[ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Started Getty on tty2. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.101' (ECDSA) to the list of known hosts. 2020/05/24 07:25:17 fuzzer started 2020/05/24 07:25:18 dialing manager at 10.128.0.26:34283 2020/05/24 07:25:18 syscalls: 3055 2020/05/24 07:25:18 code coverage: enabled 2020/05/24 07:25:18 comparison tracing: enabled 2020/05/24 07:25:18 extra coverage: enabled 2020/05/24 07:25:18 setuid sandbox: enabled 2020/05/24 07:25:18 namespace sandbox: enabled 2020/05/24 07:25:18 Android sandbox: /sys/fs/selinux/policy does not exist 2020/05/24 07:25:18 fault injection: enabled 2020/05/24 07:25:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/24 07:25:18 net packet injection: enabled 2020/05/24 07:25:18 net device setup: enabled 2020/05/24 07:25:18 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/05/24 07:25:18 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/24 07:25:18 USB emulation: enabled 07:27:03 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x112486e, &(0x7f0000000080)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=0x0, @ANYRESDEC]) syzkaller login: [ 164.937760][ T6807] IPVS: ftp: loaded support on port[0] = 21 07:27:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x10001, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 165.124904][ T6807] chnl_net:caif_netlink_parms(): no params data found [ 165.253803][ T6921] IPVS: ftp: loaded support on port[0] = 21 [ 165.271414][ T6807] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.279941][ T6807] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.300329][ T6807] device bridge_slave_0 entered promiscuous mode [ 165.313327][ T6807] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.321681][ T6807] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.331217][ T6807] device bridge_slave_1 entered promiscuous mode 07:27:04 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) getsockname$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000280)=0x1c) [ 165.368142][ T6807] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 165.387146][ T6807] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 165.434095][ T6807] team0: Port device team_slave_0 added [ 165.451977][ T6807] team0: Port device team_slave_1 added [ 165.530151][ T6807] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 165.537142][ T6807] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.565632][ T6807] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 165.592834][ T6807] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 165.600088][ T6807] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.629518][ T6807] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 165.719716][ T6921] chnl_net:caif_netlink_parms(): no params data found 07:27:04 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000001c80)=[{&(0x7f00000016c0)="7507747dd9bcc24bc9201e9ab3851c2352e456a59990f36599f89b848cf73dba62e0ee4d214b4ea417ba047283d923aa85916b00b017843fb4dd334d8bf4ab10c73e81992e6fd44138b794415b5cc26106b7db3a6b8796ce064e031f8f35e3f749cb730bb38dcfb2cf9155bf417d427a6ea7c2284e317a8773", 0x79}, {&(0x7f0000001780)="a45d4e26c6fadcbd663ccd6c0aca006b802c18d131b5427b3d4515dee8f10570a5923f3f543435278f94c3f8f0d4c35488ecfb1bd630b2e1e0e4247bb44938f03d603b27e44942ddcd3f11f086e6bf39ab074b690284b6d6", 0x58}], 0x2) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) [ 165.804763][ T7060] IPVS: ftp: loaded support on port[0] = 21 [ 165.885128][ T6807] device hsr_slave_0 entered promiscuous mode [ 165.969325][ T6807] device hsr_slave_1 entered promiscuous mode 07:27:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='mountinfo\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x20000000000000d8) [ 166.048097][ T7084] IPVS: ftp: loaded support on port[0] = 21 [ 166.245758][ T6921] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.253471][ T6921] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.264575][ T6921] device bridge_slave_0 entered promiscuous mode [ 166.320340][ T6921] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.327507][ T6921] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.351729][ T6921] device bridge_slave_1 entered promiscuous mode 07:27:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 166.462589][ T6921] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 166.508470][ T7178] IPVS: ftp: loaded support on port[0] = 21 [ 166.572784][ T6921] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 166.708427][ T7084] chnl_net:caif_netlink_parms(): no params data found [ 166.722057][ T6921] team0: Port device team_slave_0 added [ 166.766795][ T6921] team0: Port device team_slave_1 added [ 166.797640][ T6921] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 166.804644][ T6921] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 166.831403][ T6921] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 166.871350][ T6921] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 166.878305][ T6921] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 166.900925][ T7288] IPVS: ftp: loaded support on port[0] = 21 [ 166.906079][ T6921] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 166.922700][ T6807] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 166.984198][ T6807] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 167.041352][ T7060] chnl_net:caif_netlink_parms(): no params data found [ 167.069022][ T6807] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 167.117180][ T6807] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 167.192771][ T7084] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.200348][ T7084] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.208081][ T7084] device bridge_slave_0 entered promiscuous mode [ 167.248771][ T7084] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.256092][ T7084] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.264881][ T7084] device bridge_slave_1 entered promiscuous mode [ 167.352978][ T6921] device hsr_slave_0 entered promiscuous mode [ 167.399408][ T6921] device hsr_slave_1 entered promiscuous mode [ 167.449093][ T6921] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 167.456872][ T6921] Cannot create hsr debugfs directory [ 167.518522][ T7084] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 167.562513][ T7084] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 167.608698][ T7060] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.617098][ T7060] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.626399][ T7060] device bridge_slave_0 entered promiscuous mode [ 167.636924][ T7060] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.644602][ T7060] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.652839][ T7060] device bridge_slave_1 entered promiscuous mode [ 167.718762][ T7178] chnl_net:caif_netlink_parms(): no params data found [ 167.736141][ T7084] team0: Port device team_slave_0 added [ 167.776926][ T7084] team0: Port device team_slave_1 added [ 167.807736][ T7060] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 167.885493][ T7060] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 167.918363][ T7084] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 167.927292][ T7084] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 167.953938][ T7084] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 167.971314][ T7288] chnl_net:caif_netlink_parms(): no params data found [ 168.013899][ T7084] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 168.021302][ T7084] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 168.048391][ T7084] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 168.113363][ T7060] team0: Port device team_slave_0 added [ 168.121867][ T7060] team0: Port device team_slave_1 added [ 168.163588][ T7084] device hsr_slave_0 entered promiscuous mode [ 168.209348][ T7084] device hsr_slave_1 entered promiscuous mode [ 168.249984][ T7084] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 168.257564][ T7084] Cannot create hsr debugfs directory [ 168.337357][ T7060] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 168.347499][ T7060] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 168.374429][ T7060] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 168.437517][ T7060] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 168.444691][ T7060] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 168.472766][ T7060] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 168.493588][ T7178] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.505709][ T7178] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.514359][ T7178] device bridge_slave_0 entered promiscuous mode [ 168.523741][ T6921] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 168.578710][ T7288] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.586413][ T7288] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.595080][ T7288] device bridge_slave_0 entered promiscuous mode [ 168.606880][ T7178] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.614912][ T7178] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.624281][ T7178] device bridge_slave_1 entered promiscuous mode [ 168.631873][ T6921] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 168.673856][ T6921] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 168.772632][ T7060] device hsr_slave_0 entered promiscuous mode [ 168.830956][ T7060] device hsr_slave_1 entered promiscuous mode [ 168.879031][ T7060] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 168.886627][ T7060] Cannot create hsr debugfs directory [ 168.894718][ T7288] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.902741][ T7288] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.911501][ T7288] device bridge_slave_1 entered promiscuous mode [ 168.929694][ T6921] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 169.046558][ T7178] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 169.074561][ T7288] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 169.090693][ T7178] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 169.110214][ T7288] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 169.208591][ T7178] team0: Port device team_slave_0 added [ 169.216683][ T7288] team0: Port device team_slave_0 added [ 169.226567][ T7288] team0: Port device team_slave_1 added [ 169.249611][ T7178] team0: Port device team_slave_1 added [ 169.257600][ T6807] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.295131][ T7084] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 169.398198][ T7084] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 169.452957][ T7288] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 169.463274][ T7288] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 169.489660][ T7288] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 169.501468][ T7178] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 169.508433][ T7178] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 169.536270][ T7178] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 169.559282][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.567780][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.582544][ T7084] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 169.632304][ T7288] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 169.639642][ T7288] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 169.666060][ T7288] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 169.677775][ T7178] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 169.685355][ T7178] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 169.712013][ T7178] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 169.725094][ T6807] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.747193][ T7084] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 169.809250][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.817911][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.833512][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.840736][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.861970][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.933578][ T7178] device hsr_slave_0 entered promiscuous mode [ 169.992217][ T7178] device