[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 110.815219][ T31] audit: type=1800 audit(1563290157.876:25): pid=13059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 110.852567][ T31] audit: type=1800 audit(1563290157.896:26): pid=13059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 110.872810][ T31] audit: type=1800 audit(1563290157.906:27): pid=13059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.115' (ECDSA) to the list of known hosts. 2019/07/16 15:16:12 fuzzer started 2019/07/16 15:16:18 dialing manager at 10.128.0.26:35529 2019/07/16 15:16:18 syscalls: 2350 2019/07/16 15:16:18 code coverage: enabled 2019/07/16 15:16:18 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/07/16 15:16:18 extra coverage: enabled 2019/07/16 15:16:18 setuid sandbox: enabled 2019/07/16 15:16:18 namespace sandbox: enabled 2019/07/16 15:16:18 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/16 15:16:18 fault injection: enabled 2019/07/16 15:16:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/16 15:16:18 net packet injection: enabled 2019/07/16 15:16:18 net device setup: enabled 15:18:13 executing program 0: syzkaller login: [ 247.229963][T13227] IPVS: ftp: loaded support on port[0] = 21 [ 247.416630][T13227] chnl_net:caif_netlink_parms(): no params data found [ 247.482242][T13227] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.489569][T13227] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.498646][T13227] device bridge_slave_0 entered promiscuous mode [ 247.509660][T13227] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.517405][T13227] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.526562][T13227] device bridge_slave_1 entered promiscuous mode [ 247.566041][T13227] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 247.579060][T13227] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 247.617664][T13227] team0: Port device team_slave_0 added [ 247.628036][T13227] team0: Port device team_slave_1 added [ 247.938502][T13227] device hsr_slave_0 entered promiscuous mode [ 248.163661][T13227] device hsr_slave_1 entered promiscuous mode [ 248.548402][T13227] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.572229][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.581716][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.599248][T13227] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.615702][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.626029][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.636614][ T2863] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.643948][ T2863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.704832][T13227] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 248.716690][T13227] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 248.732699][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.741641][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.751869][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.761080][ T2863] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.768378][ T2863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.777359][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 248.787775][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 248.798141][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 248.808383][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.818328][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 248.828587][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.838509][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 248.847882][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 248.857937][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 248.867431][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 248.885533][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 248.895277][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 248.941209][T13227] 8021q: adding VLAN 0 to HW filter on device batadv0 15:18:16 executing program 0: 15:18:16 executing program 0: 15:18:16 executing program 0: syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x0, 0x0) 15:18:17 executing program 0: syz_open_dev$sndtimer(&(0x7f00000b5ff1)='/dev/snd/timer\x00', 0x0, 0x0) 15:18:17 executing program 0: futex(0x0, 0x8c, 0x0, 0x0, &(0x7f00000000c0), 0x0) futex(&(0x7f000000cffc)=0x4, 0x8c, 0x1, 0x0, 0x0, 0x0) 15:18:17 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x73) getitimer(0x2, &(0x7f0000000000)) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000002900000043000000006364ff00202ce1"], 0x18}, 0x0) 15:18:17 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='\xbc\xf6', 0x0) write(r0, &(0x7f0000000300)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0x19, 0x4, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000100)={r3, 0xfffffffffffff000}, &(0x7f0000000140)=0x8) getsockopt$inet_int(r1, 0x10d, 0x90, 0x0, &(0x7f0000000000)=0x3c) r4 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x22c400, 0x10000) r5 = socket$key(0xf, 0x3, 0x2) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000001c0)={0x8}) 15:18:17 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x800, 0x0) pidfd_send_signal(r0, 0x6, &(0x7f0000000040)={0x26, 0x8, 0x8}, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000140)="5acdb4d4cf32328182fbbe75e5cff47c3c14d1947027697ddeb8413c9abf0b7627001d17896c6fce1d6d715fac5655e9408ff585d0ec0d90877b551551c19e1975dd31f2fe0b584763f1e9fbfa46ff3378459683e3cfaad4fecc46904f69ba4bf5404b299c1352b778406d43f676ea9e61439d9a59765abc79affeaa9f3afdcf6c4370b152ca69a6ff76a446c0ffdebb9de971e033dd9ea6e189a521e830d9de8374ae9d3fb7901399401cdb4b9cab2ca7201d5710e3f3a405279bf2d69a3277e1e46c21", 0xc4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000240)={0x100000000, 0xfffffffffffffffb, 0x9d, {0x77359400}, 0xfffffffffffffffc, 0x81}) r1 = socket(0x3, 0x7, 0x3ff) write$P9_RREADDIR(r0, &(0x7f00000002c0)={0x87, 0x29, 0x1, {0x3, [{{0x1, 0x3, 0x1}, 0x4, 0x7, 0x7, './file0'}, {{0x0, 0x2, 0x8}, 0xf9, 0x6a, 0x7, './file0'}, {{0x8, 0x0, 0x6}, 0x2, 0x2, 0x7, './file0'}, {{0x12, 0x1, 0x1}, 0x3, 0x40, 0x7, './file0'}]}}, 0x87) ioctl$RTC_VL_CLR(r0, 0x7014) r2 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x9, 0x80000) sendmmsg$alg(r2, &(0x7f0000006ec0)=[{0x0, 0x0, &(0x7f0000004680)=[{&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="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", 0x1000}, {&(0x7f00000023c0)="6b90504a5315107d2ca331f4a7b9f39243fdc2faaecc0f4aaa19abaa02ac06d08e3fc8f686e435b570c1e5e49f5332798aba167ebf63fddccb5eb4988ee49c10864504d07cf2ceed0d0557be4de05be660758230a853f0c9cf3d0058236f2619fe0773df05285f3ffdad8d75bc1c9a4762baff4c7702a672831099fd0c3afae2eedd8729434da1d2eaebb431455c48ff4fd371c8faf406b40f347dc60d794de5d47899a129e3c9a41cdd6f1a52a5a60e35def0d6633484504e459dcedd5bfaa3c5d7c68192ce94017af6bc7474e2fe7f5c0b92138490fa159bea92555042b4336e1f59944cf021fbfcd619ebd3e8c76ad2f432705da6988b0df4386945d3e137c5895535ee9e51d3aac1c81ba2a2dd4103513a4b74d753d78ea613d460e5021034a499e5fa9ce530f0ddca5dd8c04ed2c5501072abcb714dafdbac8925088fdaf35663a7f7c71d0c00f52793dc071815c018a3b8a31fc73212397911a5a74fb620f26f1eed1ab293bd2bf2559ee22b6f81102ddbd822aaadd3cecd9fe37b86b7ffc172c49059852720db3f8e638ae03286daa682ea25abd631680c0077b2e8f9d9a00e5baa17a6f70a5f3b1f86cf7cd8ca86271088d2b9defc73366ac0988be3afa00a1690dfac81fce2240a93ba7257bf2fad034767f3d804a1495e73b23e704d45be8c18e940a2f886b6cfc426a742549f5f604544bda4fbf4d2541d0eb8f845d44a4604e2649c0c426b723c278ca87556bb986dd70ad98197caf5d5055e76502b368ee5c706924634f688a6f0b9854d466589c51cb053e0b9a4f8bc34a88eeb2bebbc5d67b6af38c661b326a64d4202e1106c1773159f5b240bfa79f47083a61062f6cdb39cf3d5442e20cb993a93b4e3ed1debfc655dac68d6f501a4b3b9ae4906b4bf0dd71b6eb9b36df216f41172163f31288d365086d473cd73009a66778aab2275b913b8dc88265ae0d399486f5bd0b6ae9be175350ab75f8face87ae03d662c38e712b68b89e9f3865bdfed9dafed821836512f9296e030448e9c60354758f151e83addc4b8d28ebabbb18d44bf0eb8801f9e4fd7754cc448120b7bbbed4089430ee8d9816a0f25f9c31deed636abad7b8832b3e2aa1049ce36ca527f3cd74e6701d984d03e0c3fd7d484ba82e23eba1edfdca17cd98946cb5a2427a4a7dab279e718ac2afaa578e0849e7a831d9b4863f6f2c4a3712fa78707dd12cb5817ff0b6947c060233fae9c563674d5e05bd7ce218b2b99e9188e06cea96e384ec8e8bad02d563b77c6afb54f77780abfbcb27f305a86f61a42d87582f0e767d6be36f846993746ad6750d48c155b7f1b434e413deb26f2559acb023089ba3bde79bed1612f9ea1285f5541ba1c698b0d193e4fe394e5855928cc6f0d12deae10747ddc9e5e720bd22543ba24c0233adbc94317fcbf6b45d0b84a41a2b48a2e521ab9d02716a8ae1395d394c4ead502e2fdc85bfcece54db8d4cfbe84a7cd8fe14c3b8d270a2f9606b5a403418d8a822d401fb65adadd25199c7ff11545d200406e57a45f82d42833a84e6c729d78c704071ff7368b13a1fd4ec387997ce44fce64a02ac893fe060fe46bce13af536987f084d71543c8572b1815b3fbcd869f0b6e419ed5b3d2609071be7fbf53f6b59ed78e056a230d0fdf6f83e35ede62a3f57c1a1936df934d58ce697fc2c4f3c97843d6aa0ee5f45b51a8e1444510bb6be1111102de30c16a207665643cc33e9d29fc64bb37bedc07781e60f9f474cab391c2d84c26fe029e38c61be2631e85f5ee419d0b12eee5477e9f9944558b38aee5fd3ffc2ab59bf36b2b991ddbeb23e6ff08c954b29d4cb26672247f7c3fca13690f36af6eb3786e36ac5b2a9d72447c7c646572df579cc57637f932a0a2c2d1da1e9207f0389e96f8a8563aa3a389910ef9ef7642af594a75f7f06078ee5866078d4a2ee0100d7eb0224787a488531afa7cdf285d7b75a91758b3a299662f9041d65886b19a1407636af0ea37b54f69dec58d217b7630abead73c19a3e7f79e905150751d164e08b558500782d961803f3de0110cfa83057cff56705cd5904ce0774e3ff1cf46179b0045387ab9e59cc7b9e0328e0acaab83af7c330eabfc8c6611b635e88df953cd27d3b0716c7e8a70444109a6adf51de1113c9ed34b865cb3243ae3a5493593afce742559b00a53f1343f7ce851a8f08d372ec9a79527025fbdda2a84513f7412bbb4df9be6cbd82ca85e1a445338d297021b693d7c2155f0fa4003d052626eebbaf21ef2c4dd9d9b1d358fc75b7d6f4f43eaf9ef2ed1dcabc8ca178deb5d6de0488bb54b4df13b64d0e9471bc55dc6537fe0cc2e71173567350907328c117b5ebb5cf42f23e85cd1608cb3608ec02da3e35c052f09b690d8366aeda3509f63533844afb61caffca5b048870031b74b5678dfe98466282fe5df68a8a40a0193eae8cd6920b03e173d654f6482ba267230b1b340050159f00b0857b5e6606a5b1c412f3c8605619a64f4172159f69cd9c2510b328fd31074068b5e77e93afa4dec4a90fe62c615fea089cf49c899a5873b9113ba36151ceb6502361dada9bcc867f29c6a8de63251ffc47811e86058b79272b5a953669a5c9a04f4851847f27198b3e57f88c3710f968d0653f2b699e10e84fe47a92a72c29bda196045624ee99ae861c5e51314d0e5751d7db4d99dc3df05c808f516615b4a9b8057fa93349372aeaa7e3f73ed949acca7e95fcf5288b258eefd96f2f5c37a63687cebfe24b8d6fa1e00a9b89ac48ac7acad9cfd9a155b4499bc9e0f82b68aefde28970eaf676e9e008372d88122acc507c52419b418eb9d8b67d04f407fee95ec00fe96c18adc209beaf5556a38b6982ad22c160b5432595bd2247ea3f1ebb4693438a7fe523112588d0bf1544fb2e79c6a726c40774c42bbedd3f212f676eec8c0180fb1418780c98e741bb1e4a54535c52778543f78e326aa1689729863b6f9609ee2b326df66232616d2f00ba1dc0e9b330d65d483d451b8cb0e1f2534d170ab9d284948af83aa58f8b47e64f7da5702b1ed53dc21c9b2095a0c16748ebf9fa1cef34eaf7f94e464efc0ee8d03a8b5c4ab3366cb968e17e7fb60c8de8fdad0783bc23e3d42a477e1c1739090e0aff22fd8696d73fcc1f40e2e7b95468d55df3998fa6a7a5ee7fae40a904ae7877337faeef4d402e74f6a2ef5890de958b5cc3a52369512d44892ba8bb8ab12e07a484c8fbec4646e3926caf3abe5426e2085cd22cc7a5f8c760911efd37a48a2333c6a66f0f354cb11fcdcf43321392e1a8f407573002a601aacdb9e120a4f5bc6534b7a3f81e1f23ac0cf90cd0bbcedfcfa1b2591d37181a720acaf7724d68c7ad752573bbb7677ea99b2fa2646f796ff54f7d62e5b521f13d3b37fe00cbfae031a394442af84d9c33de06d159fe3662ef805ab6eb6bacfbd3440ef8d5d153806d0870126abe122343d38cb8a1d8992f82ece0c9da4fe7f7b0d9faa6d6f5f6c952dc22ed4a34dc241ec210c34362b6bfa1038922753085c5d86d921434c7abbaad2931336be4a7f27f0effa6beb958207ca318e228847b191cea9a1e31ea7b6009f2c09a5be476bc34629ad807b267548f7334bb4779b5f8c3acf838e706f0a1bcd22cabde1d5a42632a721718a0438805cd378155861f2cb946eb47656cdff36e0b45a298cecc8eb817c2bdf92f8e547c651e23cca5e018d25b625fa06c25517cf273131e605cbdc79442b53690f8bf5ae10fa558ded88cf78a4a34f76f9de3269c76416a5a795da01a7a691d683ae77c43349f6833705a351b1fb1ef944289cf31f7d00ad2e9ef5684aca6125c0cb32676f69b54c8b48455b540abc95be66a09361dc717227d3d133d8aeca92a430dd40caea781d53d06c99e5d58a982e06c3fcc225e50374d10f67e1e638b7da395a4ba08762e63dde648bdfb0e9f8ef3d38cc7665f4ee1ed6c879c90a69c2ad828679daee48e301ece2a4089d3d105cd66878cf9cb927735c539a684b18d5fdc4ea55661c353840bc9e0a3d376c5911786f7a4bc84d183fb15df98af8c25fae82cb7132eaef3c61345aa60c35d7f172722d94560fa7a13898285718620a3d75e3dbe4f2f3ab90727cd4ee6817a69b0b43c7601400edaa59fe85ac6dd7c489a5136e73de3a644106c241b6a0bab0e1324901c33e72cad77571c573e27f07dbe64123b719b150722fd5bea218c2ee38b23ba385bfaa252bc375e1f8557a51b32bbeba98698f37c4913ba784b2b9ba8a41a74b17840d9afcf7160d4c07fa756dff5cfec8a830dca0d331054f566e444eefe10ae24dc6334308721c9c5769cd738ae76c07d81309f36e99e36824377ac82e42b049a8af9295a543d903b03cd4697c57e6a00af6efc284d1e32dbcab979290a8977d689cda7fb867ac8e05a82301db1843a1086e5095c9d17f079b6d166a15af21f87bd8a937a7247a83538db1fd66bb6961e00a874300c4d2f7dba7d37a4890b1fdafb0d4813599af7b0fdaa1abd48ca09bd82a584f9d2493f461e32d9188dbf422cd08c75009f244bee17f4ca9c77a1052a67b3c29d902967b98dc85c930fd114ae94a97563d0c4f02cd6b2bfec3a8e9b380143812b493ee859ba4f04a925d2881fd8035df596c3d4f2b448f3d38b86b7e607a91d1019b68bf4725f3ba969b501e45a9de0a3ec99a5019b89405192249794c0213be8c4ecd70a713fe8cd92b7bcee34a8631c73fcdbc16eeca1ef90b827b3420cde56511dcbed83bd4026f3f54a8c6f0fa64949338c513f56371ccebf33705cb82175e1cf38c3fefa1123f14e5b906fd5d6f6b924b4912042fc3ed9c28fce7c3bbaa248ac88220919d0ed3cf3339fe9932fa9f535f3b42f37cd13f32e51719e4e8143dd3a4ecb37c33b2234306ec6426439800fa1e1dec2443dc14534c270dbd442885639850f4b970bf1cf50f66624d1c75c1015aafdda31afbac0ce2043d94db0ad311fab81a730736418b08feb46dbe921039405b5d602d965e01d107bc62c13ca19a23de09dc26c2873a7baaf12a520643c70e4a3e4f01dafbba5269d0961b0ee0fd6bb21208f04640bda70824712ed7346d4623ebf8c72a4b94c4e55e1b0e186d6ec47f75d1790bc644220688ce1cc4fc735de4b94ea9d35f6e07fdd9a290cd969ae38f3357435253d6ce40fe380e8b8a7ab84af50d622cf9ab1bbdcd10f0cb084ffb6f808ccd5e059de5d0ac795860eefd8e79bff5fa1a65ba703e2fee5cb6cc83801ce7da860d79d6b04eb3f364a07bea62a995d67d0fcb66e50f5ab5bb0d6a8002b98b028e588c364cc8ffb6f5ec4c00e7ecdea5b6d77b8556ef70e9901c3a94f93556b11d638b5d0991b4121610a3828d0a93bc1fdbc2e227e0290cbd5cb6a32ea13f8bf1b57152249f0f83b2cb2ee559055d5685ed3c978d21252d532c09da42a627c41831d70d043bb367ed581a2f00391d3e06b4ee2a70271d5d84e26a22f3e2c7dc4359877316c16594fa6785abbeefc4050fb1c431c2838119a01e5f6432a509ad083f6faf8c4da6b8adcf9630eafd47c85d5c759c4f1a4311f79ad958eb5f5df49a3b57757afe085342b70ad50b125e4babc76a871819f0795ebe71cbbc67b594f76a59ba63362e2952f04a044894114a4c52f86c0eb619350bc2bd6e77a19936e8bc24b020eb0db72426a0b5c914bebbc67bf4b432338bba6119761583087e7cb38aa7afbe5489a2e4307099cf3c29d3825d96717522769d2653e4486f4186c76e421fc9ce8c076da5be56d5c11ac5826806", 0x1000}, {&(0x7f00000033c0)="315c53ac382ec7364dbece15a1e34cfdf06f42a3152e638a204a42bfc53dba1142d08e72c06a14e81aad24744840f6292495dcef941caa7e5042f572a15b597ad22327d09c02a889c7cbebc896ec40dcb4add420e3e56eaf71f40b8703fac1195ce3c2c68dcc02e3fd05380e9d1a1ca5748c71e82b08207bd6", 0x79}, {&(0x7f0000003440)="e5d01c5ad81a176baf25cf5581e4d756710b8d8ea1e80d3d5a31cfaf75b5", 0x1e}, {&(0x7f0000003480)="d961b83dd9bff6e88b2d947cec549d9f28c7ad0cef28c0963c76b96caefb62e2683f6eedfbfd832d769b254aa08b19cb19da85deace41a5016048f42fd7996194517edee43e558b0b3f1b6b716afe0fb3447c02816da3e", 0x57}, {&(0x7f0000003500)="f1041703d73aa904d92941c27a0f3e588e4c1d54dbf43c558678e85140f93816b414f375a69027393b6dda005edda92799e1d268a64b23474bc654e69f1642f71f7cd6cc0037", 0x46}, {&(0x7f0000003580)="53315338a6384a4cbddc33abe4f47ff88956d6f2ff815bade71d50d9052d796202e2010129be2815d7360d3c5f11fffdccc4d01ae0bdcc3b003b0cecfcc78b44c2d11054534efb0243b39c7fa658e6ddc06c147ef15be3be1a86f3891aa3ce1010ba882c9dbf6375b922bd9ed70665ae5ef5868e8d19752bdb4449b1123c78e2f11ee6c39aee28d617614837ba57e23e76413eb48e0381ae83954b52835331f375580ba28c1bd26b44d6f5e3efd4a84e1c1795d6a3b5fc85c7026202d96842feda5e229dfb11b5e88a3a00c0fbeac9f0e6e166e91ac508", 0xd7}, {&(0x7f0000003680)="e3d0cfa86f8912334a6bb60ebc1f3390a7ff4d3fe68ec50fbe30ce777963c3b454c53cbd986ac2637b3a835eb138a543450e1f01f9f3dec0d7118e7bfa65123f443ab5a36db055dd030e21c6b7a96cb533f2bc512b69d14485172f8d48495f19f6d37a192341cd5b379084f5a5e7e825b0542df3f1b0da9ec1a571fecc4c4538253eda00d3b901e83cb08199e5ab8a054e8a765b7f82bde5db6c120b6fd56ac4a9c198991fc29220bb135b8ffc73301353e6cb2fe1ed6e630712ccba69fe2e3c802e07d6b2ba588dadedda5d5802925becbd5e10e2d2dc839665d35cca4821a23f4cbc508ce527db0e7e61d04979711c9f022ba0164fed031fb9d971ca2297869ce3293a58b7ece464935fb6ea530dd821afeaaa2e4e35f64e9a82bb9eff1cac26c045652cd4d1aa686fe4bf2d307a73954ff9847dc1819da11d79ca50b550a91a7fb824db2235a13ae750e70a4782671a38760a29e699a71dfc47387bcc9ce15bc319f58c9843d1a262c05727291bc7c041f7c265e995b4fb4dd37c1421beb425e87f95ca44e12dd768debb4a892979e4093259f85d10d7da3b32dd47ccc9dadf54b8efbd8264bfe6042a3a20460b770108d29796ec87623b9cd028cafdaf3d004fae5673a3bf7fb75b60c8bdadb1cabb2687eeb372276d0c9e49be1c738986e507602c20f28d64af332537d2836ade41165322ffebdbad699b98d7fb25bebbcdb23ea383076dd4c7b9a70247e184e0bd563b0b78cff82a98f296e1646ee8592ba4031b9ea4a64098dab55527e2d612901695edb348eb67810b25e145f532dd756eb83c825720a33a9d2f2eb3dbf0506a156a8114c2039b8a54ac5854574e6637eae1e5943c19e312d40b0457ae5d43e1a903ff8451a8020271da3abbeade6f8cfcfe8f2c274d11ee7fab84b4b96503c345e97889a904b93f66e4d8205cc96db399ad9f094e3a13e6fc02ea86b481fccc9ba5e3598ec6e9d7159273848060014b7b21f5d86448bef3c091760fb32260912e439f064d42802528592c1502e6d70895265aa7b55a631e8d372e6aa679d8105b62e0afded868d1c23f950d3c47139fd9af72e5910c97c1c42a944b2c3911a298e11f90f16b75e693741100761e040ec52dedc6d15ca5187350efe3f6c9d5178ab5e5ee7a273ca66c377f9d4885155e4d6621d3db24f9e6e3dc6f5ab611d2dfa00fce8b6f5b3f5d140ff9514b618d339350c33800a6682eea0a96ab622f701521940f33c932677d9590a903745b8404260e2fd355fc1071e631086a355d73bf86817c51adc4ee2f6849fc3a05637f837b69c59bbe4a3ea08f4dee1fa3c3e3a629a4d786a2f6580f2e347eb72395ddbfe691327c9d60694c976cb99da0472042423e86df6e18430cc73ca598cd67484811c30de4e87b19e903e4a3b63e7bcae13bee1fb7b78c359f516a7ffa3380582cc94a1f62149ebe6dfcfc60db18b4481c7271455f6df4473392ecf491fa693a6150ef55c3507122d0465b32beb241d92a95b4e160ed3f694461326c626d7caedc77b7d5d87cdfd770cca409030726c62bb16f660daf888d947ebad8941872de841d4492d6f94422f9041656dbd52b1fe36f9fc992302a3f5ac4cb6f0594bc5b14183d33b3da0acb4233eab78bd986eb9a9914c278bfbd7e1c96c776fd9d12d2e177c203d47151fe8c5e97fdd72a55cd95eefd7d879f59d5934ce8a2456e09fbce880f38139f86092d1a328c2d14677787c2e51584249f62db27d127a47b0fd31d41d26aae2c8007c2b74bf15ffdd12b8d328a4cb6e8a1ba7fcddc05007fac2e638edaf86df2cb7332a23bf1337c2f4df3d2ada4ae28fd75d3006f81e03c19ffc43e684aaaa72be708c508fca7b45afb68a4f0f6a306d0964b29737134a58a4a6f51f05b96ba515df67b909c12db468d0a3e5766b4b0e5b099b061b1464a1bc69fda2455f719464a52bf120505ce291477663cd584416e2ab56e1617cdf9d93ae5115c659aefd642b2aab4af65ce69d3e5c9fe2caddb16b1387ab387ff10eee43801bbe89d9db9a361f806222d0e70f173f1454e732fb1ae139b58e84838b78961e5b1357d2d0788bf9ee3940575de1e1d639842024606049ebdc3360088986c9e95f2b96b813511490c2f3c5c01eecf5a9ebe2318731baf6f0cb386f6c37d55a7f6f7250b01274149cdbbfca8c46353580865619b634adaa26721f215c959ef33840429410e914a0d40ba0d21285c5c4102c547b8c2ea37ae446ba1ca0ffca20c2cb1d5de1e20ba9930cd29afb06f6b855e70a71323f0f0ae61fb8acf93337257555eb97a526e53ac96113dc9fa933839102083c2eb617adc3fb4a4006e098a6567bb0025f5643f7111a0d5c90ed304d099f2bc52d9581aa4e417161de27d464b9d9fd7a98cb3877ddc84b68e26d71996a867c997262a4e211cd19a3a9fedf40eb7841b48b751aab329f233be74589bf800ae4466a76c614d8b0de829c2d1f3375b964c1c0c11493788754f0f86733306b2586b7828ff51a811832dda6fd4d0461da292956972a70d06098bb04c901243a4737ec564d6ba8e3270016ab1c031db67407900226c77f5d4f34e077c40e1b2199a884de0716c72df675e8831fb799e136d737339caadeffa36ca9e9c3b89d5977868bd80d9a0877535cea85bdfd3fa6056de99df962393ea532e07ffe1274404f90ce178c842531c17f179e3fa5776a15bca2beed3693fe53b5b585a6a712e555d5e06f68baf69e482d57a54584255c1f58877a4374f96348029f263708885a20454878f3d4c37df8eca01aaed77f4bafd5ee2dd707d0d3322d66963b3655a4b8c085db6e20719c940bf2d98af3dac556549343dea1f0c013b73b79295b7bd3588432733be4ac3ea0f7560fe6bab34c19af50831cc6149ae33b13c4a6048c28c6b15c14618854365ef52c368d5f2f7f5d9f1accced965871c6757649d0de9574a942bf07260b35b80bf3d69fe9de76a4d2060982f1bb79a11bc460770056185c3786e68ee83ab9a3802c8e1cf1e27fccbd836ae4c1226d4272dd930caf37db60c1f242e4b9388ab4dc69f861ee15ac492d3a1b73c3d5820d293919d5403c5a3be8148d152682aeaa86056b54fd779de02b3b7d27b025e0360e3186e9bfdda0c66808ab6894e6b192bf50bc25d6c7dde35c7ea6f6e2eae3491c58c594e22687153ec04a44574cbcc1d8224472ee18cc164cb2fec1f65318b99e0acd009c7fd69f11b8238c578e032418585535d9e0545d0d31d0dabb3b2747a09e9b371801539c8a321b3380ed7e1b496d50293e6fff46a8b3cd13f1cbae3599adc61c04cef2a6394098192e3b22665aef37473d073a2bc0c64fd1505d93aa081a7a4ad2ef91cf104b2f09d399ccfccef63334474773baefcdf05835f541c22e31781e2e3586f34b82e8419f5055de43dc8f543e8a9e1cd9c114af5cae0d7d03e3e63842a02e46d17b1b8de035b4e96cb26a154fde4fc8af5b4d58c3157de47525a2a6ded20e1649e8bc56c7379b1505b78d65bcba3df7a502e7428b28d005c0c64f9e4c1acbd6f03ef76f393607fb3b953bbfec59c8e3df69ae1dae9732f81d307dafe41c6e2a7453a889705f389b8f195e2643f241cb27895c5adceec3844d0abbc6bd5e8358b194c10d27f31bb512a24889ae0cbc51fa6d0f8bb08d21a0f1b2d1048f99bb8c4e056aaf1a0b95eff4c6457559b12458ef6d7d83383b3c5dd91282cdfefb3dc26fe8fa0e1b1447a21f6818e6f507b02cc4197dfb6a1d48ffad0a40947d0ad4dfd0b01308dd795b3014f29a4e11262b60e4f84ed6d7f8c11b53ba265f32d3ff475e98c93aba91671871d983cf17b945004ddbfd0d485ad7d0aecc296a6c683b874e95ea35927cb9fe11034193895e9fcb9ab3cd7d79357a0df398c33c9c981afeeae8e6a17b15ddad6eb8273db3f963f9100cb1bb44bb443134556a7cfb4795b0f76d7fd49f5c42b9fe89857b2682fd9a66f17a58ae509646cd15021e03e4b9a9d4d3f1f1418e8082d40a30918e9a41dfd7588ba3f80b3c370ed7362bb03621fb1144b167d86d4ff9c33625bf1d5caf073e4cc6610333c434f9c2c7e2f53050351012fad5123b5f54b52f475bae52584af440c3b54a425be840bba030e849a33b5edf4cfde9e938916dfe347f047c507c929ec405d48caef4dedb0f9e1d03cc65a07d117c11fa5e1c0b8b0164676cffbf0eae691a974d3c6f33ec2356bea988564c7ce4d1a61456a6c6e10171b1df232a543eee202ad43fe82f8a2270c90f52eb4e83f46ccdce13bee982ed01c73ab4f3c0fe9743508893e09155f169dee14035742c9992f1f9a5b0e39e6aba5a4b0f440c44c542e91c41b7dfa02f634e359847822248418f49669bfe5b7bbfd941db5eacbc157d1a1194414824a87dac5971321dcec7c4daff0677cc4a96238478190164bf6260ff0b656c2a41e509dc8c86245ae6d637c03cce544d58e80ad536fb78bf6d6dd7c4d5c0ac5f71f504b931ab0adfb54eeba965f86d8a89444e3da49b9ea96e6bfd8a0b8a2a443f03c318bf099f82fd4dde10697ba3ba2450684f415bbbd21e0149b74e57382e8e59005fa42f6fa709bd842edff05bd84cd2195d6fd54c6fc9784fefef1404b107767e7b85bef3db6846cc99850454dbcad93396f47036e49c59cc648fea677810e21fd5c682138c893952d4b8a104ba1424092223e28d107239e1ecc9ca537c0d08d62296d35edaf77958bea31a53bb2033b9c2ed0033fa4f9fc1770a565934c1971758f340c546925e9092f7bf03fa6f625b761053823ecf8a0c801e303acc37c6926a1928106ee39302bc41c463f5afbc0c8bda26ec16d43f858856839b6a5076ecee8ee0d04bb15eae66445794b78f03839ffb1182626a5946f6e59c0645c1b4f4855f9face35bd6446ad9044e6069fe211fc8c648ec495e5112d59e746581074698a0776ccecdf3138517a30d6775e90852b7ef23af6abf07c78ac73117787dba6300ab342cbcc6613828808203e5867afacc0251919f6e1b584779e32fea69f637625911b3f5196bc6c3acf6f37a75498cd48691c2f5a3d1a01128d4f0de6ae2b2aa7a2e09f443e0f5436f91357d7ebab646c0279cc917a42cfe8b4addde91fdc914d94eb6efbc6d8f8ac840dc21c35f520ce701c4ded5ae1925d85058ecd8403db645c7aed8617b0525cf13d937f221de7a5e355433267d1efef9a30325130a412421a90e5e16cfcfeef281f6e50f4f2ecaed8c8c612e79c0fa869fb9600cafdd102e2e512a2f3345fc5c6850dbe4396d9e60046c45bbd54fd0462f8f4572dbada5ec212fc2801f8ee02aebcc4e8cdc7d941836d93ba5b7e845c4027f5d7aa339fdc2ced9fe56686cbff852ba5bc6ba5ffe9e54a298ba516cc252c4c106a99f39046b844edf7e7e85d3eb34088052b938921e2c2fb43fd1b91efbda844c7ad4eebb442e9a7f7ad2b0906c0021c3f8c85288f6e9f7814433cf0a472098abfcfa4074399b90e395b02a31526615b61227f2394abdeb10bc21fd7af24051be419926d51f738bfe30aa66ba2a92657cf5fa641f435539e7b94e44d0794b20e10e15b7b1d8382cce8ce5213951b5c437ded5f842571cf9ae208dd9254827438efd67436e90341febf1c1707ffe810f1bbb83bf31926dfedb36af52763728a0166e4f5396afcee8ff47781714333bde4c51feb5d49203f56e480875117c943b433b7b6b5d6564e838e90cfc40da7b9282e11a9f4b80243932444c4d08c53d136f504c19ffab81b078dc252a7111b32dc027c96800", 