0x2e2/0x360 [ 75.831188][T11329] kcsan_report+0x67b/0x680 [ 75.835670][T11329] ? kcsan_setup_watchpoint+0x47b/0x4e0 [ 75.841194][T11329] ? do_exit+0x59c/0x1690 [ 75.845503][T11329] ? do_group_exit+0xc8/0x170 [ 75.850159][T11329] ? get_signal+0xd5e/0x1440 [ 75.854741][T11329] ? arch_do_signal_or_restart+0x2a/0x270 [ 75.860442][T11329] ? exit_to_user_mode_prepare+0x109/0x1a0 [ 75.866227][T11329] ? syscall_exit_to_user_mode+0x20/0x40 [ 75.871836][T11329] ? do_syscall_64+0x45/0x80 [ 75.876408][T11329] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 75.882460][T11329] ? plist_del+0x1e6/0x200 [ 75.886851][T11329] ? futex_cleanup+0x7e/0x930 [ 75.891520][T11329] ? uprobe_free_utask+0x1be/0x2a0 [ 75.896613][T11329] ? __down_read_common+0x14e/0x510 [ 75.901790][T11329] ? mm_release+0xf9/0x1c0 [ 75.906184][T11329] ? __list_del_entry_valid+0x54/0xc0 [ 75.911534][T11329] kcsan_setup_watchpoint+0x47b/0x4e0 [ 75.916885][T11329] ? __srcu_read_lock+0x2c/0x50 [ 75.921718][T11329] do_exit+0x59c/0x1690 [ 75.925857][T11329] do_group_exit+0xc8/0x170 [ 75.930343][T11329] get_signal+0xd5e/0x1440 [ 75.934743][T11329] arch_do_signal_or_restart+0x2a/0x270 [ 75.940270][T11329] ? __se_sys_futex+0x2a8/0x390 [ 75.945102][T11329] ? __fpregs_load_activate+0x103/0x1f0 [ 75.950644][T11329] exit_to_user_mode_prepare+0x109/0x1a0 [ 75.956264][T11329] syscall_exit_to_user_mode+0x20/0x40 [ 75.961701][T11329] do_syscall_64+0x45/0x80 [ 75.966118][T11329] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 75.971991][T11329] RIP: 0033:0x45e219 [ 75.975860][T11329] Code: Unable to access opcode bytes at RIP 0x45e1ef. [ 75.982801][T11329] RSP: 002b:00007f08338abcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 75.991193][T11329] RAX: fffffffffffffe00 RBX: 000000000119c0d8 RCX: 000000000045e219 [ 75.999140][T11329] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000119c0d8 [ 76.007098][T11329] RBP: 000000000119c0d0 R08: 0000000000000000 R09: 0000000000000000 [ 76.015057][T11329] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119c0dc [ 76.023007][T11329] R13: 00007ffc96eea96f R14: 00007f08338ac9c0 R15: 000000000119c0dc [ 76.031570][T11329] Kernel Offset: disabled [ 76.035877][T11329] Rebooting in 86400 seconds..