hsr_slave_1 entered promiscuous mode [ 170.049071][ T7178] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 170.056645][ T7178] Cannot create hsr debugfs directory [ 170.067990][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.082313][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.092029][ T2500] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.099297][ T2500] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.162819][ T7288] device hsr_slave_0 entered promiscuous mode [ 170.219357][ T7288] device hsr_slave_1 entered promiscuous mode [ 170.259356][ T7288] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 170.266944][ T7288] Cannot create hsr debugfs directory [ 170.285094][ T7060] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 170.366432][ T7060] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 170.436385][ T7060] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 170.486831][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.495720][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.521986][ T7060] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 170.601885][ T6921] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.616342][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.625730][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.635618][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.646544][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.664241][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.717325][ T6807] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 170.728704][ T6807] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 170.741177][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.750466][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.759356][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.767663][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.815161][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.825731][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.834191][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.842152][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 170.849719][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 170.871316][ T6921] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.916844][ T6807] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.985724][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.995607][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.005224][ T2593] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.012374][ T2593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.020895][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.032940][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.041832][ T2593] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.048907][ T2593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.073945][ T7084] 8021q: adding VLAN 0 to HW filter on device bond0 [ 171.092884][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.102006][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.111344][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 171.120823][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.139128][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.147817][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.157209][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.184632][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.224823][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.237254][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.246938][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.259912][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.268031][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.282038][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.292695][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.302893][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.313923][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.322162][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.355446][ T7084] 8021q: adding VLAN 0 to HW filter on device team0 [ 171.364408][ T6921] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 171.378017][ T6921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.386534][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.396105][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.406408][ T6807] device veth0_vlan entered promiscuous mode [ 171.440144][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.448798][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.467488][ T2515] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.474673][ T2515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.487237][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.498543][ T7288] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 171.546512][ T7288] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 171.612244][ T7288] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 171.684024][ T7288] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 171.751562][ T6807] device veth1_vlan entered promiscuous mode [ 171.765687][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.774843][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.783885][ T2593] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.791052][ T2593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.825886][ T7060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 171.849499][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.858215][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.904706][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.913673][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.922971][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 171.930732][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 171.938392][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.948831][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.957958][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.969806][ T7178] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 172.014957][ T7178] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 172.082376][ T7178] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 172.152596][ T6807] device veth0_macvtap entered promiscuous mode [ 172.167218][ T6807] device veth1_macvtap entered promiscuous mode [ 172.187445][ T6921] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.197823][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 172.206585][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.217231][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.225937][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.234891][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.243814][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.252780][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.261824][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 172.274724][ T7178] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 172.345640][ T7060] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.396822][ T7084] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 172.410473][ T7084] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 172.435388][ T6807] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 172.448334][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 172.462716][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.472114][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.481391][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.490308][ T2515] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.497371][ T2515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.505394][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.514610][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.523955][ T2515] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.531144][ T2515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.539167][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.547790][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.603088][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 172.611423][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 172.620404][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 172.629419][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.638148][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.647428][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 172.656335][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 172.665553][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 172.678825][ T6807] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 172.712846][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 172.721816][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.759351][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.768281][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.782664][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 172.794767][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 172.804619][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 172.814126][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.840667][ T6921] device veth0_vlan entered promiscuous mode [ 172.858044][ T7084] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.874093][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.882391][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.891669][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.900796][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.977925][ T6921] device veth1_vlan entered promiscuous mode [ 172.996278][ T7060] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 173.007540][ T7060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.041840][ T7288] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.056529][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 173.065286][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 173.074101][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.083726][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.237532][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 173.248045][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 173.264899][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 173.289617][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 173.305604][ T7288] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.371287][ T7060] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 173.379894][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.394574][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 07:27:12 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x112486e, &(0x7f0000000080)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=0x0, @ANYRESDEC]) [ 173.423906][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 173.438126][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 173.456809][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 07:27:12 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x112486e, &(0x7f0000000080)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=0x0, @ANYRESDEC]) [ 173.475472][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 173.485903][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.495941][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.505464][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.512625][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.550713][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.579976][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.588481][ T12] bridge0: port 2(bridge_slave_1) entered blocking state 07:27:12 executing program 0: syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000080)=[{&(0x7f0000000100)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="82e802000000de36880900000000000000a7ed6e87fe67b594d2", 0x1a}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, 0x0, 0x0, 0x0, 0x0) [ 173.595636][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.648607][ T6921] device veth0_macvtap entered promiscuous mode [ 173.670168][ T7084] device veth0_vlan entered promiscuous mode [ 173.677812][ T7084] device veth1_vlan