0x1000}], 0x9, &(0x7f0000004740)=[@op={0x18}, @iv={0x68, 0x117, 0x2, 0x50, "b60fc7eb59affeecfa23c8c5e85c2c63506e55cd8cdddff3995a86415c78c184789e7d5bc8fdbc23a6bee37d5b4f8c4b061f26f6c642c5cb3afefeeef8a41481507ead498a4b4afeb3047b83e4a970e5"}, @assoc={0x18, 0x117, 0x4, 0x1414b7ea}, @assoc={0x18, 0x117, 0x4, 0x1}], 0xb0, 0xc4}, {0x0, 0x0, &(0x7f0000006a80)=[{&(0x7f0000004800)="91b461aec99f9cc45b77d975014472b8e3ac842f935535a7ead2900e0bb51baf18a266244807ee50742a705412f5990be749d0566de75bf93905f8404560573cd42189105f92374cc9b1cb03020e7d667710b83761f2579322d77da0610c3d17f76892737a4b936a4558e9f2c516b1a90683df93db9e31bf2bcd7ad14e68668a49a9711619f7a9bdea790317c76c4e2cf571a0a0f8a09bd56f55217b1a4eccbf707e0e159f43ec448071e6d8279fdb", 0xaf}, {&(0x7f00000048c0)="5eabc0cb118fcb4eacb8f1efc2f30154ca7cdf3f58dd5a67525ebb600f5040ae144d51afbf60fb31c714abb87d84c1e3d81d02a337e5dba8787ab3f3d534a1e084f432359bf589b2da0161e3018061298fb0de6998b2309cc845cf8fb096b9d9d4f95ac599dc389412695896f49ce9351399e6a57d27e135907c1ec8d6192a0ae2b8e38aa01425949dfb52439f00c611db35d363e2bf187d5b3228ffae9c0c4d6daaf26da7effda2eaf8d18e", 0xac}, {&(0x7f0000004980)="c9c57c6f40c750d57af3774e819a173d408fd60278b3d6d8d58c09ddb7d722280504efae9722f1f0bd3b78ad8518b80080d2122d8746fc539948eb170fe4654129ad7fed4a9e51a9015817ea625742d1ed134a59dbbe57a2e5d5ce1010abd8f1e527f12da2e6b1da4b73e5ea363b0ffbc691deeb308b72dc05e903d798853ac15161420d79792760488995c2dd49d1a70a348f2cc98f9094da95729d7bb8bd91ce43d562870227d368a5745be8255df923ad084e5cc561b0ecbf6e03b20c0ce64624db1981bc5f1ffe604d685784ed40feb7641793ee07732c3344809a4bbbc39af09d7eeb580ec18b76072a22145c8f552d4d06330c889e66cba5afefae40506dfc36498f320266d717eb3c4447d74b24f859d2a4e8b1226689fe2c6a31b2b9a365d8ddf0c82700482a9ffe76c2be6bf95b72d60a905bf6e8fe80d904c1ecd98a9132a465d410ad1f9d4bf995755b76f9610e7144dec12827a1ba23287a4fab64608e95ec4504af8cd79be4c1bab25bd179038f5f61117f541cc24e51c184b96dddaad595ee76ebdf1cb16f25c47bab62f15ae2a94ee87c81c3a3e38e9cba50b620d4d2180d0f027ab3bc12792cc36af07904a17416cd767f2197631ddb26b1c49f8d48a7391fc9034b7bcf13034cbbfa94768bd8e1b890e7130c06e5db46d0191bb9074e78cab0eba6e73756cfed9b488f22d219e1e1c09c8dd8ea2ba276851e060cb69ee53c2466ac9a356086681a256757fce36c6b977940708231e0310d5fbedefe4fcbc9e6b2e2a8c703845bbd9c5b48627d05edbb9e447de39e7788d0472e2fd6b9caa9d9511b277f87a0ce3a463484a04c54d1b297176fdaed3416243b76d04f3995b33c1b9ef03cbe3fb78f3a3a630648c21ed93c95b452bce4e3b860c0279bb25051cfbacdc9476609c1058c800a321c91411034cb33c0538b06a559e1dfa581faf8e9d599ae063bd16da7640079b0906faff4d849c3cdbe511ea891e1a6a68726f118e9640cce9e2dd7ed43a28bbdd3191524b2062213554dc49d1d3ca2ef04ff41001a7cd5e94fb7835105a8488396df0ca5455e4463f01460bbde1df2aad441b44a6510e8c010889b99322655687b009629e3d5b04d416d6cae3f0080d8b9428b69f8c7a8c7071e212fc4c3d671ed573ef61af6634212be47f6ad3ada34bb8bc77932a56e9ff8fa06defd943462e241680fa4f7ca162ec8f03c377d7e13d24fbaa9ca8354b321c4803b1d95487437ebb719c51acb5a6d70f95af4131753ce70c36704db932b147b4fdc13d397322c0d473ace3aa6ce0953e34c97be256f062c3f61ad7fc5c836af01ff066752248343231f8b8fbdd6808a7cd108f29665f5941f3bcc732e858871adef219571060899a54535abb35d8f23e745caee7720ab4a05f541637548d8d1f8268f771f4b3dec7cc3c4be60648509083971d97a6191a6e187580271be90b37e5034e2be67c1a2b7346bfd73069b373a6038bf6efda29bc999745ea4c3508d286743b58b58b971d3737d04cd8ea34eef3a4b7ecb24eab8072a9d022eb91200598f85d00df4159c4b63060a9099426e7f25e5094ad3481e66cfbc3e2c2b9d97e216a38e7a627f3de734e93a06859453d1dff9fc93974000d26afb6de1cedfc92e96b63d769559bc2c62ab82bf31a29d4b960b42a950fcd5e69955f5ba2e6ed78e29801b5e71c3d8dfd7791c5ab2fc4cd43d75d7b68cb9377f3fbe7ccb7b163719b70c6bf9df28146e5bd181c6ea696b290eaf4930235759685f13fff21966502973c5d52094b2ed5a39c07424c9d3de7651086e1da14636d6515d72c49b36f3b16c3aeb890bd0419bbad11ccf2f0fae5c1031db89468db2baa09977cc123472247d02c37d4216b7c07b9f9772fa10152a46a4e5a48f58fb71edf053ed1d46269ff5e393026104f75d4d88e1651ece72bb37ad787be235cae7b174efcaa122de07b14c3b72c6d3de484aa46c8c6e9809462216246633a40ba7dffb92020da4b68296a3cf6e81ee7ff7ec615eaff48c26c0dcd09171312020365e081921b72ba97b492a3fa58c9264e58a91200ce9f75f13c5a7ff2f31c17e81aa5acdd07c777c87f2d2bd4bee77705045598ad739ec0f920eca23bfc74fec7b733764acda65b9483de1477b5c309e94369ab9cdfc6d499cc032ea4426c1f14f08b9853d5a79d4dd7db95b92a1e56a5562e01a484526b3c5b95fd0507f9ff07d672dffa158a1bd9e7ea6a2e291df32f7f04b4cd45b361bb8ef6b7ae4298d1cac01df15df4acb093bbabec430e27cd4be35ac50b773274e5f11cf5ef49308e67fb64ffa9ff6d14dc3f01a6cdf3c84edfe52afe8f566d85c3e3f71ba3814629c77bca94930ddfbc17189d7a17c1fa4787f24e3c821a55b94f0ce156ef45839f6a994ef8f18c2f4e6b646addd8686ce6c843c6999b36425aace61537513eeabf834a1c9bd4ba980da75b7542161ae6ea8b26be4615365cf495c81ee66558cee49da4cb23b58b6021aa5494b40b918847c4e27f5f6954f78b14f53808b9778321738ea2c54e83cd3fb731ddc915c08ffa1c9c82414383aa74e12535470e74cd865a914deab955e7d406ad12458af79930e4b4ee8f4ea0bc3cbcb4dc7d7c639eb47910bef3e663aac5f8f7dc48c0e9616e7566d7603deb328415b4428db65771853251ba770ecee67d8bb9afc5869c5d4a3a050d21f29afa52e5df5cca4b26cee3e8d97c97bfb29d9fdda4003eefd4fcc221817531b4440f22607156e7c31d41a16666f77d1e667ccfb89d46117d0f94f9643327655ade634af1e64be28bfbc51b51df82c343ad5422d5c1a9cc63ce6cdf343d90e562be4b3c6fc8cdbba5506ba1587adfde76ef81b51e0ff515de7440be6363baa622fe5ddc3f676dbbc71d939badb574117aec1f8f3fa7a9325172adc17a2c90a383edf9ce7c11b1d0bc21d86804b2495f590afb62f40e411a05e5ebc29aa029eb5e4816e104e34f5e420ff650f8183b295ce50c40b08ad954334f6d8807e2cc5bc3ad3844920c16709b2d08866ef10f2b35e588806bf149fbb7d4be16eb60635f0b612a12c911a6a4dd809b5510ace507377cb6c43ac0398ae35919fe62ed9e39ed7314591ec46bbe8178a6b7923f82c33650f4a2ee0c5d99f5eaea9d94c12bf2f450db62c0d593256aad8dfcf4c922c164b7f33f8a038d09d6543a95007cde1229a1231816dced5d4da9e8345afec233e3327a5244fd32e58dafa7e393a6b761f8cca8c0b20f56d45b5203ab57a25cbc32424cb9309a45461434046bdf744f0f47bd46bc7554ef0a614c22311b96c8756e2beb9119f153d7fba30c539eb3085e95a5ff913b02e4a662c4da897755c3ef76ce79b145a9975aefca47cb437777a48e54601145f88382dbb660e106aaa81adf80ecff867fc53c312b271512e14242aed05a69a591385860756b08a8394b1cb4f34530bfeb6721ac66c18019ff3c23a7f3b96389174db5ee720d931f21e184ad98391d40eb1d2ca7e2e71c2e699fc0be68e51a57209a13f167701cef5f483ac1eace571c60ab29c1b7f7b801f1fb256c5f1ae91ed6ddc820a548237e7d148dc4c730f0cc270bcd224a7c19c5c0307677f254dad3abd50602cf511e5a8b23d5c8658c616e0810d3e3f05b77ee7f07b79aa59d4e9f8c7cd131e95f564b623782bcabe01c8e2f1142c8de1b666eac8c2b33a9584b69e7ad0928675464ce7e917f3e175b1d912018b32ab3833ded320be6edc49ab928b3556e788355f570c788e2809de3afc8ef2ae5057987eb1d975e3bf8d95f69113850815e09932bd75c409b4daa434e67e6ab3e4e5c47f5a8d224a964cbd44a140f49b921a2c7c9a845189918a43479ee526b80f55c0a1575db7db531d5dcdb29676bb859a069461d2d94c5a646e9410ba11c41e8af8e5b7d42be439bfbfd9778b31578aa5d1d0864f6f93292132345a95851b1214aa3bb111cb701f0e9104fc527d59d45d9020e49489366d77ca532e72145dae0ed6ce5df768e2826a3c84d36f13d8b8161ed404111406c6f8de517422c8653257c7e5fd319745123dfb3f6e96b7c6eecb112665520d06f5dae0bad489ccd2aa8d05ae81b85d08a4bd6e81d1cf80474152e6edad049fe4e392a8ddb436df979927cff2569bfc6d0afc75a58f4a7e98c2137ba9371d60ccc57d47a695a65004c246a6d21eedfaad6414d3b7e515c9d1e0318d5cf5b6cc19b77ee8d29e3ab6a3973796e1b311fe9a6ed88b58a6271e53737563d00b02de65d461ed5634aee939cd370c57c375f6033a600a08ee243f98cc743b83694c86f6346d12cbd82efe4b1ef6bed26f7a11aa1264b86bc5cf70e30333eddb2dd0291549a39f6613ad2447d802cf52077d90951dfbc96fc5371453742610a4c4517a15002f4fae4bdd21aff437929ef423c36accb7a66f3ee1ff4b7087daffcccf7a7392864d0801df538aea968cad83695a75861b288df491d92cff9f9eea5733f5ba8efc84846153ddbf86470964d49e7f188e3c6691d57c03f3b52f1c33a97a142837c9fd3d88815eab26a4c9e294ffe014075b02fd451077e38b378df2b90704ed8ed9c6accae7a1fb7c18656c3015753af600297b5dd4919d2bcd96eeed2ca027a34c1387e698d56fab0cf314a981e69df269587e69bab7ff1a6669c9cd877fabddde94f18758d7237d90f495118b971d42f2b2b30cccc990664b725857c103a33456ab5750ec877f38c3d44538e5ab7d33a77051fc8969a9e2df973024e0caebf98b8fda2ad7fb32de6c0bc879ef36b3d5c009c73a7c35ac55c50819ed64b6ed8cfeec0105c3fd115f1ac28c10983f9a82238b4a5a7f3827e87ab671420ca0c7ec516f560008ef883bd56efbe1c0167724cb8157f4742b95d6a51c0d76e9a446116c8ddbb49ee2364b7d141a6440c0276533086bd440474d7737cb2f34a106d6eee715d68711e3217090e60eaa170fa9abfd5b977c4b2fe34e62051370cff959cc9edddeb13c6b2bc4fac0ed89ea9aaa2318f2a3d26531988226b62a320a4dab1b390fed25b9bf7946c03887b7c734e4c0b1967a06512ab7550bede94cdda44e9c2bc450eec26f61c8fd2c2669555c727bc0ae527e6f3ffbf59c94e048174a7fde21fda500e6c336e1ee375aa61be4054b03947dfe696fc8a71aef7414ffe56b21e78ce1f638c754a313987893ff0ec8524569b2d075a701444df6f05c3aae883d21899ef77ec7102ab7ccbeefd3a1bdc2b6c0358d145c63ae4b7a324d5bd516a6737acc35162420cd68441030395370feb8dbcbbcb3e953bd257ce1e9deb452adb33b0a4a28ca31e303e54e998f178df117750a68613ee2c10e7a3d429fd19ea52f81bceb590ab62a57c7dab1f0e788953230b35ab52f215ae12e69689e12d17421567a243010573d4c084a2a121e54071d3655fe9c9c4ab1d3b3f28fbcb4c3bd865e6061a84da6cfbb771dffc2179b4ec5a62124805f9b2e5eeb1952097cffbf8f4795ea54deeb07e8b13e612eb53ce8379f675fb8e5de9c4bb804e226c6c2e3e0f41bd6d68ded599caf00ffab1c285dd39b99aec0c92e9f166bef3997a2421ffd9cba9e58f5e0c419932fd507b7e130ae7386276128a9efc2e8f19eb9be9a485290eb0c89473bcfba13f322840faad7af3bb4486bc279e6d5823275e626e06feab9e08fbac4496d80b18d792878367638fd968a8350b2ac9a74275a395604de606d761357ea79b8300a5bfe5817f56a2787763117eee05b46653dc35636f8f4230ee4513dec7b9e6efb92a928c578057d8d2bba6c7e", 0x1000}, {&(0x7f0000005980)="7c3dec30e80d3c1c", 0x8}, {&(0x7f00000059c0)="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", 0x1000}, {&(0x7f00000069c0)="6f1f8db818f4cd4fce9caba1e7f5f1b03d43dbf2f18370b28f64e582637946e9f655185e2bc1585fd151a0253af843e7646489f2c33bd59631a038d7a58108a55c32a95563991d71d531b40bcb3361b8adcceda0a1e188209f6d0ad8606ba2aab014273e8151e076f7162c0aaaa2f5a3e7165ffbbe0a525f532c89f19972e24c60f59c38208bce7f2126cd9ccfdf6224601e9aaf4c9077586dd26ed4b6cda906fcc9faf8145d6ed6ee886dff74378972d69ece", 0xb3}], 0x6, &(0x7f0000006b00)=[@iv={0x58, 0x117, 0x2, 0x3e, "5c68187221e296211e89d6ce3447ddd52be8e59beb6660065f9afcee5f3565e629923e2536825c33d66a8b48b4eacb8aadca4c4ba908a6145155c9d2b1fe"}, @assoc={0x18, 0x117, 0x4, 0xe84}], 0x70}, {0x0, 0x0, &(0x7f0000006e00)=[{&(0x7f0000006b80)="f724a728fa2e5e", 0x7}, {&(0x7f0000006bc0)="9a4a8cb9f25bf932cfb237b3a458ae6b06fab92f8379d5edfdb2f9f7e788ae3b83c640bcda8b6c26b6566bf9cc33067f69aa2476cd4e0d6ddfb60889dff2519d17d9e94a107d3c24665c530c856e431a3fd091f73013eb460df874219520311769aa812dafcf93ef036aad287fd9567ebc5fcf98d40d", 0x76}, {&(0x7f0000006c40)="8e5bfd1515fa5ac619938ef611ea8079833855bdd73d8a414df39ccd0028633e1c4b75960f981851c5a288822d33a8e7a43392fab9ef588e", 0x38}, {&(0x7f0000006c80)="d62784cc960b7cf27f2f1ad025dc4b1a6d3edc921db687cb03043f7f5b11d1da3de04d7dcedc8220d71e5fc5d47ed84a28d620c446ee98721da7099d08bc199536f89b8b429dc9685a4cc4d55219b520c0a82fbfe4e099010045d3e9af14f4dccb85a65c", 0x64}, {&(0x7f0000006d00)="d674f287aad5bbda587e5dba737fec434dbe88f680683657f0f8c03cdfcee5491a0d66ec1482c812c709193a040d949f7dd19362712bcff2de185f4cd8d0084348fd35ab87f632c21468e3a34f2b905bed677f17872fc8d542860fa1e48f29a5a56c663dbb07af230b6e6b3fe39e1033dc06bb722d031b7c2cab67e61b35844e6bb776840978e2efd525ee9f956d167cb71741bfac3f8f47f468f8244ad5f14ed6889ea005b88a60cdb7367bb15587a5eed5cb8f106d5efcd6e9ec5f025fba86672d28645e190a5d615296", 0xcb}], 0x5, &(0x7f0000006e80)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x20040000}], 0x3, 0x4000000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000006fc0)={0x5, &(0x7f0000006f80)=[{}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000007000)={r3, 0x7}) r4 = syz_open_dev$swradio(&(0x7f0000007040)='/dev/swradio#\x00', 0x0, 0x2) r5 = msgget$private(0x0, 0x11) msgctl$IPC_RMID(r5, 0x0) linkat(r0, &(0x7f0000007080)='./file0\x00', r2, &(0x7f00000070c0)='./file0\x00', 0x400) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000007100)=0x3) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000007180)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f0000007240)={&(0x7f0000007140)={0x10, 0x0, 0x0, 0x100800}, 0xc, &(0x7f0000007200)={&(0x7f00000071c0)={0x1c, r6, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40001}, 0x40040) getsockopt$inet_int(r2, 0x0, 0xf, &(0x7f0000007280), &(0x7f00000072c0)=0x4) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000007300)=0x0) get_robust_list(r7, &(0x7f0000007440)=&(0x7f0000007400)={&(0x7f0000007380)={&(0x7f0000007340)}, 0x0, &(0x7f00000073c0)}, &(0x7f0000007480)=0x18) ioctl$TCSETAW(r4, 0x5407, &(0x7f00000074c0)={0x9, 0x56fe, 0x0, 0x6, 0x8, 0x5, 0x2, 0x7fff, 0x603, 0x9}) recvfrom(r2, &(0x7f0000007500)=""/97, 0x61, 0x42, &(0x7f0000007580)=@generic={0x19, "eca6ac4d66d85d88ebe90c492ffaef00565ccd03704d8e1a65c193bfaa435528442f9b122f957f88a7e0a64454873f335fae3bac70381c20b996fadceeaa2c65630f2e56d53f55945f02a504eec73e028ae5d77044ac1b31391e12af22407eb8ffc023c2c609c3438a6ab911b094546ae06d6b3c57de30da2856756e5c08"}, 0x80) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000007600)={0x4, 0x0, [{0x2fa, 0x0, 0x8000}, {0x34e, 0x0, 0x4}, {0x97b, 0x0, 0x3ff}, {0x364, 0x0, 0x100}]}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f0000007680)) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000007740)) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f0000007780)={0xfffffffffffffff7, 0x100000000, 0x475, 0xfbd5, 0x7, "5dd404c6bbc2742b889be2cc19001067a2b9f0", 0x8, 0x9}) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x24) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000077c0)={0x0, {0x800, 0x0, 0x800}}) 15:18:17 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') getdents64(r0, &(0x7f0000000140)=""/140, 0x1c4) getdents(r0, &(0x7f0000000ea9)=""/407, 0x197) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000080)={0x7, [0xfff, 0x0, 0x1, 0xd7, 0x900, 0xfffffffffffffffa, 0x154b]}) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000040)) 15:18:18 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x972) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpgrp(0x0) r5 = getpid() ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000180)={0x5, 0x5, {0x57, 0xd9d0, 0x2, {0xffff, 0x800}, {0xff, 0x1ff}, @ramp={0x100000001, 0x1, {0x6191, 0x5fd, 0x0, 0x1}}}, {0x55, 0x8, 0x7fffffff, {0xfff, 0x7fff}, {0x13, 0x4}, @period={0x5a, 0x1c, 0x2, 0x6, 0xfffffffffffffff7, {0x6, 0x0, 0x1ff, 0x5}, 0x2, &(0x7f0000000140)=[0x549, 0x0]}}}) kcmp$KCMP_EPOLL_TFD(r5, r4, 0x7, r1, &(0x7f0000000000)={r3, r2, 0x3}) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r7 = epoll_create1(0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r6, 0x5402, &(0x7f0000000100)) r8 = syz_open_pts(r6, 0x0) ioctl$TIOCLINUX7(r6, 0x541c, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r8, &(0x7f0000000080)) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000200)={0x18, 0x0, {0x3, @dev={[], 0x18}, 'teql0\x00'}}) ioctl$TCSETS(r6, 0x5402, &(0x7f0000000340)) 15:18:18 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x7, 0x5, 0x40, "f50019f400597eeac400080b000000000000080020060600dd00001d001cfd47", 0x8000000080000000}) [ 251.275569][T13264] IPVS: ftp: loaded support on port[0] = 21 15:18:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) r2 = memfd_create(&(0x7f0000000580)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xb3\xb3\xae0\x9f9?\xefo\xef\x81jc\x177o\x99\xa1\x9c\x86x\x1c\x9f\x84\x19j\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\x10\xd0\xc6u@\xce\xde\x05\xc9}\xf3\xe0\x16\xcak*up`.\x1d\x00W\xdd6\xb0d\xceb\x8e\xd5.\x19\x15f\x9b[p~\x9a\xae\x97q\xff\x89\xf6\x8d\xda\xe9\xdbi\x1d.\xa3\xf3k\xf7 =+\x1a\xc7\xc5l\xae\r\xc3\x12 \xd3\xf0\f\xd1}\xbc8\x82\x1d 1\x7f\xffv\xe8b[\xb0\xc2\xac\xbfB\xfci\xdb\xd9\x1dl\x9e;\x9fT;\x9f\xc8qL\xe4\x89\xb6\xce\x1a\xe0\x92\x86d\xebgB\xb8U\xf8\x1aq\x8a\f\xf8L\xafX\xd5\xa9\xf5\xfe=\xab\x15Zx&\xac\xbe-\xc5DC-\\\x15\x13@\x0f\xcd\xd8\x1c\xdb\xeaC\xb6\x9c\xb2\r\xe8\xa6vN\x96\xfb=\x9d>\xc7!`\xff\xec\x9a*=W\x1a\xa5\x05\x96Pu\x95\xf2]\"\xf6\xc5\xab\x8a4\r\x00}\x83/H;F\x02\xae\x81\xca\x9a\xcbE\xbd(', 0x0) write(r2, &(0x7f0000000240)="00db9a5033fcf36a106161596d9247ac85fc671b9aa3925b590200eed4cb08e2f186a1d324adeb09ebbfc2bea69a596794664951c4890d7b44adebe5778788fef9d0ace74daa2707c8d52baae64cd43a7205f52a9c0a66501b8e2e91d5921e1d191b90e0a2223c482291a47d349575e7ed589cd1b61a6b4ab5130c393965137847", 0x81) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r2, 0x0) r3 = dup(r0) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x1) [ 251.478739][T13264] chnl_net:caif_netlink_parms(): no params data found 15:18:18 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) connect(r0, &(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0xe0000000}}, 0x80) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000040)='silent\x00', 0x0, 0x0) prctl$PR_SET_FPEXC(0xc, 0x7d) [ 251.550100][T13264] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.557420][T13264] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.566509][T13264] device bridge_slave_0 entered promiscuous mode [ 251.577103][T13264] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.584462][T13264] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.593389][T13264] device bridge_slave_1 entered promiscuous mode [ 251.634295][T13264] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.663687][T13264] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.706043][T13264] team0: Port device team_slave_0 added [ 251.731758][T13264] team0: Port device team_slave_1 added 15:18:18 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_int(r0, 0x28, 0x2, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x7fff, 0x0) accept4$unix(r1, 0x0, &(0x7f0000000180), 0x800) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x81, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/271]) 15:18:18 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x208800, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000140)=0x8, 0x4) linkat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x400) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000340)={0x0, @bt={0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0x1, 0xfffffffffffffffc, 0xfff, 0x7, 0x3, 0x8000, 0x100000000, 0x7, 0x4, 0x21}}) fsmount(r0, 0x1, 0x80) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x9}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={r1, 0x5, 0x4}, &(0x7f00000002c0)=0x8) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000300)={0xf, {0x4e, 0x80000000, 0x1}, {0x3f, 0xfffffffffffffff8, 0x4922, 0x1000}, {0x3, 0x4}}) [ 251.858095][T13264] device hsr_slave_0 entered promiscuous mode [ 251.893648][T13264] device hsr_slave_1 entered promiscuous mode [ 251.935881][T13264] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.943275][T13264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.951202][T13264] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.958602][T13264] bridge0: port 1(bridge_slave_0) entered forwarding state 15:18:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0xff00000000000000, 0x0, 0xffffffd6}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff31}, 0x70) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0xf1c6, 0x200, 0x3f9a, 0x13, &(0x7f0000000180)=""/19, 0x99, &(0x7f0000000280)=""/153, 0x5a, &(0x7f0000000340)=""/90}) 15:18:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0xff00000000000000, 0x0, 0xffffffd6}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff31}, 0x70) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000001c0)={0xf1c6, 0x200, 0x3f9a, 0x13, &(0x7f0000000180)=""/19, 0x99, &(0x7f0000000280)=""/153, 0x5a, &(0x7f0000000340)=""/90}) [ 252.171649][T13264] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.211626][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.237303][ T3805] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.262887][ T3805] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.281114][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 252.307629][T13264] 8021q: adding VLAN 0 to HW filter on device team0 15:18:19 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) r1 = epoll_create1(0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$tipc(r3, &(0x7f0000000140), &(0x7f0000000180)=0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_elf32(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="d3be7e53fa2516541216865801ffffffffffff00"/29], 0x14) r5 = socket$inet(0x2, 0x3, 0x7f) vmsplice(r3, &(0x7f00000013c0)=[{&(0x7f0000000200)="8fe6942c9b0a38d2fd07df7abdc6ade4fcb9bdca", 0x2f0}], 0x93602e1e107fb88, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r5, 0x0, 0x3, &(0x7f00000000c0)=0x7ff, 0x4) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) lookup_dcookie(0x2000000000000000, &(0x7f0000000000)=""/4, 0x4) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f000001dff4)) [ 252.355832][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.366921][ T3805] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.374529][ T3805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.443276][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.453369][ T3805] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.460587][ T3805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.493193][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.503672][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.513776][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.524813][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 15:18:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000180)=[@in={0x2, 0x0, @dev}], 0xfffffffffffffc27) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e24, @initdev}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x7c, &(0x7f0000000100), 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140)=0x8, 0x4) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x19c6561, 0x100) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) [ 252.571713][T13264] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 252.582320][T13264] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 252.622641][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 252.631994][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 252.642489][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.652529][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 252.661994][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.721849][T13264] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.743714][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 15:18:19 executing program 1: socket$key(0xf, 0x3, 0x2) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) keyctl$get_security(0x11, r0, &(0x7f0000000000)=""/42, 0x2a) 15:18:20 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x20) fchdir(r0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000100)={0x1000, 0x9, 0x2, 0x4, [], [], [], 0x0, 0x1ff, 0x7, 0xfffc000000000000, "856cd671eb4b2a8ab1ee1cc532c8ab68"}) open(&(0x7f0000000040)='./bus\x00', 0x141043, 0x0) 15:18:20 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) socketpair(0x3, 0x3, 0x7, &(0x7f0000000040)) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000280)={0x9, @pix_mp={0x0, 0x0, 0x31324d4e}}) 15:18:20 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(r0, r0) fcntl$setstatus(r0, 0x4, 0x44c00) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0xfffffc34) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:20 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) readv(r0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000180)=""/14, 0xe}], 0x2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) getsockname$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c) 15:18:20 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(r0, r0) fcntl$setstatus(r0, 0x4, 0x44c00) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0xfffffc34) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:20 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)={&(0x7f000023f000)=ANY=[@ANYBLOB="8400faffffffffffffa97000ffffffff0000fffc0c00000000000000000000015b659a62290ffc380c2dbfdc5e9f13e1a04810d404fbc3f4c1b4e2bf501fb1bb949869c200f0ffff9f04005e4fcd4dd3050bc1700610dbc3080c91745fa158cf0d70309f7f19691332a14b4ce56aa166b5000d"], 0x82}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x7, 0x0, "2b6a4b8ff6d9887f5a01f291a7c275509ef66639137dc37262c7a7463563aa66f3fa30d22184c3bd444069c018f8b769d5a2755cdcf68b55f18b5fe28e2600629f992aef924b7bb5c1a7b98865a02302"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:20 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(r0, r0) fcntl$setstatus(r0, 0x4, 0x44c00) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0xfffffc34) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:20 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)={&(0x7f000023f000)=ANY=[@ANYBLOB="8400faffffffffffffa97000ffffffff0000fffc0c00000000000000000000015b659a62290ffc380c2dbfdc5e9f13e1a04810d404fbc3f4c1b4e2bf501fb1bb949869c200f0ffff9f04005e4fcd4dd3050bc1700610dbc3080c91745fa158cf0d70309f7f19691332a14b4ce56aa166b5000d"], 0x82}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x7, 0x0, "2b6a4b8ff6d9887f5a01f291a7c275509ef66639137dc37262c7a7463563aa66f3fa30d22184c3bd444069c018f8b769d5a2755cdcf68b55f18b5fe28e2600629f992aef924b7bb5c1a7b98865a02302"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:21 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(r0, r0) fcntl$setstatus(r0, 0x4, 0x44c00) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0xfffffc34) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:21 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(r0, r0) fcntl$setstatus(r0, 0x4, 0x44c00) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0xfffffc34) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:21 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)={&(0x7f000023f000)=ANY=[@ANYBLOB="8400faffffffffffffa97000ffffffff0000fffc0c00000000000000000000015b659a62290ffc380c2dbfdc5e9f13e1a04810d404fbc3f4c1b4e2bf501fb1bb949869c200f0ffff9f04005e4fcd4dd3050bc1700610dbc3080c91745fa158cf0d70309f7f19691332a14b4ce56aa166b5000d"], 0x82}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x7, 0x0, "2b6a4b8ff6d9887f5a01f291a7c275509ef66639137dc37262c7a7463563aa66f3fa30d22184c3bd444069c018f8b769d5a2755cdcf68b55f18b5fe28e2600629f992aef924b7bb5c1a7b98865a02302"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:21 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(r0, r0) fcntl$setstatus(r0, 0x4, 0x44c00) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0xfffffc34) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:21 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)={&(0x7f000023f000)=ANY=[@ANYBLOB="8400faffffffffffffa97000ffffffff0000fffc0c00000000000000000000015b659a62290ffc380c2dbfdc5e9f13e1a04810d404fbc3f4c1b4e2bf501fb1bb949869c200f0ffff9f04005e4fcd4dd3050bc1700610dbc3080c91745fa158cf0d70309f7f19691332a14b4ce56aa166b5000d"], 0x82}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x7, 0x0, "2b6a4b8ff6d9887f5a01f291a7c275509ef66639137dc37262c7a7463563aa66f3fa30d22184c3bd444069c018f8b769d5a2755cdcf68b55f18b5fe28e2600629f992aef924b7bb5c1a7b98865a02302"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:21 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(r0, r0) fcntl$setstatus(r0, 0x4, 0x44c00) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20}, 0xfffffc34) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:21 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)={&(0x7f000023f000)=ANY=[@ANYBLOB="8400faffffffffffffa97000ffffffff0000fffc0c00000000000000000000015b659a62290ffc380c2dbfdc5e9f13e1a04810d404fbc3f4c1b4e2bf501fb1bb949869c200f0ffff9f04005e4fcd4dd3050bc1700610dbc3080c91745fa158cf0d70309f7f19691332a14b4ce56aa166b5000d"], 0x82}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x7, 0x0, "2b6a4b8ff6d9887f5a01f291a7c275509ef66639137dc37262c7a7463563aa66f3fa30d22184c3bd444069c018f8b769d5a2755cdcf68b55f18b5fe28e2600629f992aef924b7bb5c1a7b98865a02302"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:21 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(r0, r0) fcntl$setstatus(r0, 0x4, 0x44c00) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:21 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)={&(0x7f000023f000)=ANY=[@ANYBLOB="8400faffffffffffffa97000ffffffff0000fffc0c00000000000000000000015b659a62290ffc380c2dbfdc5e9f13e1a04810d404fbc3f4c1b4e2bf501fb1bb949869c200f0ffff9f04005e4fcd4dd3050bc1700610dbc3080c91745fa158cf0d70309f7f19691332a14b4ce56aa166b5000d"], 0x82}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x7, 0x0, "2b6a4b8ff6d9887f5a01f291a7c275509ef66639137dc37262c7a7463563aa66f3fa30d22184c3bd444069c018f8b769d5a2755cdcf68b55f18b5fe28e2600629f992aef924b7bb5c1a7b98865a02302"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:21 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(r0, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:21 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) close(0xffffffffffffffff) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:21 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)={&(0x7f000023f000)=ANY=[@ANYBLOB="8400faffffffffffffa97000ffffffff0000fffc0c00000000000000000000015b659a62290ffc380c2dbfdc5e9f13e1a04810d404fbc3f4c1b4e2bf501fb1bb949869c200f0ffff9f04005e4fcd4dd3050bc1700610dbc3080c91745fa158cf0d70309f7f19691332a14b4ce56aa166b5000d"], 0x82}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x7, 0x0, "2b6a4b8ff6d9887f5a01f291a7c275509ef66639137dc37262c7a7463563aa66f3fa30d22184c3bd444069c018f8b769d5a2755cdcf68b55f18b5fe28e2600629f992aef924b7bb5c1a7b98865a02302"}, 0xd8) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:21 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) close(0xffffffffffffffff) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:21 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)={&(0x7f000023f000)=ANY=[@ANYBLOB="8400faffffffffffffa97000ffffffff0000fffc0c00000000000000000000015b659a62290ffc380c2dbfdc5e9f13e1a04810d404fbc3f4c1b4e2bf501fb1bb949869c200f0ffff9f04005e4fcd4dd3050bc1700610dbc3080c91745fa158cf0d70309f7f19691332a14b4ce56aa166b5000d"], 0x82}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:22 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) close(0xffffffffffffffff) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:22 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)={&(0x7f000023f000)=ANY=[@ANYBLOB="8400faffffffffffffa97000ffffffff0000fffc0c00000000000000000000015b659a62290ffc380c2dbfdc5e9f13e1a04810d404fbc3f4c1b4e2bf501fb1bb949869c200f0ffff9f04005e4fcd4dd3050bc1700610dbc3080c91745fa158cf0d70309f7f19691332a14b4ce56aa166b5000d"], 0x82}}, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:22 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)={&(0x7f000023f000)=ANY=[@ANYBLOB="8400faffffffffffffa97000ffffffff0000fffc0c00000000000000000000015b659a62290ffc380c2dbfdc5e9f13e1a04810d404fbc3f4c1b4e2bf501fb1bb949869c200f0ffff9f04005e4fcd4dd3050bc1700610dbc3080c91745fa158cf0d70309f7f19691332a14b4ce56aa166b5000d"], 0x82}}, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:22 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) close(r0) symlinkat(&(0x7f0000000080)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') 15:18:22 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)={&(0x7f000023f000)=ANY=[@ANYBLOB="8400faffffffffffffa97000ffffffff0000fffc0c00000000000000000000015b659a62290ffc380c2dbfdc5e9f13e1a04810d404fbc3f4c1b4e2bf501fb1bb949869c200f0ffff9f04005e4fcd4dd3050bc1700610dbc3080c91745fa158cf0d70309f7f19691332a14b4ce56aa166b5000d"], 0x82}}, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:22 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) close(r0) symlinkat(&(0x7f0000000080)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') 15:18:22 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) close(r0) symlinkat(&(0x7f0000000080)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') 15:18:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:22 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(r0, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:22 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:22 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:22 executing program 1: r0 = open$dir(0x0, 0x27e, 0x0) r1 = dup2(r0, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:22 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:22 executing program 1: r0 = open$dir(0x0, 0x27e, 0x0) r1 = dup2(r0, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:23 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:23 executing program 1: r0 = open$dir(0x0, 0x27e, 0x0) r1 = dup2(r0, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:23 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:23 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:23 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:23 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:23 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:23 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:23 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:23 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:23 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:23 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:23 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:23 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:23 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:24 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:24 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:24 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:24 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:24 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:24 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:24 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:24 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:24 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:24 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:24 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:24 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:24 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:24 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:25 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:25 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:25 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:25 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:25 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:25 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:25 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:25 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:25 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:25 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:25 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x18000) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000080)) write(r0, &(0x7f00000000c0)="c0862aa88d0c4b7910857297080ad3dbe9e11922f523afdfe361e36e275532e90969e030bc", 0x25) r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0xdd, 0x2880) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000140), 0x4) mq_getsetattr(r1, &(0x7f0000000180)={0x423a, 0x3ff, 0xfffffffffffffffd, 0xfa1, 0x7, 0x400, 0x0, 0xffff}, &(0x7f00000001c0)) r2 = msgget(0x1, 0x82) msgsnd(r2, &(0x7f0000000200)={0x3, "fbc2768743e8cdd8ca55"}, 0x12, 0x800) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000240)={{0x2, 0x4e20, @rand_addr=0x528}, {0x307, @broadcast}, 0x40, {0x2, 0x4e24, @broadcast}, 'rose0\x00'}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000002c0)={0x0, 0x0, 0x8, 0x80000001}) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000300)={0x401, "e178f5f8ffebd5373ec5cc301ecf6e47039c7e386be9c333202b4129ab379c51", 0x7, 0x820, 0x39caf9a1, 0x5, 0x14, 0x3, 0x974b}) fallocate(r0, 0x1, 0xd3, 0xfffffffffffffff7) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000380)=0xd46) sendmmsg(r1, &(0x7f0000001a80)=[{{&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x2, @loopback}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000440)="4be1ebc30c4fb53f90d5e7a7f61fcb9c8e6a180e3798bad3aaf36cf47a4c5124a6442a63dbbd33204b7be0ec9a059bdba2554b4669dbb2c5d9216dbd81de8c6355a8627d928cdc766e3c1237c9174747e63a072155fd4bb220702dcf00b64f57bfd681f7559093ad284d4df34d23d8a17ed3abca14a584aa36d97ae966de6d9c30494d85c7d6aca90200", 0x8a}, {&(0x7f0000000500)="fb0e16064e087c33fd44", 0xa}, {&(0x7f0000000540)="f42d556de105426cb8f7e637f4514db8ba08f170095bfe387b12ee433e0a692c6a536ff2477508d6e3e70392b87c1f4346ec4fe7cf9dac59ebb3291041b67fda3eee92167e482de38c52d5b9b9fbd32ce1d981915700bbcb41184011adfb6d5518d6ddfad976cdc8a22152ff44d8afbe94053044dab759d351213860f4b9a761b5805ab6dcb993459000fb26993d32c896f478c4eb6fa457e8e974", 0x9b}, {&(0x7f0000000600)="5c2b522a9f1c76fd65eeae3ec4c5d3ec8106b150dc64b110b017bd0fcc39d18230d159da006b81e12f312c618d0a7dfd9b0b1da0e3352b33d7b1848cf217061bf1111a26bea2363129f6f2f778fe7c4e45e6ac2681744bf5c57ce8519e14a4f0643784e3f428b94312022a59aaf7665c86847f3a7813d1c9ebe9068b", 0x7c}, {&(0x7f0000000680)="4189edb573b513c745f20466f5685ebdf52f6fe0c218215984ffca2179d1cb4e189d6725bfe247e7ba72e497b17f592e1124c6dedb6ccb81680c6103b793ff64f09824056ef14247c567bee6ea9845c6b859ce6d25c9475fd1889cdafd77aa5a9d47e5f5facf4421a22c9007d178328036ba7ded3c1a13563ecc8b4825f870d01c91fffdae3af30d1fa8b2c51ead8e29b99f0f596d21b406d078310ec379339461c59a2e", 0xa4}, {&(0x7f0000000740)="eefdf29cdbc95e82786157177850facb070f4c473f64fa47dd28f107ff97ec345ad17802155f4925375297d1fdb42c597dd987743c5cd22ac35670b2a32d050dd8a19d28fa7ade7a8b122d766f4efb3c6f9f7e19237f57f5aa86ccb4537ff0c86b909f6de15b1c1812cc8ed7e102968db545189ecf7a9aed08f3cfa95947a086be89ce4c50e8507d75501968012fbaf15ded097b60caaec4dc7fac18f333484dd1c4d4c458eaef8850b2a9532df6defa9d45fee3d0d52e", 0xb7}, {&(0x7f0000000800)="e4c422dc1711bc67a76c83dd902f2779e18dd244e29ee1cdfb174431e1bae80010f96b7f52995c842159dd1ddeb16b", 0x2f}, {&(0x7f0000000840)="d97f4092f3c8eae9ca06305b89960fb8e53668fa2ad3981b5361c3bd0c441f599f5ede7a6e48d143bd1329533b20c20c98d206d6849a54dc473b8b938510f087fb785cd7a3fe2960eb8a36d0a1937ee9fc9dd1a257e2c735b20121a617455d21028092b61e89b95b37c7b3affdbbe386516fb9", 0x73}, {&(0x7f00000008c0)="d0ab7bb089d4f34592ea5437b51cfb424223f9d372233303dea8fda0a4cdbfde3b0b954778173c4ed97bd0dabbec7b8406b79eeefcf46ed9889e4cf65873346fef33d40ac2152063032c536c471a17bcaedb4fdd4e93c9d9a05ec6e20aa53f904a64d93934ebcb7f9ec5863afe7096bb31c9e554a9de48c5e1064db48cca5954b293c9c38a0fcb0dc7efd5d84ad40168e52511711c43a104c84ee1cac18758", 0x9f}], 0x9, &(0x7f0000000a40)=[{0x1010, 0x13f, 0x1800000, "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"}], 0x1010}}], 0x1, 0x200000c0) msgrcv(r2, &(0x7f0000001ac0)={0x0, ""/192}, 0xc8, 0x3, 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001c00)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000001d00)=0xe8) sendto$packet(r1, &(0x7f0000001bc0)="22433d8d165c83a0cd661dc330a259ea848a5110d3d81cc1b86a8acdcfd73b92fc6b6fe03f769a030bd56226", 0x2c, 0x80, &(0x7f0000001d40)={0x11, 0x0, r3, 0x1, 0x92}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000001d80)={r1}) msgrcv(r2, &(0x7f0000001dc0)={0x0, ""/207}, 0xd7, 0x3, 0x2000) utime(&(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)={0x1, 0xfffffffffffffff7}) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000001fc0)={0x9, &(0x7f0000001f40)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000002040)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000002100)={&(0x7f0000002000)={0x10, 0x0, 0x0, 0x41000000}, 0xc, &(0x7f00000020c0)={&(0x7f0000002080)={0x24, r4, 0x200, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x1}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x1) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002180)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000002280)={&(0x7f0000002140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000002240)={&(0x7f00000021c0)={0x60, r5, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x38}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x800) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f00000022c0), &(0x7f0000002300)=0x4) msgctl$IPC_RMID(r2, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000002340)={0x0, @reserved}) 15:18:25 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:25 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:25 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:26 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:26 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:26 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:26 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:26 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:26 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) [ 259.367989][T13561] IPVS: ftp: loaded support on port[0] = 21 15:18:26 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:26 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) [ 259.724480][T13561] chnl_net:caif_netlink_parms(): no params data found [ 259.853623][T13561] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.860870][T13561] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.870374][T13561] device bridge_slave_0 entered promiscuous mode [ 259.882822][T13561] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.891550][T13561] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.900953][T13561] device bridge_slave_1 entered promiscuous mode [ 259.941788][T13561] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 259.956743][T13561] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 259.996086][T13561] team0: Port device team_slave_0 added [ 260.007683][T13561] team0: Port device team_slave_1 added [ 260.113732][T13561] device hsr_slave_0 entered promiscuous mode [ 260.176983][T13561] device hsr_slave_1 entered promiscuous mode [ 260.350465][T13561] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.357801][T13561] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.365805][T13561] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.373115][T13561] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.478756][T13561] 8021q: adding VLAN 0 to HW filter on device bond0 [ 260.504951][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.518201][ T2863] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.529589][ T2863] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.547008][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 260.574971][T13561] 8021q: adding VLAN 0 to HW filter on device team0 [ 260.596505][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.605872][ T2863] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.613259][ T2863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.682262][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.691685][ T2863] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.699027][ T2863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.711335][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 260.722041][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 260.731936][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 260.750373][T13561] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 260.763754][T13561] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 260.811716][T13561] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 260.820302][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 260.829714][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 260.843345][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 15:18:28 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:28 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000ec3ff4)) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x400801) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000140)={0xa5f2, 0x8, 0x2}) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000080)={'security\x00', 0x1d, "d891efc7ce67d0d2f3458b75f9668c3a66689f2a28188f9eb854bcb43f"}, &(0x7f0000000100)=0x41) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000000)={0x2, r3}) shutdown(r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f00000005c0)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000580)='NET_DM\x00') fstatfs(r1, &(0x7f00000001c0)=""/190) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x14, r4, 0x100, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r3, 0x111, 0x2, 0x1, 0x4) 15:18:28 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:28 