entered promiscuous mode [ 173.715998][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 173.732341][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 173.751502][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 173.771425][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 173.796888][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 07:27:12 executing program 0: syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000080)=[{&(0x7f0000000100)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="82e802000000de36880900000000000000a7ed6e87fe67b594d2", 0x1a}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, 0x0, 0x0, 0x0, 0x0) [ 173.851429][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.870178][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.885567][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.906155][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.926450][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.936319][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.947074][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.966762][ T7178] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.992515][ T6921] device veth1_macvtap entered promiscuous mode [ 174.009537][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.018084][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.040780][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 174.055368][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 07:27:12 executing program 0: [ 174.093117][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.130591][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.206161][ T7084] device veth0_macvtap entered promiscuous mode [ 174.217571][ T7288] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 07:27:12 executing program 0: [ 174.262368][ T7178] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.285227][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 174.299437][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 174.309407][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.317356][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.329908][ T7084] device veth1_macvtap entered promiscuous mode [ 174.345819][ T7060] device veth0_vlan entered promiscuous mode 07:27:13 executing program 0: [ 174.399132][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 174.408563][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 174.420058][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 174.428555][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.437353][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.447088][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.456560][ T2593] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.463723][ T2593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.479581][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.488502][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.507767][ T2593] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.514972][ T2593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.551756][ T6921] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 174.575252][ T6921] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 174.601113][ T6921] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 174.662319][ T7288] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 174.677755][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.686588][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.695146][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.703774][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 174.713705][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 174.723066][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.733175][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 174.741482][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 174.753384][ T6921] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 174.766051][ T6921] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 174.778394][ T6921] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 174.787553][ T7060] device veth1_vlan entered promiscuous mode [ 174.798446][ T7084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 174.810800][ T7084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 174.821522][ T7084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 174.832681][ T7084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 174.845913][ T7084] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 174.857431][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 174.866719][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 174.884807][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 174.895320][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 174.904456][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 174.932752][ T7084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 174.943531][ T7084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 174.955433][ T7084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 174.966655][ T7084] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 174.978609][ T7084] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 174.996201][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 175.008501][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 175.017945][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 175.028092][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.038600][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.074892][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.086377][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.096158][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.254391][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 175.264074][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 175.273873][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.286403][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.295573][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.304752][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.313669][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 175.322937][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 175.347970][ T7178] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.423102][ T7060] device veth0_macvtap entered promiscuous mode [ 175.505066][ T7060] device veth1_macvtap entered promiscuous mode [ 175.536132][ T7288] device veth0_vlan entered promiscuous mode [ 175.593075][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 175.635403][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 175.655520][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 175.680466][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 07:27:14 executing program 1: [ 175.726241][ T7288] device veth1_vlan entered promiscuous mode [ 175.777784][ T7060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 175.815128][ T7060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.826437][ T7060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 175.838909][ T7060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.849882][ T7060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 175.870284][ T7060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.886136][ T7060] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 175.897723][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.906484][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 175.916290][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 175.926035][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 175.934087][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 175.942141][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 175.951410][ T2593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 175.969549][ T7060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 175.987264][ T7060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.997774][ T7060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 176.016396][ T7060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.026776][ T7060] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 176.052277][ T7060] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.064140][ T7060] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 176.082318][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 176.093032][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 176.122141][ T7178] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 176.199710][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 176.208462][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.221609][ T7288] device veth0_macvtap entered promiscuous mode [ 176.332146][ T7288] device veth1_macvtap entered promiscuous mode [ 176.423409][ T7288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 176.433987][ T7288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.460400][ T7288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 176.481506][ T7288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.498287][ T7288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 176.518212][ T7288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.528993][ T7288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 176.543027][ T7288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.557087][ T7288] batman_adv: batadv0: Interface activated: batadv_slave_0 07:27:15 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) getsockname$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000280)=0x1c) 07:27:15 executing program 0: [ 176.574754][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 176.584794][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 176.594630][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 176.612290][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.627427][ T7288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 176.662039][ T7288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.689141][ T7288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 176.709118][ T7288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.718976][ T7288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 176.761805][ T7288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.779329][ T7288] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 176.799209][ T7288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.826348][ T7288] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 176.841617][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 176.856131][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.867963][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 176.890524][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 176.954181][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 176.971996][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.987706][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.997626][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.016183][ T7178] device veth0_vlan entered promiscuous mode [ 177.082916][ T7178] device veth1_vlan entered promiscuous mode [ 177.233562][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 177.243477][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.257562][ T7178] device veth0_macvtap entered promiscuous mode [ 177.301430][ T7178] device veth1_macvtap entered promiscuous mode [ 177.383154][ T7178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 177.403963][ T7178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.417010][ T7178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 177.440064][ T7178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.454632][ T7178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 177.465498][ T7178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.479398][ T7178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 177.494195][ T7178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.505904][ T7178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 177.505940][ T7178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.507961][ T7178] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 177.541621][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 