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:28 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:28 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:28 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000ec3ff4)) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x400801) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000140)={0xa5f2, 0x8, 0x2}) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000080)={'security\x00', 0x1d, "d891efc7ce67d0d2f3458b75f9668c3a66689f2a28188f9eb854bcb43f"}, &(0x7f0000000100)=0x41) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000000)={0x2, r3}) shutdown(r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f00000005c0)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000580)='NET_DM\x00') fstatfs(r1, &(0x7f00000001c0)=""/190) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x14, r4, 0x100, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r3, 0x111, 0x2, 0x1, 0x4) 15:18:28 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:28 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:28 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000ec3ff4)) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x400801) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000140)={0xa5f2, 0x8, 0x2}) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000080)={'security\x00', 0x1d, "d891efc7ce67d0d2f3458b75f9668c3a66689f2a28188f9eb854bcb43f"}, &(0x7f0000000100)=0x41) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000000)={0x2, r3}) shutdown(r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f00000005c0)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000580)='NET_DM\x00') fstatfs(r1, &(0x7f00000001c0)=""/190) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x14, r4, 0x100, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r3, 0x111, 0x2, 0x1, 0x4) 15:18:28 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:28 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:28 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:28 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000ec3ff4)) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x400801) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000140)={0xa5f2, 0x8, 0x2}) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000080)={'security\x00', 0x1d, "d891efc7ce67d0d2f3458b75f9668c3a66689f2a28188f9eb854bcb43f"}, &(0x7f0000000100)=0x41) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000000)={0x2, r3}) shutdown(r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f00000005c0)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000580)='NET_DM\x00') fstatfs(r1, &(0x7f00000001c0)=""/190) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x14, r4, 0x100, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r3, 0x111, 0x2, 0x1, 0x4) 15:18:28 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:28 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:29 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000ec3ff4)) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x400801) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000140)={0xa5f2, 0x8, 0x2}) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000080)={'security\x00', 0x1d, "d891efc7ce67d0d2f3458b75f9668c3a66689f2a28188f9eb854bcb43f"}, &(0x7f0000000100)=0x41) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000000)={0x2, r3}) shutdown(r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f00000005c0)) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000580)='NET_DM\x00') fstatfs(r1, &(0x7f00000001c0)=""/190) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x14, r4, 0x100, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:18:29 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:29 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000ec3ff4)) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x400801) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000140)={0xa5f2, 0x8, 0x2}) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000080)={'security\x00', 0x1d, "d891efc7ce67d0d2f3458b75f9668c3a66689f2a28188f9eb854bcb43f"}, &(0x7f0000000100)=0x41) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000000)={0x2, r3}) shutdown(r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f00000005c0)) syz_genetlink_get_family_id$net_dm(&(0x7f0000000580)='NET_DM\x00') fstatfs(r1, &(0x7f00000001c0)=""/190) 15:18:29 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:29 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:29 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:29 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000ec3ff4)) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x400801) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000140)={0xa5f2, 0x8, 0x2}) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000080)={'security\x00', 0x1d, "d891efc7ce67d0d2f3458b75f9668c3a66689f2a28188f9eb854bcb43f"}, &(0x7f0000000100)=0x41) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000000)={0x2, r3}) shutdown(r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f00000005c0)) syz_genetlink_get_family_id$net_dm(&(0x7f0000000580)='NET_DM\x00') 15:18:29 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:29 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:29 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000ec3ff4)) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x400801) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000140)={0xa5f2, 0x8, 0x2}) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000080)={'security\x00', 0x1d, "d891efc7ce67d0d2f3458b75f9668c3a66689f2a28188f9eb854bcb43f"}, &(0x7f0000000100)=0x41) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000000)={0x2, r3}) shutdown(r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f00000005c0)) 15:18:29 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:29 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:29 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000ec3ff4)) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x400801) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000140)={0xa5f2, 0x8, 0x2}) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000080)={'security\x00', 0x1d, "d891efc7ce67d0d2f3458b75f9668c3a66689f2a28188f9eb854bcb43f"}, &(0x7f0000000100)=0x41) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000000)={0x2, r3}) shutdown(r1, 0x0) 15:18:29 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:29 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:30 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000ec3ff4)) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x400801) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000140)={0xa5f2, 0x8, 0x2}) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000080)={'security\x00', 0x1d, "d891efc7ce67d0d2f3458b75f9668c3a66689f2a28188f9eb854bcb43f"}, &(0x7f0000000100)=0x41) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000000)={0x2, r3}) 15:18:30 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:30 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000ec3ff4)) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x400801) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000140)={0xa5f2, 0x8, 0x2}) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000080)={'security\x00', 0x1d, "d891efc7ce67d0d2f3458b75f9668c3a66689f2a28188f9eb854bcb43f"}, &(0x7f0000000100)=0x41) 15:18:30 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:30 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:30 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:30 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:30 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000ec3ff4)) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x400801) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000140)={0xa5f2, 0x8, 0x2}) 15:18:30 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:30 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:30 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000ec3ff4)) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x400801) 15:18:30 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:30 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:30 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:30 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000ec3ff4)) 15:18:31 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) socket$inet6(0xa, 0x802, 0x0) epoll_create1(0x0) 15:18:31 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:31 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:31 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) socket$inet6(0xa, 0x802, 0x0) 15:18:31 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:31 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:31 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:31 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:31 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:31 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:18:31 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:31 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:31 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:31 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:31 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:31 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:31 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:31 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:32 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:32 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:32 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:32 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:32 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:32 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:32 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:32 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:32 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:32 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:32 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:32 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:32 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:32 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:32 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:33 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:33 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:33 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:33 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:33 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:33 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:33 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:33 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:33 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:33 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:33 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:33 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:33 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:33 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:33 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:33 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:33 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:34 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:34 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:34 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:34 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:34 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:34 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:34 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:34 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:34 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:34 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:34 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:34 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:34 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:34 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:18:34 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:34 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:34 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:18:35 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:35 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:35 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:35 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:35 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:35 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:35 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:35 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:35 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:35 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:35 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:35 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:35 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:35 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:35 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:36 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:36 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:36 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:36 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:36 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:36 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:36 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:36 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:36 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:36 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:36 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:36 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:36 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:36 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:36 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:36 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:36 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000003580)='/dev/swradio#\x00', 0x1, 0x2) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000035c0)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000003600)={0x0, 0x3, 0x0, 0xffffffffffff0000, 0x3ff}, &(0x7f0000003640)=0x18) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000003680)={r1, 0x10}, &(0x7f00000036c0)=0x8) prctl$PR_SET_SECCOMP(0x16, 0x3, &(0x7f0000003740)={0x1, &(0x7f0000003700)=[{0x4, 0x6, 0x7, 0x100000001}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000037c0)={0x5, &(0x7f0000003780)=[{0x6, 0x9, 0xfe82, 0x4}, {0x800, 0x0, 0x0, 0xfff}, {0x696f, 0x8001, 0x6, 0x8e9}, {0x4, 0x2, 0x401, 0x2}, {0x3, 0x1, 0x91, 0x5}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x10, r0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000003800)={r0, r0, 0x15, 0x2}, 0x10) prctl$PR_SVE_GET_VL(0x33, 0x1c925) ioctl$TCGETS(r0, 0x5401, &(0x7f0000003840)) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000003880)={0x6, 0x5}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f00000038c0)=0x3, 0x4) r2 = semget(0x3, 0x7, 0x8) semop(r2, &(0x7f0000003900)=[{0x3, 0x7, 0x800}], 0x1) ioctl$FIBMAP(r0, 0x1, &(0x7f0000003940)=0x7) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000003980)) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f00000039c0)) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000003a00)={0x1, 0x4, [@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @remote, @dev={[], 0x28}]}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000003a40)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x9, &(0x7f0000003a80)=""/62) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x7) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000003ac0)={{0x3f, @broadcast, 0x4e20, 0x4, 'nq\x00', 0x8, 0x10000, 0xf}, {@multicast1, 0x4e20, 0x0, 0x7, 0x6, 0x1}}, 0x44) process_vm_writev(r3, &(0x7f0000003d00)=[{&(0x7f0000003b40)=""/124, 0x7c}, {&(0x7f0000003bc0)=""/78, 0x4e}, {&(0x7f0000003c40)=""/183, 0xb7}], 0x3, &(0x7f0000004000)=[{&(0x7f0000003d40)=""/145, 0x91}, {&(0x7f0000003e00)=""/165, 0xa5}, {&(0x7f0000003ec0)=""/144, 0x90}, {&(0x7f0000003f80)=""/72, 0x48}], 0x4, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000004040)={0x3, r0}) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000004080)=0x1, 0x4) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x4) ioctl$TIOCSCTTY(r0, 0x540e, 0x3) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000040c0)=""/108, &(0x7f0000004140)=0x6c) epoll_create1(0x80000) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000004180)=0x1) 15:18:37 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:37 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:37 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:37 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:37 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:37 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:37 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:37 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:37 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:37 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:37 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) [ 271.039367][T14049] IPVS: ftp: loaded support on port[0] = 21 [ 271.222602][T14049] chnl_net:caif_netlink_parms(): no params data found [ 271.293576][T14049] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.300854][T14049] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.310283][T14049] device bridge_slave_0 entered promiscuous mode [ 271.321328][T14049] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.328842][T14049] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.338200][T14049] device bridge_slave_1 entered promiscuous mode [ 271.378346][T14049] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 271.392206][T14049] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 271.432189][T14049] team0: Port device team_slave_0 added [ 271.443071][T14049] team0: Port device team_slave_1 added [ 271.698235][T14049] device hsr_slave_0 entered promiscuous mode [ 271.873406][T14049] device hsr_slave_1 entered promiscuous mode [ 271.942627][T14049] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.949951][T14049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.958028][T14049] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.965393][T14049] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.083772][T14049] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.110504][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.123552][ T2863] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.136092][ T2863] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.149330][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 272.176872][T14049] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.203502][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.214284][ T2863] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.221631][ T2863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.283528][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.293637][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.303056][ T2863] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.310324][ T2863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.319943][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 272.330452][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 272.341057][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 272.351650][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 272.361890][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 272.372469][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 272.382806][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 272.392510][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.408961][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 272.419116][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 272.432549][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.450700][T14049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 272.512098][T14049] 8021q: adding VLAN 0 to HW filter on device batadv0 15:18:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001f40)={0x18, 0x4, 0x3, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x2000000000000}, 0x3c) 15:18:39 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:39 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:39 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:39 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:39 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:39 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:40 executing program 3: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) r1 = socket$inet6(0xa, 0x80000, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x2000000000000580, 0x4) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x20000000004e20, 0x0, @ipv4}, 0x1c) connect$inet6(r0, &(0x7f00000005c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f00000000c0)=0x2, 0x4) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=""/36, 0xffffffffffffffc9}, 0x2000) sendmmsg(r0, &(0x7f0000000140), 0x1af, 0x0) 15:18:40 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:40 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:40 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:40 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:40 executing program 3: pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000100)={0x1bacf914c1bae2e, &(0x7f0000001380)=[{}, {}, {}]}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x100000001}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r3, 0x2, 0x401}, 0xc) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r3}, &(0x7f0000000240)=0x8) preadv(r2, &(0x7f0000002500)=[{&(0x7f0000000380)=""/4096, 0x1000}], 0x1, 0x300) 15:18:40 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:40 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:40 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:40 executing program 3: r0 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x5, 0x4100) r1 = accept4$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000001c0)=0xffffff45, 0x800) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}) accept4$inet6(r0, 0x0, &(0x7f0000000240), 0x800) r2 = socket(0x15, 0x80005, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000040)=0xffffffffffffff9c) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x110000000000031, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="b10000002bd42ac39d1520bd2232b34a8a87abf5f82705b112024f11ed395b3c908b42fdcc432a15b6055821c97aa854b211fb3aba991572aa84b3eff3aa2ca72379039d12929532d65bc79e3f48f6a6dfdb7d767b209914678e24f533c377d7119510be7b51b4655458e761ec0ac96f95c47f4a9821ec3a4f01b762bcf6bbfad4eac07d4e48e96c3f0bd4622fe87cafbdc85cdd542a38178c49a9d5a778413605c008f0f265baa4fc4f7b4992d7ffeda2d75fb10a"], &(0x7f0000000380)=0xb9) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000003c0)={0x2e0dcc53, 0x2, 0x200, 0x6, 0x400, 0x0, 0x6, 0x3, r3}, &(0x7f0000000400)=0x20) getsockopt(r2, 0x200000000113, 0x270c, 0x0, &(0x7f0000000140)) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xff, 0x38801) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000280)={0x8, 0x7, 0x4, 0x10001, 0x6}) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000100)=0xe9) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000180)={0x200, 0x4, 0x200, 0x8, 0x8}) 15:18:40 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:40 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:40 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:41 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:41 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:41 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x101000000000001, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=@fragment, 0x8) connect$inet6(r0, &(0x7f00000005c0)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x840, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f00000001c0)={0x0, 0xc5ab, 0x9, &(0x7f0000000180)=0x100000000}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000100)={0x3, 0x1, 0x100000001, {}, 0x5, 0xfffffffffffffffa}) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080), 0x21b) 15:18:41 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:41 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:41 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:41 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000001cb0000000000000000000000590000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001a0004000700"], 0x28}}, 0x0) 15:18:41 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:41 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff2000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff7000/0x2000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000feb000/0x1000)=nil, &(0x7f00000000c0)="f58cb5e62ab6c894ae51de7862600c8921d1161bb28641b3c55f9516128bdedb61bb4260c285a7a4d04c7d24daf177549c41", 0x32}, 0x68) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') r3 = dup2(r2, r2) ioctl$UI_SET_FFBIT(r3, 0x4004556b, 0x42) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x4400ae8f, &(0x7f0000000140)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 15:18:41 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:41 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:41 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) [ 274.847204][T14164] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 15:18:41 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:41 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:42 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:42 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:42 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:42 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="3a100000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0x100}, &(0x7f0000000180)=0x8) r2 = socket$pptp(0x18, 0x1, 0x2) writev(r2, &(0x7f0000000500)=[{&(0x7f00000001c0)="3022c9b8ecf60908feaa74f88c293fa2e12773dbedb78f18911cb48275f0dddcab2818a7404295004cfc3640408049fb8cf88d46ecd3514a2b", 0x39}, {&(0x7f0000000200)="2e2fddb4a7dc55bd6b89c61d308ba93647ea5ba83dafc24aa41774805f88a2f7e88edf27d1a20b1bd4a3f2b4b736591b575f46ccf3e25028", 0x38}, {&(0x7f0000000240)="7e801f8dfd5b18320765f13f06877bd76dcbecf3e26bce9b302dbbc0b5b7201228756da7dee76ac2c27d2447981a73d18fb94c248e8abe9c626a3c0ea1ca66314cc9c038b4bf2bb035706c2f331b8b7eaa7cf905db8686915da24a759f744d80b016d4e95ce208bdaf0ec76ea1ed8c805261", 0x72}, {&(0x7f00000002c0)="b0b7ab234f67cd7b05622a56f50e35681eae40ded2fd946ed887c8c55e36dee066a00e91381dc5a1189d0084a8257f5a9559c2232629e9cc51887000d2408e200ace09dad11e803b4b2bb306b78aa0609d35866eec88d8588bd249403bb7e983f9af98dca2d6d5812635a89f9ab8d548caf6fd0505e9ce8e4eec24ec0e3aebf7208fc27a9ed839229b027cd546bf3bcccba711e4cc435b9708e52c510f2ec9f4e8b9c0a474c6dd01604ade63b5e8709cde00dfa37d42a974a332496c96ed2fbba3e6678ac60f9e3a5ffa00454cc083c5b124fe33280112e51a21e09fc7c4cc3ffa8d3665e4ecb1", 0xe7}, {&(0x7f00000003c0)="2c56e75a0db2ad3d0cf86b47055bf803ad7aad6f09642bfa5a3bd32ddd4360ebb09aa193601943ca2b415215b4bd303192d7271ba96be590a8d5fc6f08627131505d76e1d6", 0x45}, {&(0x7f0000000440)="7ae8721413c888a7c79a1e044f255b4ead8ebcdd56f8fe5c00a1baae1ce39c45a1c2ea83c7041177e8abaed6ff79f902c64efe99586f2feb76dc21cca340ffb4e9c8ff6b8fc2772f3ea74a0fb062720999df2c78c4bb46de05b508c3bc61e8fe6c6da3b77f79643102c9d17d007c4d15a39edc5a89476a5a2f57822367f723c66e6880c984498a27680eef5e1fb7873aa81c53408d4d8c18b3a8f538e41849830e392cd22a72de51afb87ca6dbdb24f7f1f216782a92b18ca0", 0xb9}], 0x6) r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0xfff, 0x0) connect$pptp(r2, &(0x7f0000000580)={0x18, 0x2, {0x0, @rand_addr=0xfffffffffffffffe}}, 0x1e) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000040)={0xbf0000, 0x517, 0xfffffffffffffffe, [], 0x0}) 15:18:42 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:42 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:42 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:42 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:42 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:42 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:42 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020300021100000000000000000000000500060000000000020000000000000000000000000000000000000000000018e46762603c59830002000000e000000200000000000000000200010000000000000009000000000005000500000000000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0x88}}, 0x0) 15:18:42 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:42 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:42 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:43 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:43 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:43 executing program 3: unshare(0x20400) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7ff, 0xa001) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000080)=0x1) r1 = socket(0x848000000095, 0x805, 0x0) getsockopt(r1, 0x114, 0xfffffffffffffffc, 0x0, &(0x7f0000000000)) 15:18:43 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:43 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:43 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:43 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x101, 0x400) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0xcc, r1, 0x402, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2d7}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffffff7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0xcc}, 0x1, 0x0, 0x0, 0x1}, 0x40001) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r2, 0x0) getsockopt$sock_buf(r2, 0x1, 0x3b, 0x0, &(0x7f0000000000)=0x11d) 15:18:43 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:18:43 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:43 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:43 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:43 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/hwrng\x00', 0x10102, 0x0) write$P9_RLINK(r0, &(0x7f0000000a80)={0x4, 0x47, 0x2}, 0xfffffe38) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x17f) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x208000}, 0xc, &(0x7f0000000140)={&(0x7f0000000780)={0x140, r3, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfff}]}, @TIPC_NLA_MEDIA={0xf8, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5f91c362}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc2a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe7e}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4a9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1d2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x927b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7981}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}]}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc9}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x4044011}, 0x1) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) openat$zero(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/zero\x00', 0x4800, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x8000040000008, 0x0, 0x0, 0x0, 0x4cb]}) unshare(0x20400) r6 = socket$rxrpc(0x21, 0x2, 0xa) poll(&(0x7f00000000c0)=[{r6}], 0x1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r7 = syz_open_dev$sndpcmp(&(0x7f0000000980)='/dev/snd/pcmC#D#p\x00', 0x0, 0x480000) ioctl$RTC_WIE_ON(r7, 0x700f) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000380)={"ad9b2db013541a9587fb7d8e568bfc0c9084dccba69ea640b893fb38f2ab5d1ffbbc26b6a49b2329d309d2a19a005b80035526c8cf16450110a114dd0ed312c7a4939710e098d90a8b57b5823c324a53413803b041a62cc614db5a08aa1b5e03045e935b5e87bca70e052e6846053a207c2d7a8223edb0dd0ad45e17249ee6413df8170f7818e316e6f8e8d433d96ab52ec0d5624dd65d005f9c7166e373d83232cec05ffc3082a7b9f4f5859f5349219c22dcda7dc192835ca349386185fae68eb05764ced6064cdc02670f9215ba0d662bde0edfbd57f07833e47a97f6226ca0aac4c9460a7400aac9bd909539ffd12992a9ed7527720b75acc22af7cda2d1c5d5a08d197ee42240ec724f1f117fb2131daf105bae4e86e45850fedf7cad71361124084f5dbcdaf6f7dcc7f3681310c737c8fd254b3f389188cb9eeb066108ec77cbe16b8e86009679b7c7249e865071df0d747548a2d91d0fdf36715cec9ab2e39f9ef195e8d135f4fae9970c2cf9173fc9ee2a48005b386efcca33761963bfcd0e6c74817dd3da37315cbc4e7eebadfc109815ad84b4028d6f8ab36b6c07e3a9129747fed4626f297092df906d29274839a13cd526f1e0c7a43563e170e1fa1cc99ac9ef54d4076692754d7cf0c6faf2ae18b9666d5cd1f6b72c11fd38fd9e965eadcb3b5c0f9f562f5265603175dad9be6290bbe1f1495e4b458287c9acbfab062276fab19ba98bb39b462bf8eec2b6b1cf3ee8a5bf37e7238e2b53cfb67678f73f9743495a703009515e065b123d2a516aee3a39bac37400d40171cf802ba1a2985fb9d4e38d30154bf31720bcba67174cf13838ff6e8551d7ccfe9d33ec9e9021c990de2ad59b9e35c16d687c1e8eaf453c98d6a065302ced94f52c27b63ef66e8a4e72d3650a1096ca8ef61db9e695de82ba838d75ee153f30ce15227f450cf130efb70f0bb810acbcfdbfad40e659543e73c5e93dc9311aad3d947288bba49828f97d34f60e30eb3a9e02ed0f759fed887acd5ea8657db61334bd2dbf120226319d7d5354b9cbea057cb366be74f8ab83283cbbac10bd13c63d9363439b39bb9313629be63fe3ea99cba865cf9c8584e4087d0e3ff3c315204012869e191a7fa5443582c29ef7b5a4e66135e25586d7fcee33c28d54aaa1488073fbbd02f49875623be4838105960d0042f912d58f18c0d2c44a90505b0d1896e9e5915af531cad65b79ebe0d570e94bb0b0519bafeccf1816c38225997eb16ede9e8e4397ffa2f972cd9841f81f55a806f35f7e3b1bbac987035b30a9fb9c2c97e29584c7016c09ba1a072cb539ddb61f86028db9813ad3c9d51feaee8108a9987191df854ae92645fadd38b2c827da36abb152a9cfe02855b5a3f3d863615402c1ba1de1136e054ea896d9c23a0492206b29cfaa18d4b5527fe0c4437e56728396"}) syslog(0x4, &(0x7f0000000b00)=""/241, 0xf1) ioctl$KVM_RUN(r4, 0xae80, 0x0) write$USERIO_CMD_REGISTER(r7, &(0x7f0000000a40)={0x0, 0xffff}, 0x2) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') ioctl$EVIOCSABS0(r6, 0x401845c0, &(0x7f00000009c0)={0x7f, 0xfff, 0x4, 0x100000000, 0x7, 0x100000000}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000940)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40400000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x28, r8, 0x300, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x40) 15:18:43 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:43 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:43 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:44 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) [ 276.926040][T14257] kvm [14256]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000007 data 0x4d00000000f [ 276.954133][T14257] kvm [14256]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000006 data 0x4d00000000f 15:18:44 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') [ 276.993018][T14257] kvm [14256]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000005 data 0x4d00000000f 15:18:44 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) [ 277.043378][T14257] kvm [14256]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000004 data 0x4d00000000f 15:18:44 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:44 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:44 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:44 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/hwrng\x00', 0x10102, 0x0) write$P9_RLINK(r0, &(0x7f0000000a80)={0x4, 0x47, 0x2}, 0xfffffe38) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x17f) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x208000}, 0xc, &(0x7f0000000140)={&(0x7f0000000780)={0x140, r3, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfff}]}, @TIPC_NLA_MEDIA={0xf8, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5f91c362}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc2a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe7e}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4a9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1d2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x927b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7981}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}]}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc9}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x4044011}, 0x1) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) openat$zero(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/zero\x00', 0x4800, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x8000040000008, 0x0, 0x0, 0x0, 0x4cb]}) unshare(0x20400) r6 = socket$rxrpc(0x21, 0x2, 0xa) poll(&(0x7f00000000c0)=[{r6}], 0x1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r7 = syz_open_dev$sndpcmp(&(0x7f0000000980)='/dev/snd/pcmC#D#p\x00', 0x0, 0x480000) ioctl$RTC_WIE_ON(r7, 0x700f) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000380)={"ad9b2db013541a9587fb7d8e568bfc0c9084dccba69ea640b893fb38f2ab5d1ffbbc26b6a49b2329d309d2a19a005b80035526c8cf16450110a114dd0ed312c7a4939710e098d90a8b57b5823c324a53413803b041a62cc614db5a08aa1b5e03045e935b5e87bca70e052e6846053a207c2d7a8223edb0dd0ad45e17249ee6413df8170f7818e316e6f8e8d433d96ab52ec0d5624dd65d005f9c7166e373d83232cec05ffc3082a7b9f4f5859f5349219c22dcda7dc192835ca349386185fae68eb05764ced6064cdc02670f9215ba0d662bde0edfbd57f07833e47a97f6226ca0aac4c9460a7400aac9bd909539ffd12992a9ed7527720b75acc22af7cda2d1c5d5a08d197ee42240ec724f1f117fb2131daf105bae4e86e45850fedf7cad71361124084f5dbcdaf6f7dcc7f3681310c737c8fd254b3f389188cb9eeb066108ec77cbe16b8e86009679b7c7249e865071df0d747548a2d91d0fdf36715cec9ab2e39f9ef195e8d135f4fae9970c2cf9173fc9ee2a48005b386efcca33761963bfcd0e6c74817dd3da37315cbc4e7eebadfc109815ad84b4028d6f8ab36b6c07e3a9129747fed4626f297092df906d29274839a13cd526f1e0c7a43563e170e1fa1cc99ac9ef54d4076692754d7cf0c6faf2ae18b9666d5cd1f6b72c11fd38fd9e965eadcb3b5c0f9f562f5265603175dad9be6290bbe1f1495e4b458287c9acbfab062276fab19ba98bb39b462bf8eec2b6b1cf3ee8a5bf37e7238e2b53cfb67678f73f9743495a703009515e065b123d2a516aee3a39bac37400d40171cf802ba1a2985fb9d4e38d30154bf31720bcba67174cf13838ff6e8551d7ccfe9d33ec9e9021c990de2ad59b9e35c16d687c1e8eaf453c98d6a065302ced94f52c27b63ef66e8a4e72d3650a1096ca8ef61db9e695de82ba838d75ee153f30ce15227f450cf130efb70f0bb810acbcfdbfad40e659543e73c5e93dc9311aad3d947288bba49828f97d34f60e30eb3a9e02ed0f759fed887acd5ea8657db61334bd2dbf120226319d7d5354b9cbea057cb366be74f8ab83283cbbac10bd13c63d9363439b39bb9313629be63fe3ea99cba865cf9c8584e4087d0e3ff3c315204012869e191a7fa5443582c29ef7b5a4e66135e25586d7fcee33c28d54aaa1488073fbbd02f49875623be4838105960d0042f912d58f18c0d2c44a90505b0d1896e9e5915af531cad65b79ebe0d570e94bb0b0519bafeccf1816c38225997eb16ede9e8e4397ffa2f972cd9841f81f55a806f35f7e3b1bbac987035b30a9fb9c2c97e29584c7016c09ba1a072cb539ddb61f86028db9813ad3c9d51feaee8108a9987191df854ae92645fadd38b2c827da36abb152a9cfe02855b5a3f3d863615402c1ba1de1136e054ea896d9c23a0492206b29cfaa18d4b5527fe0c4437e56728396"}) syslog(0x4, &(0x7f0000000b00)=""/241, 0xf1) ioctl$KVM_RUN(r4, 0xae80, 0x0) write$USERIO_CMD_REGISTER(r7, &(0x7f0000000a40)={0x0, 0xffff}, 0x2) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') ioctl$EVIOCSABS0(r6, 0x401845c0, &(0x7f00000009c0)={0x7f, 0xfff, 0x4, 0x100000000, 0x7, 0x100000000}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000940)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40400000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x28, r8, 0x300, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x40) 15:18:44 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:44 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) [ 277.561339][T14288] kvm [14287]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000007 data 0x4d00000000f 15:18:44 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:44 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) [ 277.610127][T14288] kvm [14287]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000006 data 0x4d00000000f [ 277.646359][T14288] kvm [14287]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000005 data 0x4d00000000f 15:18:44 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) [ 277.704778][T14288] kvm [14287]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000004 data 0x4d00000000f 15:18:44 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:44 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:18:44 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:45 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x72, &(0x7f0000000180), 0xc) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x70000000000000, 0x101100) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x4) 15:18:45 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:45 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:45 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:45 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, 0x0, 0x0) close(r0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 15:18:45 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:45 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:45 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000240)) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00'], 0x1) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0xb8ec, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) 15:18:45 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:45 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:45 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:45 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:45 executing program 3: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0xfffe, 0x0) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000000)={0x4, 0x100, 0x8, {0x0, 0x8001}}) 15:18:45 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:45 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:46 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:46 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x42, 0x0) unshare(0x24020400) ioctl$int_in(r0, 0xc0000800005016, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) 15:18:46 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:46 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:46 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:46 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:18:46 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:46 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:46 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x42, 0x0) unshare(0x24020400) ioctl$int_in(r0, 0xc0000800005016, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) 15:18:46 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:46 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:46 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:46 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:46 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:46 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:47 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x1, @broadcast, 'ip6_vti0\x00'}}, 0x1e) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x42) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000140)={0x980000, 0xe9, 0x7fffffff, [], &(0x7f0000000100)={0x9f0901, 0x101, [], @p_u16=&(0x7f0000000080)=0x1}}) ioctl$PPPOEIOCSFWD(r0, 0x40047452, &(0x7f0000000040)={0x18, 0x4, {0x0, @local, 'ip_vti0\x00\x00\x00\x01\x00\x00\xf9\xff\x00'}}) 15:18:47 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:47 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:47 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000b82000)={0x10000004}) write$binfmt_aout(r0, &(0x7f00000000c0)={{0x1cf, 0xdc, 0x9, 0x1a5, 0x20b, 0xb26, 0x303, 0x80000000}, "45cbecf09043ffebde15f613eca4cc5db3960a60e2a16aefbc60d9bd54598142099bc5e8c7", [[], [], [], [], [], [], [], [], [], []]}, 0xa45) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0x0) 15:18:47 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:47 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:47 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:47 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:47 executing program 3: r0 = socket(0x100000400000010, 0x2, 0x0) write(r0, &(0x7f0000000080)="240000005a001f0014f9f4070109040002007a7708000100"/36, 0xfcda) io_setup(0x2, &(0x7f0000000000)=0x0) io_cancel(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x6, 0x10001, r0, &(0x7f00000000c0)="d0b253b69c44f6e9b3b858ea3fff535c589bef8d4b1e08eae56fe384fd0d3b9ea0ef7f93eaf61e073d57a44ec44b8d05ef6783546208e851bc77a80c7e67db8ab4c2bdac3e35564d851888829bddff5e2fadffae92cc7169c33cee174f79db7893d74d605960d4b5d5e795bc69a6d13adc10e921e8722921c06e2470770cbb7fb85033b2e9059c1cd4787e9bb07db4dc913c6839397028d8112caf8a84cc67a02bb303d3c96b181c65053918fc5e65317e153cd401665385602f60dd3b3ca2705657024edd3de3db4c6f7116fa8e2c005b76c937aaa5b9cfa6912888a9544d66", 0xe0, 0x5b0, 0x0, 0x3}, &(0x7f00000001c0)) 15:18:47 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:47 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) [ 280.669966][T14439] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 15:18:47 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:47 executing program 3: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000032fe8)) setuid(0x0) r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000080)={0x0, 0x1, [0x1, 0x1, 0x1, 0x1, 0x2, 0x1000, 0x4, 0x1000]}) 15:18:47 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') [ 280.918055][T14454] capability: warning: `syz-executor.3' uses 32-bit capabilities (legacy support in use) 15:18:48 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:48 