177.550939][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 177.559342][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 177.568244][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.581221][ T7178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 177.593225][ T7178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.604342][ T7178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 177.615195][ T7178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.625447][ T7178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 177.636159][ T7178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.646528][ T7178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 177.657486][ T7178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.667629][ T7178] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 177.678695][ T7178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.691444][ T7178] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 177.705130][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.714723][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.940474][ T8146] FAT-fs (loop4): bogus number of FAT sectors [ 177.947142][ T8146] FAT-fs (loop4): Can't find a valid FAT filesystem [ 178.303670][ T8146] FAT-fs (loop4): bogus number of FAT sectors [ 178.311424][ T8146] FAT-fs (loop4): Can't find a valid FAT filesystem 07:27:17 executing program 4: 07:27:17 executing program 3: 07:27:17 executing program 1: 07:27:17 executing program 0: 07:27:17 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) getsockname$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000280)=0x1c) 07:27:17 executing program 5: 07:27:17 executing program 3: 07:27:17 executing program 5: 07:27:17 executing program 1: 07:27:17 executing program 4: 07:27:17 executing program 0: 07:27:17 executing program 2: 07:27:17 executing program 3: 07:27:17 executing program 1: 07:27:17 executing program 4: 07:27:17 executing program 0: 07:27:17 executing program 5: 07:27:17 executing program 2: 07:27:17 executing program 4: 07:27:17 executing program 3: 07:27:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x3c) 07:27:17 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='macvlan0\x00', 0x10) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 07:27:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002f0000006700000000002c009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x1, 0x5ed, &(0x7f000000cf3d)=""/195}, 0x48) 07:27:17 executing program 5: 07:27:17 executing program 2: [ 178.894078][ T8182] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 07:27:17 executing program 3: 07:27:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) connect(r0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @remote, 0x2}, 0x80) syz_emit_ethernet(0x8e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6002920000580600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB='`'], 0x0) 07:27:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002f0000002700000000002c009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x1, 0x5ed, &(0x7f000000cf3d)=""/195}, 0x48) 07:27:17 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 178.980967][ T8186] x_tables: duplicate underflow at hook 2 [ 179.006681][ T8186] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! 07:27:17 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x20, 0x6d, 0x20000000000001, 0x0, 0x0}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) [ 179.057677][ T8186] x_tables: duplicate underflow at hook 2 07:27:17 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX=r0], 0x12) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0)=0x1, 0x8080fdfffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x67) r3 = dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r6, 0x0, 0x8000fffffffe) 07:27:17 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='macvlan0\x00', 0x10) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 07:27:17 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:17 executing program 2: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setsig(r1, 0xa, 0x12) fcntl$setownex(r1, 0xf, &(0x7f0000000180)={0x2, r0}) recvmsg(r2, &(0x7f000095cfc8)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r1, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x15) 07:27:17 executing program 5: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000007c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000a80200000000000000000000000000f70300000000000000100200001002000010020000100200001002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000f0003801000000000000000000000000000000000000000048006c696d69740000000000000000000000000000000000000000000000000000000000010000020000000000000000000000000000000000000000000000000000001500000000380074696d6500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000440000000000000000000000000000000000000000170000000000000000000000000000000000000000006dc81b77000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e300000000000000000000000000000000000000007000d800000000000000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000000021000000000000400000000000000747000000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000001ff00000280000000000000000000000000000000000000000000000e4ff000000000004feffffff"], 0x1) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_tables_targets\x00') [ 179.289365][ T8215] x_tables: duplicate underflow at hook 2 [ 179.318552][ T29] audit: type=1804 audit(1590305237.911:2): pid=8217 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir010202094/syzkaller.BtvsOA/6/bus" dev="sda1" ino=15772 res=1 07:27:18 executing program 5: socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\a~\x00', 0x14, 0x2c, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x5, 0x5}}}}}}}, 0x0) 07:27:18 executing program 0: syz_open_procfs(0x0, &(0x7f0000000180)='net/sockstat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r1) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) write(r2, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./control\x00', 0xa4000960) open(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) 07:27:18 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:18 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x105082) ioprio_get$uid(0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r2}}}], 0x20}], 0x1, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x100, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r4, &(0x7f0000000180), 0x4000000000002bc, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f0000000180), 0x4000000000002bc, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001700)='/dev/net/tun\x00', 0x200, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001800)=ANY=[@ANYBLOB="54150000340008002dbd7000fbdbdf2513007e8008002900010000803196ff41bf1fd0007a01cbfc54c35ef8d59720e0ec8a183ca3e1fab535fe6e78b8d86656e041fd03588008006200", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="f1fdc267d3625b11187a0b9cd405e7481e2c9367274f7b10c1dcff9f6f2af5cc76552b827f343ae4d11575afa6b83bbaeefe6f406d7678678e6b299302bf860e049a09b1403de0feb36103151c8f8cdf6c980d1e913ae8dce5ee1f8a49a3e650f969f9742e0e70f61df2c9b31e14a208a601c4624a7da4a276a88b44e43c1da98d3f984613457b2233ff618259c7a0614b3f1bc961ed13e16986231250f9d1bc7fd6493132e27684a29aa2661a68d36abacafa3e1d756bfd9455e009f8f3282bb381b3483c9254ca2feb5886184f0fa26d00094b3e9c65b9c93a1bef0f6a7815406564cc3767f63e771e56a1f87c2454f26da5d748ed52c661bdca9511cf786e4889f96396d5b944cff0"], 0x1554}], 0x1, &(0x7f0000001800)=ANY=[], 0x60, 0x801}, 0x0) r6 = memfd_create(&(0x7f0000000100)='\xbb\x02\xb1\x91^\x00\x00\x01\x00\x00\x00\x00\x00\x00\xfa\xe3\xa0\xd42\x90YJ\x89]\xad\x01\xc3\\:;\x99\xbck\xf9=\xfa\xe8HB\xf7\x92\x16\xbc\x11\xc4\xff\xa1\xea\xf9l', 0x0) pwritev(r6, &(0x7f00000001c0)=[{&(0x7f0000000200)="c5", 0x1}], 0x1, 0x40ee1) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000009000/0xf000)=nil, 0xf000, 0x380010a, 0x100812, r0, 0x0) write(r0, &(0x7f0000000000), 0x52698b21) 07:27:18 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:18 executing program 2: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setsig(r1, 0xa, 0x12) fcntl$setownex(r1, 0xf, &(0x7f0000000180)={0x2, r0}) recvmsg(r2, &(0x7f000095cfc8)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r1, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x15) 07:27:18 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 179.405316][ T8224] xt_CT: You must specify a L4 protocol and not use inversions on it [ 180.042447][ T29] audit: type=1804 audit(1590305238.641:3): pid=8250 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir010202094/syzkaller.BtvsOA/6/bus" dev="sda1" ino=15772 res=1 [ 180.138214][ T29] audit: type=1804 audit(1590305238.731:4): pid=8246 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir010202094/syzkaller.BtvsOA/6/bus" dev="sda1" ino=15772 res=1 07:27:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000040)='bdev\x00', 0x0, 0x0) truncate(&(0x7f00000000c0)='./file0\x00', 0x0) 07:27:18 executing program 0: syz_open_procfs(0x0, &(0x7f0000000180)='net/sockstat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r1) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) write(r2, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./control\x00', 0xa4000960) open(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) 07:27:18 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:18 executing program 2: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setsig(r1, 0xa, 0x12) fcntl$setownex(r1, 0xf, &(0x7f0000000180)={0x2, r0}) recvmsg(r2, &(0x7f000095cfc8)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r1, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x15) 07:27:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1}) syz_genetlink_get_family_id$tipc2(0x0) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) 07:27:18 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:19 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x24020}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', r6}) sendto$inet(r1, &(0x7f00000012c0)="0b2603927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f10fb02bd67aa030596decc7a95425a3a07e758044ab4ea6f7aebcd88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) bind$rose(0xffffffffffffffff, &(0x7f0000000100)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) 07:27:19 executing program 2: r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setsig(r1, 0xa, 0x12) fcntl$setownex(r1, 0xf, &(0x7f0000000180)={0x2, r0}) recvmsg(r2, &(0x7f000095cfc8)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r1, r2) clone(0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x15) 07:27:19 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:19 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:19 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:19 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:20 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) close(r0) 07:27:20 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000005000000350000000000000085000000070000009500000000000000e304af054132aa141f24e07066a0900ae5e8250b4c2e6cd9edce408f8cce94ad16692ec25ad4557744dfec822595f67ba12a75118870402a6168a8b18b0c6480fe0b28bf6dea34cfcd23ad3e9d5369787bd17ba1986400a6f2dc3d2139640774afc8e657991348d945697d57d21fc2f9418f3b3ebcb4c27b8c7e059595d229f012951953ccfc310c0f06b8aec467e6961bb20fde32b8959c58f8f36c3be6d63530ee9736697ca49165baf3667a4aeded18d7e5c7cdf0643a000000000000000000000000e70f641b9a156eb410e6109cce71e58dd7eceaa7bdce49936de1037c240515f946f7b32000fc28f1116c2c65c6894e321e7a82f8ed9e7b30f128233f2261e3ccd413dcc5d8452fc1944b3599ddb3e655a99a0c20078ea4abbd1260f2c45451a2429a9cdcd3bc04474e27592cbf2d59468607a9552f0eae5d35da51220dd2313306b47ea76237"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:20 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x24020}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', r6}) sendto$inet(r1, &(0x7f00000012c0)="0b2603927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f10fb02bd67aa030596decc7a95425a3a07e758044ab4ea6f7aebcd88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) bind$rose(0xffffffffffffffff, &(0x7f0000000100)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) 07:27:20 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x24020}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', r6}) sendto$inet(r1, &(0x7f00000012c0)="0b2603927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f10fb02bd67aa030596decc7a95425a3a07e758044ab4ea6f7aebcd88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) bind$rose(0xffffffffffffffff, &(0x7f0000000100)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) 07:27:20 executing program 4: setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:20 executing program 4: setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:20 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x24020}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', r6}) sendto$inet(r1, &(0x7f00000012c0)="0b2603927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f10fb02bd67aa030596decc7a95425a3a07e758044ab4ea6f7aebcd88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) bind$rose(0xffffffffffffffff, &(0x7f0000000100)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) 07:27:20 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:20 executing program 4: setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:21 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) close(r0) 07:27:21 executing program 4: open(0x0, 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:21 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x24020}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', r6}) sendto$inet(r1, &(0x7f00000012c0)="0b2603927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f10fb02bd67aa030596decc7a95425a3a07e758044ab4ea6f7aebcd88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) bind$rose(0xffffffffffffffff, &(0x7f0000000100)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) 07:27:21 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x24020}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', r6}) sendto$inet(r1, &(0x7f00000012c0)="0b2603927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f10fb02bd67aa030596decc7a95425a3a07e758044ab4ea6f7aebcd88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) bind$rose(0xffffffffffffffff, &(0x7f0000000100)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) 07:27:21 executing program 4: open(0x0, 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:21 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:21 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:21 executing program 1: r0 = epoll_create(0xe62) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) 07:27:21 executing program 4: open(0x0, 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:21 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x24020}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', r6}) sendto$inet(r1, &(0x7f00000012c0)="0b2603927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f10fb02bd67aa030596decc7a95425a3a07e758044ab4ea6f7aebcd88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) bind$rose(0xffffffffffffffff, &(0x7f0000000100)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) 07:27:21 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:21 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) close(r0) 07:27:21 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:21 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:21 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x0, @loopback}, 0x10) 07:27:21 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x24020}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', r6}) sendto$inet(r1, &(0x7f00000012c0)="0b2603927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f10fb02bd67aa030596decc7a95425a3a07e758044ab4ea6f7aebcd88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) 07:27:21 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:22 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r3) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:22 executing program 1: 07:27:22 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:22 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) close(r0) 07:27:22 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x24020}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', r6}) sendto$inet(r1, &(0x7f00000012c0)="0b2603927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f10fb02bd67aa030596decc7a95425a3a07e758044ab4ea6f7aebcd88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 07:27:22 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:22 executing program 1: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="62020207e0"], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket(0x2, 0x2, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x100000000000000a, &(0x7f0000000040)='\x00', 0x1) dup2(r2, r1) connect$unix(r1, &(0x7f0000000000)=ANY=[], 0x10) dup2(r1, r0) r3 = dup(r0) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 07:27:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:22 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:22 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x24020}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', r6}) 07:27:22 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:23 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r3) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:23 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:23 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(0x0, &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:23 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x2, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x24020}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x34}}, 0x0) 07:27:23 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:23 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(0x0, &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:23 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:23 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(0x0, &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:23 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:24 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r3) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:24 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) 07:27:24 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:24 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:24 executing program 3: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:24 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:24 executing program 3: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:24 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:24 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:24 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x2, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) 07:27:25 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:25 executing program 3: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:25 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:25 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:25 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x2, 0x0) 07:27:25 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:25 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 186.575988][ T8593] Invalid argument reading file caps for ./file0 07:27:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:25 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 07:27:25 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:25 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) [ 186.703809][ T8602] Invalid argument reading file caps for ./file0 07:27:25 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:25 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:25 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:25 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:25 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:26 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) [ 187.438793][ T8626] Invalid argument reading file caps for ./file0 07:27:26 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:26 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:26 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:26 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:26 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:26 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:26 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:26 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:26 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:27 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:27 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:27 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:27:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:27 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:27 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:27 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:27 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:27 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 07:27:27 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:27 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 07:27:27 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000005000000350000000000000085000000070000009500000000000000e304af054132aa141f24e07066a0900ae5e8250b4c2e6cd9edce408f8cce94ad16692ec25ad4557744dfec822595f67ba12a75118870402a6168a8b18b0c6480fe0b28bf6dea34cfcd23ad3e9d5369787bd17ba1986400a6f2dc3d2139640774afc8e657991348d945697d57d21fc2f9418f3b3ebcb4c27b8c7e059595d229f012951953ccfc310c0f06b8aec467e6961bb20fde32"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:27 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:28 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 07:27:28 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:28 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000005000000350000000000000085000000070000009500000000000000e304af054132aa141f24e07066a0900ae5e8250b4c2e6cd9edce408f8cce94ad16692ec25ad4557744dfec822595f67ba12a75118870402a6168a8b18b0c6480fe0b28bf6dea34cfcd23ad3e9d5369787bd17ba1986400a6f2dc3d2139640774afc8e657991348d945697d57d21fc2f9418f3b3ebcb4c27b8c7e059595d229f012951953ccfc310c0f06b8aec467e6961bb20fde32"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:28 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x2000000, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000632f77fbac14140ce0", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) 07:27:28 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:28 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000005000000350000000000000085000000070000009500000000000000e304af054132aa141f24e07066a0900ae5e8250b4c2e6cd9edce408f8cce94ad16692ec25ad4557744dfec822595f67ba12a75118870402a6168a8b18b0c6480fe0b28bf6dea34cfcd23ad3e9d5369787bd17ba1986400a6f2dc3d2139640774afc8e657991348d945697d57d21fc2f9418f3b3ebcb4c27b8c7e059595d229f012951953ccfc310c0f06b8aec467e6961bb20fde32"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:28 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:28 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000280)="20cf4d411d520bdfae1c3821271c", 0x0, 0xd0, 0xf0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:28 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:29 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:29 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{0x16}]}) 07:27:29 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:29 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:29 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0x12) 07:27:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:29 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, 0x0) 07:27:29 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:29 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) [ 191.211847][ T29] audit: type=1800 audit(1590305249.810:5): pid=8804 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="memory.events" dev="sda1" ino=15915 res=0 07:27:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:29 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0x12) 07:27:30 