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:48 executing program 3: r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) sched_setparam(r3, &(0x7f00000000c0)) ioctl(r0, 0x6, &(0x7f0000000280)="1edca5e191a9c0057e0bcfec08fd572468b9aba94452bbd16d996753709f04a18d4b53942b64a44033813998ca382fd31bf904ee55dcc807a368d9bc7b8e3fbbb9466b1be936048aec993d9f3cec4ec8bf5526755eb5563b7ffad2beee9263c2f5b44baa9a25b44943bf0100e9e234bfbc68991846966111e0e95ab12dc8f8e13376123ee65eebbf76af17a8910b67a215bc89cff2a18ee30a1f153fb3318c7b2ec3b5eb67fee902c7f6f6e57fbb09d69a9310b08ddc910fa9d2e98328361b510afce1ed36c1e39203044409e589cce4595f0d2f5c19e0bf2671b261ff4b135160f58e42879dd9ca0fc3a7") sendfile(r0, r2, 0x0, 0x10000) accept4$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x4e24, 0x8, @remote, 0xffff}, {0xa, 0x4e21, 0x100, @mcast1, 0x6}, 0x400, [0x100000000, 0xfffffffffffffffe, 0x80, 0x100, 0x7, 0x8c2, 0xfffffffffffffffa, 0x8]}, 0x5c) dup(r0) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x3, {0x41, 0x4, 0x2}}, 0x10) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, @local, 0x20, 0x7f, 0x7f, 0x400, 0x1000, 0x42, r4}) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f00000003c0)={0x9, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) 15:18:48 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:48 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:48 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:48 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000200)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "95d2f20fdf1464c5c69edbfb0fa9f742063dfc186d4532384049d39ee6d276afa0b849e526346909282c70498ac6a55ddd3028068ba95d698504cf9bae25c9"}, 0x45c) 15:18:48 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:48 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:18:48 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r1 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r1, 0x10d, 0xb, &(0x7f0000000080)=r1, 0x4) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000000)=0x1000) 15:18:48 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:48 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:48 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:48 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:48 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:49 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:49 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) r1 = syz_open_dev$amidi(0x0, 0x7, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RAUTH(r1, &(0x7f0000000300)={0x14, 0x67, 0x2, {0xe1d0c062f8c79ced, 0x2}}, 0x14) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000400)={0x0, 0x7fffffff, 0x30, 0x101, 0xfffffffffffffeff}, &(0x7f0000000440)=0x18) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000480)={0x4, 0x401, 0x4, 0x81, 0x1800000000000000, 0xda2f, 0x9, 0x5, r3}, &(0x7f00000004c0)=0x20) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @multicast2}, @in=@broadcast, 0x4e20, 0x3ff, 0x4e21, 0xbc, 0xa, 0xa0, 0x20, 0x3c, 0x0, r2}, {0x7fffffff, 0x8, 0x7, 0xfffffffffffffffe, 0x7fffffff, 0x1, 0x1, 0x5}, {0x7fff, 0x10000, 0x1f, 0x2}, 0x3e3, 0x6e6bb1, 0x3, 0x1, 0x1, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d6, 0xff}, 0xa, @in=@loopback, 0x3501, 0x5, 0x3, 0x0, 0x7f, 0x7ff, 0x800}}, 0xe8) utimes(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={{0x0, 0x7530}}) unshare(0x600) fstat(r1, &(0x7f0000000280)) ioctl$RTC_WKALM_SET(r0, 0x7002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28, &(0x7f0000000200)}, 0x10) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f00000003c0)={0x2, 0x8}) 15:18:49 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:49 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:49 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:18:49 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:49 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x38, r1, 0x1, 0x0, 0x0, {0x9}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x5, 0x4}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x38}}, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0xd22, 0x40080) prctl$PR_SET_FPEXC(0xc, 0x50000) r3 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x4, 0x2) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000240)={0x3, r3}) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x20}}, 0x40) getrlimit(0x9, &(0x7f00000002c0)) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000280)={0x3, 0xffffffffffffff9c}) 15:18:49 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:18:49 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:49 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:49 executing program 4: personality(0xdc00006) r0 = socket$inet6(0xa, 0x3, 0x51f0e63f) getpeername(r0, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000140)={{0xffffffffffffffff, 0x3, 0x2, 0x3, 0x4}}) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000180)) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) write$9p(r2, &(0x7f0000000240)="7d093bc53e171281b363155294b17fdbd3ba72886954030b8139593a50ab462b41d5837e72423066", 0x28) r4 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f00000002c0)={0x1000, 0x2, 'client1\x00', 0x5, "35827b448e5a0398", "aca4bd1bc3965be827c2a1c62f783dd979cabc246a351620471a69ba25d072fb", 0x1, 0x1f}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000380)={0x9, 0x0, 0x8, 0x7fff, 0xfffffffffffeffff, 0x2, 0x0, 0x800, 0x0}, &(0x7f00000003c0)=0x20) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000400)={r5, 0x2}, &(0x7f0000000440)=0x8) write$apparmor_exec(r2, &(0x7f0000000480)={'stack ', 'wlan0%*&trusted#\'\x00'}, 0x18) ioctl$HIDIOCGNAME(r2, 0x80404806, &(0x7f00000004c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000500)={0xffffffffffffffff}, 0x117, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r6, 0xad, "903a71", "4119ea19c2692682a4b6ec717dc4649ecbd0ba7629afabf15543852f69d571813837f7036d80b0ae5305a308a53569afc69b9f401d506ec011bd16fb517107f974eafd016da38fb84937f511a527fa888363561aec6b724d331386f1f3a02c830929c0b1914c69b7eb3aa9eecdc93030ead6a90a31100c51c5b8dfe7e9b15965d43e5461248ff4be57eefc480c022e4b56216c1dcf6dc8fc961933a3f83f6506d69125ab133ad6440bd76ebdff90ff1931c28c0799bddb89ab2405ae86eeb64481fbb77e68d10ed0c1215cf420fa1bffde1c9454552bf32ba1f6b754508eda80ed9ef7f78e901494196458fbf9bb5e78162b90fd35e94407a45e635698ea1eb0"}}, 0x110) socket$vsock_stream(0x28, 0x1, 0x0) setxattr$security_ima(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='security.ima\x00', &(0x7f0000000740)=@md5={0x1, "684fd210922fa2064eb9c826d9380304"}, 0x11, 0x1) ioctl$KDENABIO(r2, 0x4b36) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000780)=0x7, 0x4) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x7, 0x3ff}) getsockopt$inet_int(r2, 0x0, 0x1f, &(0x7f0000000800), &(0x7f0000000840)=0x4) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000880)={0x0, 0xe05b, 0x6, 0x3e56}) r7 = fcntl$getown(r4, 0x9) move_pages(r7, 0x3, &(0x7f00000008c0)=[&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil], &(0x7f0000000900)=[0x4, 0x8ee, 0xfffffffffffffe00, 0x6], &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0], 0x2) setsockopt$TIPC_MCAST_BROADCAST(r2, 0x10f, 0x85) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) 15:18:49 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:49 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xc2, &(0x7f0000000200), &(0x7f0000000080)=0x4) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x40) 15:18:49 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:49 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:49 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:50 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:50 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:50 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:50 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x40, 0x181040) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000080)=0x8) r1 = socket(0x400000000010, 0x3, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x24, 0x70bd25, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x200000d4) clock_getres(0x5, &(0x7f0000000040)) write(r1, &(0x7f0000000180)="2400000019002551075c0165ff0ffc02802000030011000500e1000c0400070004000700", 0x24) 15:18:50 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:50 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') [ 283.712128][T14587] IPVS: ftp: loaded support on port[0] = 21 [ 283.904616][T14587] chnl_net:caif_netlink_parms(): no params data found [ 283.975738][T14587] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.983174][T14587] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.992307][T14587] device bridge_slave_0 entered promiscuous mode [ 284.008181][T14587] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.016052][T14587] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.025409][T14587] device bridge_slave_1 entered promiscuous mode [ 284.064927][T14587] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 284.078467][T14587] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 284.118753][T14587] team0: Port device team_slave_0 added [ 284.129285][T14587] team0: Port device team_slave_1 added [ 284.210098][T14587] device hsr_slave_0 entered promiscuous mode [ 284.245120][T14587] device hsr_slave_1 entered promiscuous mode [ 284.315130][T14587] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.322505][T14587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.330401][T14587] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.337775][T14587] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.451814][T14587] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.483393][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.495972][ T3805] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.506711][ T3805] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.524219][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 284.547535][T14587] 8021q: adding VLAN 0 to HW filter on device team0 [ 284.566748][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.576065][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.583380][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.635960][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.645216][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.652516][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.664750][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 284.701447][T14587] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 284.712762][T14587] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 284.729069][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 284.739179][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 284.749172][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 284.759617][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.806876][T14587] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 284.819138][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 15:18:52 executing program 4: mkdir(&(0x7f0000001440)='./file0\x00', 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x7, 0x8}, &(0x7f0000000040)=0x10) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x108) accept4$packet(r2, &(0x7f0000000180), &(0x7f00000001c0)=0x14, 0x800) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000080)={r1, 0x71, "4e7de28e0252eb3cff027dab7615c4e8ee9ced3be5e79ddb300d1e688ec8427bbaf0cc83439af387ef5e2884a81ec29c3603d875d3cdd0d99ed20e6b27e3ff21688b439065af7a3b37c81ea75e0e583e041cd3e4b42f54727dd894265df3f9ea0f43759900d7a7033367121ccd3a0fe45d"}, &(0x7f0000000100)=0x79) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000200)={r1, 0x10001}, &(0x7f0000000240)=0x8) capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) statfs(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/4096) chroot(&(0x7f00000016c0)='./file0\x00') 15:18:52 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet(0x10, 0x3, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3, 0x200000) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000100)={0x4000, &(0x7f0000000080), 0x0, r3, 0x4}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="24000000240007011dfffd940101830020200a000900000001000000000000000d00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f15a3", 0x4c}], 0x1}, 0x0) 15:18:52 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:52 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') [ 285.119879][T14599] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 15:18:52 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') [ 285.178911][T14604] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 15:18:52 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:52 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:52 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="2bc74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cdb46b507daea1c09fc1fe6c"}, 0x20) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, 0x1b) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x10000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000480)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) tkill(r3, 0xd) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x1) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xfdef) 15:18:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000040), 0x10) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@broadcast, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "06d2d2", 0x8, 0x32, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x800e]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000080), 0x4) 15:18:52 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:52 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) [ 285.474940][T14618] device nr0 entered promiscuous mode 15:18:52 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:18:52 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000040), 0x10) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@broadcast, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "06d2d2", 0x8, 0x32, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x800e]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000080), 0x4) 15:18:52 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:18:52 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:53 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:53 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:18:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffff9c}) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)={r2, 0x0, r3}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x3e, 0x0) write$nbd(r4, &(0x7f0000000180)={0x6000000, 0x0, 0x0, 0x0, 0x1, "a3ef41749fa527ab78fc57f180bd82099cbab35a2fdbede5fbb11bedfb1f8cd557b0bdfcd7f42f5b0ffb83a83e65611b8e47182e63219800ccce5b3c9e6df2af872a1cb21492f8816f1aa5319e87f29738ad944b2034440a"}, 0x68) [ 286.264156][T14651] dlm: no locking on control device [ 286.265703][T14618] device nr0 entered promiscuous mode 15:18:53 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x30002, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000100)={0xb, @raw_data="36ea40edee8661c0bd41cb1d9ecc22a4c604244101a9eb71b8d4258848979856e5da158f0b658c5d0b938ad384c77cf7b6e4faab79e0eae9e319f14d4cac5e4cbfb066485e6455b5d4b87463bb2a1315653cba53ff3b492e6d23c89472b7c6b00ea46e119232c475848ec4a9b78894e64081e66cd46a5c7ace31e2a6f2ddeb88fa5fe6645ec58265eb8893eb8a2a41ce0d197a65b62d7a175b4dc8bd85a665b193a72d64908ad39bc66d39ecae99e8dd798b3ed01ed681c08f46c821eebf1b6f0d7f5e5d61a41e90"}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40085112, &(0x7f0000000000)={{0xfffffb94}, {0xfdfdffff}}) keyctl$session_to_parent(0x12) 15:18:53 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:53 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:53 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:53 executing program 4: getcwd(0x0, 0x969) 15:18:53 executing program 4: unshare(0x20400) openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x0, 0x0) 15:18:53 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:53 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:53 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:54 executing program 3: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffd}, 0x0, 0x8) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x12, 0x4, @tid=r0}, &(0x7f0000044000)) rt_sigprocmask(0x1, &(0x7f0000000140)={0x7}, &(0x7f0000000180), 0x8) rt_sigsuspend(&(0x7f0000000200)={0x6}, 0x8) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'nlmon0\x00', {0x2, 0x4e22, @loopback}}) rt_sigprocmask(0x2, &(0x7f0000000040), 0x0, 0x8) 15:18:54 executing program 4: syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0xdc6c, 0x40000) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x7f\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x52) 15:18:54 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:54 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:54 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/sctp\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, "898e15"}, 0x4, 0x1) syz_open_procfs(0x0, &(0x7f0000000180)='fd/3\x00') openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) 15:18:54 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:54 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:54 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:54 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) capset(&(0x7f0000000580)={0x19980330}, &(0x7f00000005c0)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x103200, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x4, {0x8001, 0x4, 0xffffffff, 0x1611}}) fcntl$getflags(r1, 0x409) fspick(0xffffffffffffffff, 0x0, 0x0) 15:18:54 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:54 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:55 executing program 3: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x5}, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00001dcf48)={0x2, 0x400000000000003, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfbffffff}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xffffffffffffff57}}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x801, 0x0) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) 15:18:55 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:55 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:55 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:55 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) capset(&(0x7f0000000580)={0x19980330}, &(0x7f00000005c0)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x103200, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x4, {0x8001, 0x4, 0xffffffff, 0x1611}}) fcntl$getflags(r1, 0x409) fspick(0xffffffffffffffff, 0x0, 0x0) 15:18:55 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:55 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:55 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:55 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) capset(&(0x7f0000000580)={0x19980330}, &(0x7f00000005c0)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x103200, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x4, {0x8001, 0x4, 0xffffffff, 0x1611}}) fcntl$getflags(r1, 0x409) fspick(0xffffffffffffffff, 0x0, 0x0) 15:18:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x20200) ioctl$TCSETX(r2, 0x5433, &(0x7f0000000040)={0x5, 0x4, [0x6aa, 0x5, 0x9, 0xffffffffffff0000, 0x8000], 0xff}) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000080)=0xfffffffffffffffe, &(0x7f00000000c0)=0x2) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000200)) 15:18:55 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:55 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) capset(&(0x7f0000000580)={0x19980330}, &(0x7f00000005c0)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x103200, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x4, {0x8001, 0x4, 0xffffffff, 0x1611}}) fcntl$getflags(r1, 0x409) fspick(0xffffffffffffffff, 0x0, 0x0) 15:18:55 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:55 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:18:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x20200) ioctl$TCSETX(r2, 0x5433, &(0x7f0000000040)={0x5, 0x4, [0x6aa, 0x5, 0x9, 0xffffffffffff0000, 0x8000], 0xff}) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000080)=0xfffffffffffffffe, &(0x7f00000000c0)=0x2) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000200)) 15:18:55 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:55 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) capset(&(0x7f0000000580)={0x19980330}, &(0x7f00000005c0)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x103200, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x4, {0x8001, 0x4, 0xffffffff, 0x1611}}) fcntl$getflags(r1, 0x409) 15:18:55 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:56 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x20200) ioctl$TCSETX(r2, 0x5433, &(0x7f0000000040)={0x5, 0x4, [0x6aa, 0x5, 0x9, 0xffffffffffff0000, 0x8000], 0xff}) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000080)=0xfffffffffffffffe, &(0x7f00000000c0)=0x2) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000200)) 15:18:56 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:56 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:56 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) capset(&(0x7f0000000580)={0x19980330}, &(0x7f00000005c0)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x103200, 0x0) fcntl$getflags(r1, 0x409) 15:18:56 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:56 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) capset(&(0x7f0000000580)={0x19980330}, &(0x7f00000005c0)) fcntl$getflags(0xffffffffffffffff, 0x409) 15:18:56 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:56 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:56 executing program 3: r0 = memfd_create(&(0x7f0000000180)='/dev/mea#\x00', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000653fee)='/dev/snd/midiC#D#\x00', 0x200, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7ff, 0x8000) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) write$FUSE_GETXATTR(r2, &(0x7f00000000c0)={0x18, 0x0, 0x6, {0x2be26628}}, 0x18) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0x40045730, 0x0) 15:18:56 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:56 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) capset(&(0x7f0000000580)={0x19980330}, &(0x7f00000005c0)) fcntl$getflags(0xffffffffffffffff, 0x409) 15:18:56 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:56 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:56 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x29}}}, [0x0, 0x2, 0x7, 0x3, 0x0, 