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x8000, 0x0) 07:27:30 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040)=0x6d, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:30 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:30 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, 0x0) 07:27:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000005000000350000000000000085000000070000009500000000000000e304af054132aa141f24e07066a0900ae5e8250b4c2e6cd9edce408f8cce94ad16692ec25ad4557744dfec822595f67ba12a75118870402a6168a8b18b0c6480fe0b28bf6dea34cfcd23ad3e9d5369787bd17ba1986400a6f2dc3d2139640774afc8e657991348d945697d57d21fc2f9418f3b3ebcb4c27b8c7e059595d229f012951953ccfc310c0f06b8aec467e6961bb20fde32b8959c58f8f36c3be6d63530ee9736697ca49165baf3667a4aeded18d7e5c7cdf0643a000000000000000000000000e70f641b9a156eb410e6109cce71e58dd7eceaa7bdce49936de1037c240515f946f7b32000fc28f1116c2c65c6894e321e7a82f8ed9e7b30f128233f2261e3ccd413dcc5d8452fc1944b3599ddb3e655a99a0c20078ea4abbd"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:30 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0x12) 07:27:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:30 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0x12) 07:27:30 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:30 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, 0x0) 07:27:30 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:31 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x8000, 0x0) 07:27:31 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044941a4976e252922cb1996e2e34ba800000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3fedb1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:31 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x0, 0x0}) 07:27:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:31 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:31 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000005000000350000000000000085000000070000009500000000000000e304af054132aa141f24e07066a0900ae5e8250b4c2e6cd9edce408f8cce94ad16692ec25ad4557744dfec822595f67ba12a75118870402a6168a8b18b0c6480fe0b28bf6dea34cfcd23ad3e9d5369787bd17ba1986400a6f2dc3d2139640774afc8e657991348d945697d57d21fc2f9418f3b3ebcb4c27b8c7e059595d229f012951953ccfc310c0f06b8aec467e6961bb20fde32b8959c58f8f36c3be6d63530ee9736697ca49165baf3667a4aeded18d7e5c7cdf0643a000000000000000000000000e70f641b9a156eb410e6109cce71e58dd7eceaa7bdce49936de1037c240515f946f7b32000fc28f1116c2c65c6894e321e7a82f8ed9e7b30f128233f2261e3ccd413dcc5d8452fc1944b3599ddb3e655a99a0c20078ea4abbd1260f2c45451a2429a9cdcd3bc04474e27592cbf2d5946"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:31 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:31 executing program 0: socket(0x11, 0x800000003, 0x8) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000005000000350000000000000085000000070000009500000000000000e304af054132aa141f24e07066a0900ae5e8250b4c2e6cd9edce408f8cce94ad16692ec25ad4557744dfec822595f67ba12a75118870402a6168a8b18b0c6480fe0b28bf6dea34cfcd23ad3e9d5369787bd17ba1986400a6f2dc3d2139640774afc8e657991348d945697d57d21fc2f9418f3b3ebcb4c27b8c7e059595d229f012951953ccfc310c0f06b8aec467e6961bb20fde32b8959c58f8f36c3be6d63530ee9736697ca49165baf3667a4aeded18d7e5c7cdf0643a000000000000000000000000e70f641b9a156eb410e6109cce71e58dd7eceaa7bdce49936de1037c240515f946f7b32000fc28f1116c2c65c6894e321e7a82f8ed9e7b30f128233f2261e3ccd413dcc5d8452fc1944b3599ddb3e655a99a0c20078ea4abbd1260f2c45451a2429a9cdcd3bc04474e27592cbf2d59468607a9552f0eae5d35da51"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:31 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:31 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x0, 0x0}) 07:27:32 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x8000, 0x0) 07:27:32 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:32 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x0, 0x0}) 07:27:32 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:32 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:32 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:33 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:33 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x0, &(0x7f00000002c0)}) 07:27:33 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:33 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:33 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:33 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:33 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:33 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x0, &(0x7f00000002c0)}) 07:27:34 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:34 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:34 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:34 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x0, &(0x7f00000002c0)}) 07:27:34 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:34 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:34 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{}]}) 07:27:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:35 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, 0x0, 0x0) 07:27:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:35 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:35 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:35 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{}]}) 07:27:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:35 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f00000002c0)=[{}]}) 07:27:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, 0x0, 0x0) 07:27:35 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:35 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:35 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, 0x0, 0x0) 07:27:35 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:27:35 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:35 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2}, 0x0) 07:27:36 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:27:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) [ 197.454627][ T9097] dns_resolver: Unsupported content type (1) [ 197.477305][ T9103] dns_resolver: Unsupported content type (1) 07:27:36 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:36 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:27:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) [ 197.613041][ T9111] dns_resolver: Unsupported content type (1) [ 197.717192][ T9120] dns_resolver: Unsupported content type (1) 07:27:36 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:36 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2}, 0x0) 07:27:36 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:27:36 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:36 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:27:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2}, 0x0) [ 198.351413][ T9141] dns_resolver: Unsupported content type (1) 07:27:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:37 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:37 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 198.498031][ T9147] dns_resolver: Unsupported content type (1) 07:27:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:27:37 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:37 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:27:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x34}, 0x2}, 0x0) 07:27:37 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:37 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) 07:27:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:27:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x34}, 0x2}, 0x0) [ 199.255816][ T9177] dns_resolver: Unsupported content type (1) 07:27:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:27:37 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:27:37 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) 07:27:37 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x34}, 0x2}, 0x0) [ 199.473308][ T9193] dns_resolver: Unsupported content type (1) 07:27:38 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8000, 0x0) 07:27:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:38 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:27:38 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) 07:27:38 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1], 0x34}, 0x2}, 0x0) 07:27:38 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 200.148189][ T9213] dns_resolver: Unsupported server list version (0) 07:27:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1], 0x34}, 0x2}, 0x0) 07:27:38 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:38 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:27:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) [ 200.293256][ T9221] dns_resolver: Unsupported server list version (0) [ 200.436617][ T9234] dns_resolver: Unsupported server list version (0) 07:27:39 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8000, 0x0) 07:27:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1], 0x34}, 0x2}, 0x0) 07:27:39 executing program 3: writev(0xffffffffffffffff, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:27:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:39 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:39 executing program 3: writev(0xffffffffffffffff, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:27:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB], 0x34}, 0x2}, 0x0) [ 201.093268][ T9253] dns_resolver: Unsupported server list version (0) 07:27:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:39 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:39 executing program 3: writev(0xffffffffffffffff, 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 201.211939][ T9260] dns_resolver: Unsupported server list version (0) [ 201.352841][ T9274] dns_resolver: Unsupported server list version (0) 07:27:40 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8000, 0x0) 07:27:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB], 0x34}, 0x2}, 0x0) 07:27:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000005000000350000000000000085000000070000009500000000000000e304af054132aa141f24e07066a0900ae5e8250b4c2e6cd9edce408f8cce94ad16692ec25ad4557744dfec822595f67ba12a75118870402a6168a8b18b0c6480fe0b28bf6dea34cfcd23ad3e9d5369787bd17ba1986400a6f2dc3d2139640774afc8e657991348d945697d57d21fc2f9418f3b3ebcb4c27b8c7e059595d229f012951953ccfc310c0f06b8aec467e6961bb20fde32b8959c58f8f36c3be6d63530ee9736697ca49165baf3667a4aeded18d7e5c7cdf0643a000000000000000000000000e70f641b9a156eb410e6109cce71e58dd7eceaa7bdce49936de1037c240515f946f7b32000fc28f1116c2c65c6894e321e7a82f8ed9e7b30f128233f2261e3ccd413dcc5d8452fc1944b3599ddb3e655a99a0c20078ea4abbd1260f2c45451a2429a9cdcd3bc04474e27592cbf2d59468607a9552f0eae5d35da51220dd2313306b47ea76237"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:40 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:40 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:27:40 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:40 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 202.007498][ T9294] dns_resolver: Unsupported server list version (0) 07:27:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB], 0x34}, 0x2}, 0x0) 07:27:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:40 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:40 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:40 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080), 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 202.144321][ T9299] dns_resolver: Unsupported server list version (0) [ 202.255401][ T9313] dns_resolver: Unsupported server list version (0) 07:27:41 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000500000018000180140002"], 0x34}, 0x2}, 0x0) 07:27:41 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:41 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:27:41 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:41 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) [ 202.909396][ T9329] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 07:27:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000500000018000180140002"], 0x34}, 0x2}, 0x0) 07:27:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:41 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:27:41 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 202.979696][ T9333] dns_resolver: Unsupported server list version (0) 07:27:41 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 203.079940][ T9340] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 07:27:42 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000500000018000180140002"], 0x34}, 0x2}, 0x0) 07:27:42 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:42 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:42 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:27:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x7, 0x0, &(0x7f0000000000)="d9c84c2a17d416", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:42 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 203.874458][ T9372] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 203.912661][ T9373] dns_resolver: Unsupported content type (1) 07:27:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e0000"], 0x34}, 0x2}, 0x0) 07:27:42 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:42 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x7, 0x0, &(0x7f0000000000)="d9c84c2a17d416", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:42 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) [ 204.100924][ T9391] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 204.150854][ T9392] dns_resolver: Unsupported content type (1) 07:27:43 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x7, 0x0, &(0x7f0000000000)="d9c84c2a17d416", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:43 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e0000"], 0x34}, 0x2}, 0x0) 07:27:43 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 07:27:43 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xb, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) [ 204.807426][ T9412] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 204.819728][ T9411] dns_resolver: Unsupported content type (1) 07:27:43 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0x0, 0xfffffffffffffffb) 07:27:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e0000"], 0x34}, 0x2}, 0x0) 07:27:43 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:43 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:43 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0x0, 0xfffffffffffffffb) [ 205.027627][ T9429] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 07:27:44 executing program 5: sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8000, 0x0) 07:27:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xb, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:44 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0x0, 0xfffffffffffffffb) 07:27:44 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e00000000000000"], 0x34}, 0x2}, 0x0) 07:27:44 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) [ 205.732949][ T9453] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 07:27:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e00000000000000"], 0x34}, 0x2}, 0x0) 07:27:44 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:44 executing program 5: sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8000, 0x0) 07:27:44 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:44 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffb) [ 205.932127][ T9463] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 07:27:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e00000000000000"], 0x34}, 0x2}, 0x0) 07:27:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xb, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:44 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffb) 07:27:44 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:44 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xd, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:44 executing program 5: sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8000, 0x0) 07:27:44 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffb) [ 206.140834][ T9477] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 07:27:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e00000000000000000005"], 0x34}, 0x2}, 0x0) 07:27:45 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 07:27:45 executing program 5: pipe(0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8000, 0x0) 07:27:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xd, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:45 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:45 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000005000000350000000000000085000000070000009500000000000000e304af054132aa141f24e07066a0900ae5e8250b4c2e6cd9edce408f8cce94ad16692ec25ad4557744dfec822595f67ba12a75118870402a6168a8b18b0c6480fe0b28bf6dea34cfcd23ad3e9d5369787bd17ba1986400a6f2dc3d2139640774afc8e657991348d945697d57d21fc2f9418f3b3ebcb4c27b8c7e059595d229f012951953ccfc310c0f06b8aec467e6961bb20fde32b8959c58f8f36c3be6d63530ee9736697ca49165baf3667a4aeded18d7e5c7cdf0643a000000000000000000000000e70f641b9a156eb410e6109cce71e58dd7eceaa7bdce49936de1037c240515f946f7b32000fc28f1116c2c65c6894e321e7a82f8ed9e7b30f128233f2261e3ccd413dcc5d8452fc1944b3599ddb3e655a99a0c20078ea4abbd1260f2c45451a2429a9cdcd3bc04474e27592cbf2d59468607a9552f0eae5d35da51220dd2313306b47ea76237"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xd, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60", 0x0, 0x0, 0x0, 0x39, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7224470", 0x0}, 0x40) 07:27:45 executing program 5: pipe(0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8000, 0x0) 07:27:45 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e00000000000000000005"], 0x34}, 0x2}, 0x0) 07:27:45 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 07:27:45 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:45 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 07:27:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 07:27:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e00000000000000000005"], 0x34}, 0x2}, 0x0) 07:27:45 executing program 5: pipe(0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000000000007e0000000005000100060000009c0007801800018050000240fe8000000000ffff0000000000005015d41b0000000000000c00000000000054fedcbcca9c55170076650800000000000000000000000000050007008800000014001700767863616e310000a68acf58f78028740900120000007a32100000000c001b4000000000000080000c1e148008000140ac14142b0c005b4000000000000000070c0016805f80000000f1133d09"], 0x1}}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x8000, 0x0) 07:27:45 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0x4}}}]}, 0x34}}, 0x0) 07:27:45 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 07:27:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e0000000000000000000500"], 0x34}, 0x2}, 0x0) 07:27:45 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x4c}}, 0x0) 07:27:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e0000000000000000000500"], 0x34}, 0x2}, 0x0) 07:27:45 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000005000000350000000000000085000000070000009500000000000000e304af054132aa141f24e07066a0900ae5e8250b4c2e6cd9edce408f8cce94ad16692ec25ad4557744dfec822595f67ba12a75118870402a6168a8b18b0c6480fe0b28bf6dea34cfcd23ad3e9d5369787bd17ba1986400a6f2dc3d2139640774afc8e657991348d945697d57d21fc2f9418f3b3ebcb4c27b8c7e059595d229f012951953ccfc310c0f06b8aec467e6961bb20fde32b8959c58f8f36c3be6d63530ee9736697ca49165baf3667a4aeded18d7e5c7cdf0643a000000000000000000000000e70f641b9a156eb410e6109cce71e58dd7eceaa7bdce49936de1037c240515f946f7b32000fc28f1116c2c65c6894e321e7a82f8ed9e7b30f128233f2261e3ccd413dcc5d8452fc1944b3599ddb3e655a99a0c20078ea4abbd1260f2c45451a2429a9cdcd3bc04474e27592cbf2d59468607a9552f0eae5d35da51220dd2313306b47ea76237"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 07:27:45 executing program 3: r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000c80)=""/235, 0xeb}], 0x1}}], 0x1, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x20a}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 07:27:45 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e0000000000000000000500"], 0x34}, 0x2}, 0x0) 07:27:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0}, 0x40) 07:27:46 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:46 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:46 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x103382) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) msgget(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) pipe(&(0x7f0000000180)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) sendfile(r0, r0, 0x0, 0x2400040c) ioctl$LOOP_CLR_FD(r0, 0x4c01) 07:27:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000005000000350000000000000085000000070000009500000000000000e304af054132aa141f24e07066a0900ae5e8250b4c2e6cd9edce408f8cce94ad16692ec25ad4557744dfec822595f67ba12a75118870402a6168a8b18b0c6480fe0b28bf6dea34cfcd23ad3e9d5369787bd17ba1986400a6f2dc3d2139640774afc8e657991348d945697d57d21fc2f9418f3b3ebcb4c27b8c7e059595d229f012951953ccfc310c0f06b8aec467e6961bb20fde32b8959c58f8f36c3be6d63530ee9736697ca49165baf3667a4aeded18d7e5c7cdf0643a000000000000000000000000e70f641b9a156eb410e6109cce71e58dd7eceaa7bdce49936de1037c240515f946f7b32000fc28f1116c2c65c6894e321e7a82f8ed9e7b30f128233f2261e3ccd413dcc5d8452fc1944b3599ddb3e655a99a0c20078ea4abbd1260f2c45451a2429a9cdcd3bc04474e27592cbf2d59468607a9552f0eae5d35da51220dd2313306b47ea76237"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0}, 0x40) 07:27:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:46 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000005000000350000000000000085000000070000009500000000000000e304af054132aa141f24e07066a0900ae5e8250b4c2e6cd9edce408f8cce94ad16692ec25ad4557744dfec822595f67ba12a75118870402a6168a8b18b0c6480fe0b28bf6dea34cfcd23ad3e9d5369787bd17ba1986400a6f2dc3d2139640774afc8e657991348d945697d57d21fc2f9418f3b3ebcb4c27b8c7e059595d229f012951953ccfc310c0f06b8aec467e6961bb20fde32b8959c58f8f36c3be6d63530ee9736697ca49165baf3667a4aeded18d7e5c7cdf0643a000000000000000000000000e70f641b9a156eb410e6109cce71e58dd7eceaa7bdce49936de1037c240515f946f7b32000fc28f1116c2c65c6894e321e7a82f8ed9e7b30f128233f2261e3ccd413dcc5d8452fc1944b3599ddb3e655a99a0c20078ea4abbd1260f2c45451a2429a9cdcd3bc04474e27592cbf2d59468607a9552f0eae5d35da51220dd2313306b47ea76237"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0}, 0x40) 07:27:46 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:46 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x1d, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079a", 0x0}, 0x40) 07:27:47 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:47 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:47 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2300000025000511d25a80648c63940d0424fc60040018000a001100022f000037153e", 0x23}], 0x1, 0x0, 0x0, 0x4c000000}, 0x0) 07:27:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:47 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x1d, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079a", 0x0}, 0x40) 07:27:47 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000005000000350000000000000085000000070000009500000000000000e304af054132aa141f24e07066a0900ae5e8250b4c2e6cd9edce408f8cce94ad16692ec25ad4557744dfec822595f67ba12a75118870402a6168a8b18b0c6480fe0b28bf6dea34cfcd23ad3e9d5369787bd17ba1986400a6f2dc3d2139640774afc8e657991348d945697d57d21fc2f9418f3b3ebcb4c27b8c7e059595d229f012951953ccfc310c0f06b8aec467e6961bb20fde32b8959c58f8f36c3be6d63530ee9736697ca49165baf3667a4aeded18d7e5c7cdf0643a000000000000000000000000e70f641b9a156eb410e6109cce71e58dd7eceaa7bdce49936de1037c240515f946f7b32000fc28f1116c2c65c6894e321e7a82f8ed9e7b30f128233f2261e3ccd413dcc5d8452fc1944b3599ddb3e655a99a0c20078ea4abbd1260f2c45451a2429a9cdcd3bc04474e27592cbf2d59468607a9552f0eae5d35da51220dd2313306b47ea76237"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x1d, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079a", 0x0}, 0x40) 