0xfffffffffffffbff, 0x2, 0xb1e3, 0x1f, 0x1, 0x54b1, 0x3, 0x9, 0xffffffff, 0x8]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000140)={r1, @in={{0x2, 0x4e23, @broadcast}}, [0x8, 0x5, 0x2, 0x0, 0x1, 0xc3, 0x7fff, 0x0, 0x2, 0x800, 0x7fff, 0x7fffffff, 0x80, 0x3ff, 0x1f]}, &(0x7f0000000240)=0x100) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000280)={0xc025, 0x3}) ioctl(r0, 0x40184150, &(0x7f0000000340)) 15:18:57 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) capset(&(0x7f0000000580)={0x19980330}, &(0x7f00000005c0)) fcntl$getflags(0xffffffffffffffff, 0x409) 15:18:57 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:18:57 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:57 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x404000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x20000200000e, 0x13, r1, 0x0) semget$private(0x0, 0x2, 0x10) semget$private(0x0, 0x0, 0x120) r2 = semget$private(0x0, 0x3, 0x90) semctl$IPC_STAT(r2, 0x0, 0x3, &(0x7f0000004080)=""/4096) 15:18:57 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:18:57 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x103200, 0x0) fcntl$getflags(r1, 0x409) 15:18:57 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:57 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:57 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:57 executing program 3: r0 = socket(0x2, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000bd3000/0x4000)=nil, 0x4000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) shutdown(r0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)) poll(&(0x7f0000000000)=[{r0, 0xb1}, {r1, 0x200}], 0x152, 0xffff) 15:18:57 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x4000, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x103200, 0x0) fcntl$getflags(r0, 0x409) 15:18:57 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:57 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:57 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:58 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@mpls_getroute={0x24, 0x1a, 0xd, 0x0, 0x0, {}, [@RTA_DST={0x8}]}, 0x24}}, 0x0) 15:18:58 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x103200, 0x0) fcntl$getflags(r0, 0x409) 15:18:58 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:18:58 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:58 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:58 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x103200, 0x0) fcntl$getflags(r0, 0x409) 15:18:58 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) time(&(0x7f0000000000)) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0xa020, 0x1) r1 = semget(0x0, 0x7, 0x1) semtimedop(r1, &(0x7f0000000040)=[{0x7, 0xfe1}, {0x6, 0x8000, 0x1800}], 0x2, &(0x7f0000000080)={0x0, 0x1c9c380}) mlock2(&(0x7f0000ff2000/0xd000)=nil, 0xd000, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@mcast2, 0x0, 0x32}, 0x0, @in6=@loopback}}, 0xe8) r2 = socket$key(0xf, 0x3, 0x2) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2) dup2(r2, r0) 15:18:58 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:58 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:58 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:58 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x103200, 0x0) fcntl$getflags(r0, 0x409) 15:18:58 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0701000000000000ff00eb1579581d89ffedb9dc4100"], 0x20}}, 0x0) 15:18:58 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x103200, 0x0) fcntl$getflags(r0, 0x409) 15:18:58 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:58 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:58 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:59 executing program 3: r0 = socket$inet6(0xa, 0x1000000000005, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x82000, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video2\x00', 0x2, 0x0) fadvise64(r1, 0x0, 0x4, 0x3) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000100)={0x7dbe6365, 0x0, 0xe620, 0x1ff}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) bind$isdn_base(r2, &(0x7f0000000080)={0x22, 0x3f, 0x401, 0xff, 0x10000}, 0x6) getsockopt$inet_buf(r0, 0x84, 0x14, &(0x7f0000dcffe8)=""/24, &(0x7f0000000040)=0x4) 15:18:59 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:59 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:59 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(r0, 0x409) 15:18:59 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:59 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) [ 292.333672][T14950] sctp: [Deprecated]: syz-executor.3 (pid 14950) Use of int in max_burst socket option. [ 292.333672][T14950] Use struct sctp_assoc_value instead 15:18:59 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:18:59 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:18:59 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:18:59 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:18:59 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:18:59 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:00 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000580)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, r1, 0x600, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x3ff, 0x3]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000004}, 0x0) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f00000003c0)) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_DQBUF(r2, 0xc058565d, &(0x7f0000000080)={0x0, 0x5, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "f9356a3e"}, 0x0, 0x0, @fd, 0x4}) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400008}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x44, r1, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x4]}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x73cf, 0x8, 0x2, 0x9, 0x0]}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x4040040) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000400)={0x0, 0x2, 0x20, 0x6, 0x9}, &(0x7f0000000440)=0x18) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000480)={r3, 0x556}, &(0x7f00000004c0)=0x8) 15:19:00 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:00 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:00 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:00 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:00 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:00 executing program 3: r0 = socket(0x848000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2712, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0xd) 15:19:00 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:00 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:00 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:00 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:00 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:00 executing program 3: r0 = socket$inet6(0xa, 0x806, 0x20000000002635) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x177, 0x4) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000100)=0x5c, 0x4) sendto$inet6(r0, 0x0, 0xfffffd50, 0x0, &(0x7f000020d000)={0xa, 0x4e20, 0x0, @mcast2, 0x40}, 0x1c) recvmmsg(r0, &(0x7f0000001a80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=""/104, 0x68}}], 0x1, 0x2040, 0x0) 15:19:01 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:01 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:01 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:01 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:01 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net\x00') writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)="e26fa401def77da2", 0x8}], 0x1) 15:19:01 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:01 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:01 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:01 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:19:01 executing program 3: r0 = socket(0x20000000000000a, 0x2, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:file_context_t:s0\x00', 0x24, 0x2) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000140)=0x1000000000080006, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24, 0x0, @mcast1, 0x6}, 0x1c) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x900000, 0x200000) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f00000000c0)=0x1, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000180)={0xff, 0x0, {0x2, 0x3, 0x9, 0x3, 0xf0}}) getsockopt$sock_buf(r1, 0x1, 0x3f, 0x0, &(0x7f0000000300)) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 15:19:01 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:01 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:01 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:01 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:19:01 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:01 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:01 executing program 3: r0 = epoll_create1(0xfffffffffffffffe) r1 = epoll_create1(0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(0x0, 0x0, &(0x7f0000000040)="bb1be69200", 0x5, r2) close(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x40002014}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 15:19:02 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:02 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:02 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:02 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:02 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:02 executing program 3: capset(&(0x7f0000001140)={0x19980333}, &(0x7f00009b3000)={0x0, 0x0, 0x0, 0x0, 0x5}) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x14080, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x5}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r1, 0x0, 0x4}, 0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r2, 0x89f2, &(0x7f0000000000)={'ip6_vti0\x00', @ifru_ivalue}) 15:19:02 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:02 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:02 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:02 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:02 executing program 3: unshare(0x40400) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ppoll(&(0x7f0000000200)=[{r0}], 0x1, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f00000001c0), 0x8) recvmmsg(0xffffffffffffff9c, &(0x7f0000001680)=[{{&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000001280)=[{&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000000100)=""/23, 0x17}, {&(0x7f0000000180)=""/27, 0x1b}, {&(0x7f0000001240)=""/53, 0x35}], 0x5}, 0xffff}, {{&(0x7f0000001300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001480)=[{&(0x7f0000001380)=""/82, 0x52}, {&(0x7f0000001400)=""/107, 0x6b}], 0x2}, 0x5}, {{&(0x7f00000014c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000001540)=""/39, 0x27}, {&(0x7f0000001580)=""/29, 0x1d}], 0x2, &(0x7f0000001600)=""/104, 0x68}, 0x6}], 0x3, 0x2000, &(0x7f0000001740)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000001780)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000017c0)={r2}) 15:19:02 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:02 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:02 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:02 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:02 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:03 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={0x0, 0x0, &(0x7f0000058000)={&(0x7f000023f000)=ANY=[@ANYBLOB="840008000000000000bd7000ffffffff0000fffc0c00000000000000000000005b659a62290ffc380c2dbfdc5e9f13e1a04810d464fbc3f4c1b4e2bf501fb1bb949869c2984d914d9f04005e4fcd4dd3050bc1700612dbc3080c91745fa158cf0d70309f7f1969136edfd73294c0356675ffff000044f2a432a15b4ce56aa166b5040d"], 0x83}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040), 0x137) 15:19:03 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:03 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:19:03 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:03 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000000380)=@hci, 0x80) sendmsg$can_bcm(r1, &(0x7f0000000180)={&(0x7f0000000080), 0x10, &(0x7f0000000140)={&(0x7f0000000400)={0x1, 0xfffffffffffffffe, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "784e8b4be98e9414118b6ad150f5070da6ed65d4ce819c8df3f909d13642273a15fcd979b0630f1f4fc361b02dd35fb36a2c22591e499b52eecd65030195393e"}}, 0x80}}, 0x0) 15:19:03 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:03 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:03 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:03 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:03 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:03 executing program 3: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000002c0)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r1, r0, r0}, &(0x7f0000000100)=""/18, 0x12, &(0x7f00000001c0)={&(0x7f0000000080)={'poly1305-generic\x00'}, &(0x7f0000000180)}) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r2) 15:19:03 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:03 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:03 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:03 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:03 executing program 3: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000002c0)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r1, r0, r0}, &(0x7f0000000100)=""/18, 0x12, &(0x7f00000001c0)={&(0x7f0000000080)={'poly1305-generic\x00'}, &(0x7f0000000180)}) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r2) 15:19:04 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:04 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:04 executing program 3: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000002c0)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r1, r0, r0}, &(0x7f0000000100)=""/18, 0x12, &(0x7f00000001c0)={&(0x7f0000000080)={'poly1305-generic\x00'}, &(0x7f0000000180)}) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r2) 15:19:04 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:04 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:04 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:04 executing program 5: r0 = geteuid() setfsuid(r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20000, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xc63, 0x440140) sendmsg$nl_generic(r1, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f00000000c0)={0x330, 0x31, 0x800, 0x70bd2c, 0x25dfdbfe, {0x5}, [@nested={0xc0, 0x2e, [@generic="38b0013f8927672395394505423904b22e5ff61af03227369a946cf268be7babbcc9a9191672f5ef13e089f413733bc72f45fdcfa32d6541cf733634273c46240510977050933d0ee5", @generic="0bd7ebf30f8b4ea16593205cc5355ad885dd1044d69d9cfb4896350dd211fff01e5203e742579135029b7ba2dd665344d5962329be39c6e0fb000720e759c6fbfedbbbe7fc12671e5b9a5fc8331d01220ed828729869db04d2fd4e77e579e03df6e85fbc63141f344a31badde1f3158c"]}, @generic="b12931b2369c59f20dc2c981c06018544f9019b396c2681880129a2ad2860423071b0fec92719f4f5bb0fdbff281da1a201e745a3231b918a8bde8b65b0bc65c80786ff3268a4d7dd44747fbbddb60eb8f876877755aa7e43b2fbed8402cf3d28c834aba955b80001598dd05a4e1236e665e6accdc9839d4ab5508ced06ad7ed49e954f9824990339e2cb8d9d90a9f849578856cb67e4d7d56fcae85746aa48a47fada8c999906b0602a0d20e83264e1d54ae96d65e5c3aa17913e36ff5c4a5cbf65838cd6186d140efa4db187bbbd47340e7337d7264ba1181fde", @nested={0x180, 0x52, [@generic="79623568ff85eb378689603c9bc353401a9bc4827ddb0f14ec929e", @generic="52560899512b04b5db776993422e8245282627c6aa8c9b7dfb719e139dd3ec44fdd8fbff2fbbc8eec4cbf1c228fd4ebd20a5461709e145b8bdc3cc3ece9a65ef8560fd9f3af70f12fcdfa53b226140c89e690505aa716254720b40ea3dc919258855eb902d5fcb4c3d432bda35adbf5d7b0bc87c1147d75eb610fee2531ab975921352be5016c24e205b40d6184b10c689596ca778722573a11f", @generic="4579c4f6dde570138f41b3c8ae6e56b9a7f0f47cccc13d4bf5970088a7ae109d9ef40384d8dbb2bef71b32497398128b0562532f037daee3823081d9c401e14c44a6e3876a645a862ee84fc9292810550149504f193bd5286ac2d70ac848cb5ffed9970bea76286dd6816dfa6217d4d5f5ee989deed2aa76b87f498b719a92517cf56240292d48ae0453977cd72c8510af3a0ba09838c4334cbdebfc9df3645b91d8538f1df3bdfd82c183aea62288a2e2ba9a3ab71bdb802d0c9c01fc", @typed={0x8, 0x52, @fd=r2}]}]}, 0x330}, 0x1, 0x0, 0x0, 0x10}, 0x4000801) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000480)={0x2, 0xfffffffffffffff8, 0x86}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000640)={'broute\x00', 0x0, 0x4, 0xef, [], 0x8, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000540)=""/239}, &(0x7f00000006c0)=0x78) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000700)) write$UHID_CREATE2(r2, &(0x7f0000000740)={0xb, 'syz0\x00', 'syz1\x00', 'syz1\x00', 0x1000, 0x7f, 0x3, 0x93d9, 0x8000, 0xa791, "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"}, 0x1118) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000001880)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000001940)={'nat\x00', 0x0, 0x4, 0x37, [], 0x1, &(0x7f00000018c0)=[{}], &(0x7f0000001900)=""/55}, &(0x7f00000019c0)=0x78) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000001a00)=""/191) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000001ac0)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000001b00)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x17}}}, 0x1, 0x4, 0x3, 0x9, 0xd}, &(0x7f0000001bc0)=0x98) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000001c00)={r3, 0xfafd}, &(0x7f0000001c40)=0x8) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000001c80)) ioctl$KDDELIO(r1, 0x4b35, 0x400000004000000) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000001cc0)={0x0, 0x0, 0x2, 0xd38a}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000001d00)={0x10000, r4, 0x10001, 0x3}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000001d40)={0x5d, r4}) lstat(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@loopback, @in=@empty}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000001f40)=0xe8) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000001f80)={0x8, 0x0, 'client1\x00', 0x4, "a7dfca08c4b390ba", "9ac3946fdc09bd4bb12e616684669b4c2c55b6484cb250eeaa1ced3a7a0e68b9", 0x0, 0x7}) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000002080)='nbd\x00') sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000002140)={&(0x7f0000002040), 0xc, &(0x7f0000002100)={&(0x7f00000020c0)={0x14, r5, 0x400, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x2000c040) lsetxattr$security_capability(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='security.capability\x00', &(0x7f0000002200)=@v3={0x3000000, [{0x6eb, 0xce}, {0x0, 0x40}], r0}, 0x18, 0x2) write$FUSE_DIRENT(r2, &(0x7f0000002240)={0x80, 0x0, 0x4, [{0x3, 0xb58c, 0xa, 0x0, '/dev/full\x00'}, {0x2, 0xfffffffe, 0x6, 0x1, ':^*em0'}, {0x4, 0x200, 0xa, 0x80000000, '/dev/full\x00'}]}, 0x80) ioctl$BLKFRASET(r1, 0x1264, &(0x7f00000022c0)=0x40) io_setup(0x2, &(0x7f0000002300)) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000002340)={0x400, r4, 0x10000, 0x404c}) 15:19:04 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:04 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:04 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:04 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:04 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0x108, 0x209e20, 0x1, 0x40}, 0x3c) 15:19:04 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:04 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:04 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:04 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:05 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f00000000c0)='ppp0nodev!%:$selinux\x00', 0xfffffffffffffffd) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) 15:19:05 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') [ 298.305015][T15237] IPVS: ftp: loaded support on port[0] = 21 [ 298.414499][T15237] chnl_net:caif_netlink_parms(): no params data found [ 298.459192][T15237] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.466491][T15237] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.475477][T15237] device bridge_slave_0 entered promiscuous mode [ 298.485401][T15237] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.492880][T15237] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.501358][T15237] device bridge_slave_1 entered promiscuous mode [ 298.528203][T15237] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 298.539715][T15237] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 298.566718][T15237] team0: Port device team_slave_0 added [ 298.575912][T15237] team0: Port device team_slave_1 added [ 298.636709][T15237] device hsr_slave_0 entered promiscuous mode [ 298.673382][T15237] device hsr_slave_1 entered promiscuous mode [ 298.730120][T15237] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.737422][T15237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.745444][T15237] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.752781][T15237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.824443][T15237] 8021q: adding VLAN 0 to HW filter on device bond0 [ 298.842247][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 298.854563][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.864554][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.875980][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 298.894276][T15237] 8021q: adding VLAN 0 to HW filter on device team0 [ 298.916214][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.925238][ T2863] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.932545][ T2863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.940766][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 298.949829][ T2863] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.956983][ T2863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.987008][ T2863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 299.007931][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 299.018611][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 299.036643][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 299.054216][T15237] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 299.067039][T15237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 299.077064][ T3805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 299.110567][T15237] 8021q: adding VLAN 0 to HW filter on device batadv0 15:19:06 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') 15:19:06 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:06 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:06 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:06 executing program 3: futex(0x0, 0x8c, 0x0, 0x0, &(0x7f00000000c0), 0x0) 15:19:06 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:06 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:06 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:06 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000000)={@remote, @link_local, [], {@arp={0x8100, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @broadcast, "", @broadcast, "eb2acc4fbc75ba9ba734fb18ab398b1f"}}}}, 0x0) 15:19:06 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0x108, 0x0, 0x1, 0x40}, 0x3c) 15:19:06 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:06 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:06 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f00000000c0)='ppp0nodev!%:$selinux\x00', 0xfffffffffffffffd) 15:19:06 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:06 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:07 executing program 3: 15:19:07 executing program 5: 15:19:07 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:07 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:07 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:07 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:07 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:19:07 executing program 5: 15:19:07 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000080ffffff"], &(0x7f0000000040)='syzkaller\x00', 0x1f, 0x89, &(0x7f0000000080)=""/137, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 15:19:07 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:07 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:07 executing program 5: futex(0x0, 0x8c, 0x0, 0x0, &(0x7f00000000c0), 0x0) futex(&(0x7f000000cffc), 0x8c, 0x0, 0x0, 0x0, 0x0) 15:19:07 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:07 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:07 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:07 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000000)={@remote, @link_local, [], {@arp={0x6558, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @broadcast, "", @broadcast, "eb2acc4fbc75ba9ba734fb18ab398b1f"}}}}, 0x0) 15:19:07 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:08 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:08 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:08 executing program 5: 15:19:08 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:19:08 executing program 3: 15:19:08 executing program 5: 15:19:08 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:08 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:08 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:08 executing program 3: 15:19:08 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:08 executing program 5: 15:19:08 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:08 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:08 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:08 executing program 3: 15:19:08 executing program 5: syz_emit_ethernet(0x32, &(0x7f00000002c0)={@local, @link_local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x2c}, @initdev, {[@lsrr={0x83, 0x3, 0x9680}, @rr={0x7, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @local}}}}}, 0x0) 15:19:08 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:19:08 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:08 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:08 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:19:09 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, 0x0) 15:19:09 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:09 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:09 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:09 executing program 3: bpf$PROG_LOAD(0x14, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffd54}, 0x70) 15:19:09 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:09 executing program 5: 15:19:09 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:09 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:09 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:09 executing program 5: 15:19:09 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:09 executing program 3: execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) 15:19:09 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:09 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:09 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:09 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:10 executing program 5: pipe2(&(0x7f0000000000), 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 15:19:10 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:10 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:10 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:10 executing program 3: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mlock(&(0x7f0000435000/0x2000)=nil, 0x2000) 15:19:10 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:10 executing program 5: syz_emit_ethernet(0xd, &(0x7f00000002c0)={@local, @link_local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x2c}, @initdev, {[@lsrr={0x83, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @local}}}}}, 0x0) 15:19:10 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:10 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:10 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:10 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000002c0)=@add_del={0x2, 0x0}) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000180)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f00000002c0)) 15:19:10 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:10 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:10 executing program 5: syz_emit_ethernet(0x26, &(0x7f00000002c0)={@local, @link_local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x2c}, @initdev, {[@lsrr={0x83, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @local}}}}}, 0x0) 15:19:10 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:10 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:10 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:10 executing program 3: set_mempolicy(0xfffffffffffffffc, 0x0, 0x0) 15:19:11 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:11 executing program 5: syz_emit_ethernet(0x2e, &(0x7f00000002c0)={@local, @link_local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x2c}, @initdev, {[@lsrr={0x83, 0x3, 0x9680}]}}, @igmp={0x0, 0x0, 0x0, @local}}}}}, 0x0) 15:19:11 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:11 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:11 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:11 executing program 3: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:19:11 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:11 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:11 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:11 executing program 5: socket$inet(0x2, 0x2, 0x4) 15:19:11 executing program 3: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/109) 15:19:11 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:11 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:11 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:11 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:11 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:11 executing program 3: syz_emit_ethernet(0x2e, &(0x7f00000002c0)={@local, @link_local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x2c}, @initdev, {[@lsrr={0x83, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @local}}}}}, 0x0) 15:19:12 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:12 executing program 5: 15:19:12 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:12 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:12 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:12 executing program 3: 15:19:12 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:12 executing program 5: 15:19:12 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:12 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:12 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:12 executing program 3: 15:19:12 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:12 executing program 3: 15:19:12 executing program 5: 15:19:12 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:12 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:12 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:12 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:13 executing program 5: 15:19:13 executing program 3: 15:19:13 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:13 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:13 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:13 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:13 executing program 5: 15:19:13 executing program 3: 15:19:13 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:13 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:13 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:13 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:13 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:13 executing program 5: 15:19:13 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:13 executing program 3: 15:19:13 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:13 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:13 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:13 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40, 0x0) 15:19:13 executing program 5: rt_sigaction(0x17, 0x0, &(0x7f0000000240)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f0000000280)) 15:19:14 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:14 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:14 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:14 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:14 executing program 3: 15:19:14 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:19:14 executing program 5: 15:19:14 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:14 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:14 executing program 5: 15:19:14 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:14 executing program 3: 15:19:14 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:19:14 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:14 executing program 5: 15:19:14 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:14 executing program 3: 15:19:14 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:14 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:15 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:15 executing program 5: 15:19:15 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:15 executing program 3: 15:19:15 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:15 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:15 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:15 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x1000000, 0x0) 15:19:15 executing program 5: syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x6081) 15:19:15 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:15 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:15 executing program 5: 15:19:15 executing program 3: 15:19:15 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:15 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:15 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:15 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:15 executing program 3: 15:19:15 executing program 5: 15:19:16 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:16 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:16 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:16 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:16 executing program 3: 15:19:16 executing program 5: 15:19:16 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:16 executing program 3: socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) 15:19:16 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:16 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000002200)='/dev/vga_arbiter\x00', 0x4000, 0x0) 15:19:16 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:16 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:16 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) [ 309.613195][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 309.619691][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:19:16 executing program 5: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x79, 0x1a, 0x78, 0x8, 0xb95, 0x772a, 0x55cd, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x77, 0x0, 0x0, 0x77, 0x2d, 0x35}}]}}]}}, 0x0) syz_usb_control_io(r0, &(0x7f0000000900)={0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000c40)={0x54, &(0x7f0000000940), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, &(0x7f00000003c0)={0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000700)={0x54, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, &(0x7f0000000800)={0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000001140)={0x3c, &(0x7f0000000000)=ANY=[@ANYBLOB="80000800000042"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 15:19:16 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c4601030001000000000000000002003f0001000080ed020000000000004000000000000000a002000000000000ff0f0000ffff3800010004000009070051e57474040000000500000000000000070000000000000008000000000000000000000000000000d20e000000000000080000000000000000000000ff010000980f000000000000dc06000000000000010100000000000005000000000000001dbc0000000000000900000000000000f7d6dc6ac297d5e21328653593ad144fe66d17a2ca01c979dbad82d5339706bbbe32d79a3dad172378cf8a72eedba98b328d244bc10208716b07daa2701e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b318248a380fd29dc998d8f8b362000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"/1020], 0x3ee) 15:19:16 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:16 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:16 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) 15:19:17 executing program 3: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xdb, 0x2, 0x1c, 0x40, 0x499, 0x150c, 0x7e47, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x2, 0x0, 0x0, 0x9e, 0x43, 0x49}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 15:19:17 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:17 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) 15:19:17 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, r0) close(r1) symlinkat(&(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 15:19:17 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'mangle\x00', 0xeb, "9de08d42411617d27f4057d04ce68221e2f8004d787ed9924812886f568ce4fc117a5281f52fad7a767a9b43bfc7ca4c37a6bf396825783f3009ba9454ef1789f4925e8a4b4fad66c0d4e31723500ada8bdb3218b6dffea2f5c8b1c45a07307f18f51d0604d3fa757648d66248e9a59eaf89c447725958349e5661b96238075eb265fabc6809d3ddb11f29bae7ebdd24c27437144c28ef24cf31067a1029bc7fd03531f8510577bccfdf1fcb8b90b085372c7a3da4277a267304513e3531a96c7dd380d55c6c6d7fc6a958dcf1823ccbe0cfb4a5bc9a0a21774035008c4c47118c59e4057d487d8f36b855"}, &(0x7f0000000080)=0x10f) [ 310.196191][ T3805] usb 6-1: new high-speed USB device number 2 using dummy_hcd 15:19:17 executing program 2: socket$inet6_dccp(0xa, 0x6, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/1020], 0x3ee) 15:19:17 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x409) [ 310.432977][ T12] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 310.444386][ T3805] usb 6-1: Using ep0 maxpacket: 8 [ 310.574906][ T3805] usb 6-1: config 0 has an invalid interface number: 119 but max is 0 [ 310.583561][ T3805] usb 6-1: config 0 has no interface number 0 [ 310.589995][ T3805] usb 6-1: New USB device found, idVendor=0b95, idProduct=772a, bcdDevice=55.cd [ 310.599699][ T3805] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 310.609694][ T3805] usb 6-1: config 0 descriptor?? [ 310.792827][ T12] usb 4-1: config 0 has an invalid interface number: 2 but max is 0 [ 310.800956][ T12] usb 4-1: config 0 has no interface number 0 [ 310.807547][ T12] usb 4-1: New USB device found, idVendor=0499, idProduct=150c, bcdDevice=7e.47 [ 310.817407][ T12] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 310.827586][ T12] usb 4-1: config 0 descriptor?? [ 310.896395][ T3805] ================================================================== [ 310.904574][ T3805] BUG: KMSAN: uninit-value in ax88772_bind+0x93d/0x11e0 [ 310.911542][ T3805] CPU: 1 PID: 3805 Comm: kworker/1:2 Not tainted 5.2.0+ #14 [ 310.918888][ T3805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.928983][ T3805] Workqueue: usb_hub_wq hub_event [ 310.934102][ T3805] Call Trace: [ 310.937467][ T3805] dump_stack+0x191/0x1f0 [ 310.941813][ T3805] kmsan_report+0x162/0x2d0 [ 310.946370][ T3805] __msan_warning+0x75/0xe0 [ 310.950920][ T3805] ax88772_bind+0x93d/0x11e0 [ 310.955556][ T3805] ? ax88178_change_mtu+0x650/0x650 [ 310.960761][ T3805] usbnet_probe+0x10d3/0x3950 [ 310.965477][ T3805] ? kmsan_internal_memset_shadow+0x104/0x3a0 [ 310.971570][ T3805] ? usbnet_disconnect+0x660/0x660 [ 310.976796][ T3805] usb_probe_interface+0xd19/0x1310 [ 310.982040][ T3805] ? usb_register_driver+0x7d0/0x7d0 [ 310.987356][ T3805] really_probe+0x1344/0x1d90 [ 310.992103][ T3805] driver_probe_device+0x1ba/0x510 [ 310.997237][ T3805] ? kmsan_get_shadow_origin_ptr+0x71/0x470 [ 311.003168][ T3805] __device_attach_driver+0x5b8/0x790 [ 311.008603][ T3805] bus_for_each_drv+0x28e/0x3b0 [ 311.013502][ T3805] ? deferred_probe_work_func+0x400/0x400 [ 311.019270][ T3805] __device_attach+0x489/0x750 [ 311.024080][ T3805] device_initial_probe+0x4a/0x60 [ 311.029211][ T3805] bus_probe_device+0x131/0x390 [ 311.034110][ T3805] device_add+0x25b5/0x2df0 [ 311.038653][ T3805] usb_set_configuration+0x309f/0x3710 [ 311.044199][ T3805] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 311.050320][ T3805] generic_probe+0xe7/0x280 [ 311.054828][ T3805] ? usb_choose_configuration+0xae0/0xae0 [ 311.060640][ T3805] usb_probe_device+0x146/0x200 [ 311.065520][ T3805] ? usb_register_device_driver+0x470/0x470 [ 311.072419][ T3805] really_probe+0x1344/0x1d90 [ 311.077152][ T3805] driver_probe_device+0x1ba/0x510 [ 311.082296][ T3805] ? kmsan_get_shadow_origin_ptr+0x71/0x470 [ 311.088330][ T3805] __device_attach_driver+0x5b8/0x790 [ 311.093761][ T3805] bus_for_each_drv+0x28e/0x3b0 [ 311.098641][ T3805] ? deferred_probe_work_func+0x400/0x400 [ 311.104411][ T3805] __device_attach+0x489/0x750 [ 311.109230][ T3805] device_initial_probe+0x4a/0x60 [ 311.114297][ T3805] bus_probe_device+0x131/0x390 [ 311.119197][ T3805] device_add+0x25b5/0x2df0 [ 311.123781][ T3805] usb_new_device+0x23e5/0x2fb0 [ 311.129062][ T3805] hub_event+0x5853/0x7320 [ 311.133629][ T3805] ? kmsan_get_shadow_origin_ptr+0x71/0x470 [ 311.139560][ T3805] ? led_work+0x720/0x720 [ 311.143940][ T3805] ? led_work+0x720/0x720 [ 311.148304][ T3805] process_one_work+0x1572/0x1f00 [ 311.153422][ T3805] worker_thread+0x111b/0x2460 [ 311.158296][ T3805] kthread+0x4b5/0x4f0 [ 311.162405][ T3805] ? process_one_work+0x1f00/0x1f00 [ 311.167663][ T3805] ? kthread_blkcg+0xf0/0xf0 [ 311.172353][ T3805] ret_from_fork+0x35/0x40 [ 311.176812][ T3805] [ 311.179159][ T3805] Local variable description: ----buf@ax88772_bind [ 311.185670][ T3805] Variable was created at: [ 311.190149][ T3805] ax88772_bind+0x5f/0x11e0 [ 311.194869][ T3805] usbnet_probe+0x10d3/0x3950 [ 311.199560][ T3805] ================================================================== [ 311.207610][ T3805] Disabling lock debugging due to kernel taint [ 311.214158][ T3805] Kernel panic - not syncing: panic_on_warn set ... [ 311.220934][ T3805] CPU: 1 PID: 3805 Comm: kworker/1:2 Tainted: G B 5.2.0+ #14 [ 311.229602][ T3805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.239785][ T3805] Workqueue: usb_hub_wq hub_event [ 311.244923][ T3805] Call Trace: [ 311.248240][ T3805] dump_stack+0x191/0x1f0 [ 311.252578][ T3805] panic+0x3c9/0xc1e [ 311.256508][ T3805] kmsan_report+0x2ca/0x2d0 [ 311.261025][ T3805] __msan_warning+0x75/0xe0 [ 311.265556][ T3805] ax88772_bind+0x93d/0x11e0 [ 311.270160][ T3805] ? ax88178_change_mtu+0x650/0x650 [ 311.275582][ T3805] usbnet_probe+0x10d3/0x3950 [ 311.280740][ T3805] ? kmsan_internal_memset_shadow+0x104/0x3a0 [ 311.288715][ T3805] ? usbnet_disconnect+0x660/0x660 [ 311.293881][ T3805] usb_probe_interface+0xd19/0x1310 [ 311.294262][T15828] usb-fuzzer-gadget dummy_udc.3: unregistering UDC driver [USB fuzzer] [ 311.302457][ T3805] ? usb_register_driver+0x7d0/0x7d0 [ 311.302483][ T3805] really_probe+0x1344/0x1d90 [ 311.302524][ T3805] driver_probe_device+0x1ba/0x510 [ 311.302551][ T3805] ? kmsan_get_shadow_origin_ptr+0x71/0x470 [ 311.302581][ T3805] __device_attach_driver+0x5b8/0x790 [ 311.302624][ T3805] bus_for_each_drv+0x28e/0x3b0 [ 311.302645][ T3805] ? deferred_probe_work_func+0x400/0x400 [ 311.302700][ T3805] __device_attach+0x489/0x750 [ 311.311513][T15828] dummy_hcd dummy_hcd.3: port status 0x00010100 has changes [ 311.316457][ T3805] device_initial_probe+0x4a/0x60 [ 311.326413][ T12] dummy_hcd dummy_hcd.3: port status 0x00010100 has changes [ 311.332173][ T3805] bus_probe_device+0x131/0x390 [ 311.342541][ T12] usb 4-1: USB disconnect, device number 2 [ 311.348239][ T3805] device_add+0x25b5/0x2df0 [ 311.348318][ T3805] usb_set_configuration+0x309f/0x3710 [ 311.393357][ T3805] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 311.399452][ T3805] generic_probe+0xe7/0x280 [ 311.403962][ T3805] ? usb_choose_configuration+0xae0/0xae0 [ 311.409718][ T3805] usb_probe_device+0x146/0x200 [ 311.414593][ T3805] ? usb_register_device_driver+0x470/0x470 [ 311.420494][ T3805] really_probe+0x1344/0x1d90 [ 311.425190][ T3805] driver_probe_device+0x1ba/0x510 [ 311.430332][ T3805] ? kmsan_get_shadow_origin_ptr+0x71/0x470 [ 311.436240][ T3805] __device_attach_driver+0x5b8/0x790 [ 311.441645][ T3805] bus_for_each_drv+0x28e/0x3b0 [ 311.446518][ T3805] ? deferred_probe_work_func+0x400/0x400 [ 311.452446][ T3805] __device_attach+0x489/0x750 [ 311.457243][ T3805] device_initial_probe+0x4a/0x60 [ 311.462294][ T3805] bus_probe_device+0x131/0x390 [ 311.467173][ T3805] device_add+0x25b5/0x2df0 [ 311.471742][ T3805] usb_new_device+0x23e5/0x2fb0 [ 311.476734][ T3805] hub_event+0x5853/0x7320 [ 311.481237][ T3805] ? kmsan_get_shadow_origin_ptr+0x71/0x470 [ 311.487130][ T3805] ? led_work+0x720/0x720 [ 311.491559][ T3805] ? led_work+0x720/0x720 [ 311.495913][ T3805] process_one_work+0x1572/0x1f00 [ 311.500959][ T3805] worker_thread+0x111b/0x2460 [ 311.505906][ T3805] kthread+0x4b5/0x4f0 [ 311.510186][ T3805] ? process_one_work+0x1f00/0x1f00 [ 311.515479][ T3805] ? kthread_blkcg+0xf0/0xf0 [ 311.520069][ T3805] ret_from_fork+0x35/0x40 [ 311.525155][ T3805] Kernel Offset: disabled [ 311.529512][ T3805] Rebooting in 86400 seconds..