07:27:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:47 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:47 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x2b, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27e", 0x0}, 0x40) 07:27:48 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:48 executing program 3: socket$alg(0x26, 0x5, 0x0) syz_open_procfs(0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) socket$tipc(0x1e, 0x2, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x53065d8684b7bfca}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000280)=""/220, 0xdc}], 0x2, 0x2) 07:27:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:48 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:48 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) 07:27:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x2b, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27e", 0x0}, 0x40) 07:27:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:48 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x2b, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27e", 0x0}, 0x40) [ 209.862573][ C0] hrtimer: interrupt took 71827 ns 07:27:48 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, 0x0, 0x0) 07:27:48 executing program 3: r0 = getpgrp(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000140)=0x100000001) 07:27:48 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x32, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9", 0x0}, 0x40) 07:27:49 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:49 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, 0x0, 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x32, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9", 0x0}, 0x40) 07:27:49 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, 0x0, 0x0) 07:27:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x4c, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x4c}}, 0x0) 07:27:49 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e0000001d008103e00f80ecdb4cb9d90163190405000f00000000fb12000100ac14141840d819a9060015000000", 0x2e}], 0x1}, 0x0) 07:27:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:49 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x32, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9", 0x0}, 0x40) 07:27:49 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, 0x0, 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:49 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xdb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, 0x0, 0x0) 07:27:49 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000380)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000440)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b33cf18a8fe3cb5de821cbe5d0d07b836058b4906b44403297f7cbaea8705e98b08a45c04d3764a4f2893dcd035981c5f", 0xbb}, {&(0x7f00000007c0)="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", 0x18d}, {&(0x7f0000001340)="f15c93cb35c215fe339d1e9060c5b23e77cb58a87329a00288504db389cc6e395885fa906ac30eeae99fa388c31b5717e641e1586a90961b5f99b26c939d944f6cb1cf6817b7e51402a8459f9db642e97d3c05db56250a665d3ff188eb47e5b036d508aa5a5796fb8806b6a41487e0bfc3df087c18269bd7d2f477104c5d5db497ceaf3e1b11a5d63a2b7035dc69fa701f3b46fe701880800a7d38dccd4b3e8014aa15c96968359533ce2c5ffdd5f0d3297018bd7c025150940cdead92eb1e6bc6ba45eecf067b32425b6000b2f376ef9172426ae7fa97e5a84ef4dc540bbf5dd458ffcb75724135bd32fa04db6d6a75aedda7ab6e8501fc94", 0xf9}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480941ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0xfffffef1) 07:27:50 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x36, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7", 0x0}, 0x40) 07:27:50 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, 0x0, 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6611, 0x0) 07:27:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x8, 0x1a, 0x0, 0x1, [@AF_INET6={0x4}]}]}, 0x28}}, 0x0) 07:27:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x36, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7", 0x0}, 0x40) 07:27:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:50 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) 07:27:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000005000000350000000000000085000000070000009500000000000000e304af054132aa141f24e07066a0900ae5e8250b4c2e6cd9edce408f8cce94ad16692ec25ad4557744dfec822595f67ba12a75118870402a6168a8b18b0c6480fe0b28bf6dea34cfcd23ad3e9d5369787bd17ba1986400a6f2dc3d2139640774afc8e657991348d945697d57d21fc2f9418f3b3ebcb4c27b8c7e059595d229f012951953ccfc310c0f06b8aec467e6961bb20fde32b8959c58f8f36c3be6d63530ee9736697ca49165baf3667a4aeded18d7e5c7cdf0643a000000000000000000000000e70f641b9a156eb410e6109cce71e58dd7eceaa7bdce49936de1037c240515f946f7b32000fc28f1116c2c65c6894e321e7a82f8ed9e7b30f128233f2261e3ccd413dcc5d8452fc1944b3599ddb3e655a99a0c20078ea4abbd1260f2c45451a2429a9cdcd3bc04474e27592cbf2d59468607a9552f0eae5d35da51220dd2313306b47ea76237"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x36, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee7", 0x0}, 0x40) 07:27:50 executing program 1: syz_emit_ethernet(0x56, &(0x7f00000001c0)={@empty, @local, @void, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "428a23e292783b99c18146ad0600b76e93de8a23d070fe4803678146c5128827c7c3c856185fb69bcb980f5e1f805b2c6402de4ce1ba8f3d3f9c48ec53c6f941"}}}}, 0x0) 07:27:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) r4 = dup3(r3, r2, 0x0) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) recvfrom$packet(r4, &(0x7f0000000140)=""/169, 0xa9, 0x0, 0x0, 0x0) sendmmsg(r5, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) 07:27:51 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x38, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee72244", 0x0}, 0x40) 07:27:51 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) 07:27:51 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) 07:27:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) r4 = dup3(r3, r2, 0x0) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) recvfrom$packet(r4, &(0x7f0000000140)=""/169, 0xa9, 0x0, 0x0, 0x0) sendmmsg(r5, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) 07:27:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="8500000005000000350000000000000085000000070000009500000000000000e304af054132aa141f24e07066a0900ae5e8250b4c2e6cd9edce408f8cce94ad16692ec25ad4557744dfec822595f67ba12a75118870402a6168a8b18b0c6480fe0b28bf6dea34cfcd23ad3e9d5369787bd17ba1986400a6f2dc3d2139640774afc8e657991348d945697d57d21fc2f9418f3b3ebcb4c27b8c7e059595d229f012951953ccfc310c0f06b8aec467e6961bb20fde32b8959c58f8f36c3be6d63530ee9736697ca49165baf3667a4aeded18d7e5c7cdf0643a000000000000000000000000e70f641b9a156eb410e6109cce71e58dd7eceaa7bdce49936de1037c240515f946f7b32000fc28f1116c2c65c6894e321e7a82f8ed9e7b30f128233f2261e3ccd413dcc5d8452fc1944b3599ddb3e655a99a0c20078ea4abbd1260f2c45451a2429a9cdcd3bc04474e27592cbf2d59468607a9552f0eae5d35da51220dd2313306b47ea76237"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x38, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee72244", 0x0}, 0x40) 07:27:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f00000000c0)="008700003804000019000300e60100006c000000000000000200000002000000040000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 07:27:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:51 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x81000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) 07:27:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="d9c84c2a17d41632eea99f0d60b5", 0x0, 0x0, 0x0, 0x38, 0x0, &(0x7f0000000480)="e7f9b31be4d25495a36100a331600110f2a19b1217d1bcb1113c9e079aa4a717842752dd74be2d2909f27efe9f8519fa7db9d4d1fee72244", 0x0}, 0x40) 07:27:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) [ 212.685701][ T9797] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 212.743309][ T9797] EXT4-fs (loop1): bad geometry: first data block 0 is beyond end of filesystem (0) [ 212.861309][ T9797] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 212.874800][ T9797] EXT4-fs (loop1): bad geometry: first data block 0 is beyond end of filesystem (0) 07:27:51 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file1\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000200)="eb3c926d6b66732e706174001b04050002000270fff8", 0x16}], 0x1008000, 0x0) 07:27:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) r4 = dup3(r3, r2, 0x0) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) recvfrom$packet(r4, &(0x7f0000000140)=""/169, 0xa9, 0x0, 0x0, 0x0) sendmmsg(r5, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) 07:27:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:51 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept(r1, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x80000001) shutdown(r4, 0x2) 07:27:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f00000000c0)="008700003804000019000300e60100006c000000000000000200000002000000040000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 07:27:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:52 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept(r1, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x80000001) shutdown(r4, 0x2) [ 213.466272][ T9824] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 213.504011][ T9824] EXT4-fs (loop1): bad geometry: first data block 0 is beyond end of filesystem (0) 07:27:52 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = syz_open_dev$usbfs(0x0, 0x0, 0x0) r2 = dup2(r0, r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$MON_IOCH_MFLUSH(r2, 0x4018920a, 0x0) 07:27:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000000000000000050007"], 0x34}, 0x2}, 0x0) 07:27:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) r4 = dup3(r3, r2, 0x0) r5 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) recvfrom$packet(r4, &(0x7f0000000140)=""/169, 0xa9, 0x0, 0x0, 0x0) sendmmsg(r5, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) 07:27:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f00000000c0)="008700003804000019000300e60100006c000000000000000200000002000000040000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 213.850598][ T9854] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 213.859286][ T9854] EXT4-fs (loop1): bad geometry: first data block 0 is beyond end of filesystem (0) 07:27:52 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x10008100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='rootcontext=user_u#context,staff_u,defcontext']) 07:27:52 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept(r1, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x80000001) shutdown(r4, 0x2) 07:27:52 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x10008100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='rootcontext=user_u#context,staff_u,de,contexta']) 07:27:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f00000000c0)="008700003804000019000300e60100006c000000000000000200000002000000040000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 07:27:52 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) dup3(r3, r2, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r4, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) 07:27:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = dup2(r0, r1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="3000000001"], 0x30) [ 214.373622][ T9871] overlayfs: unrecognized mount option "rootcontext=user_u#context" or missing value 07:27:53 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="636f6e74657874ca"]) [ 214.428358][ T9875] overlayfs: unrecognized mount option "rootcontext=user_u#context" or missing value [ 214.448209][ T9870] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 214.493924][ T9870] EXT4-fs (loop1): bad geometry: first data block 0 is beyond end of filesystem (0) 07:27:53 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept(r1, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x80000001) shutdown(r4, 0x2) 07:27:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="008700003804000019000300e60100006c000000000000000200000002000000040000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 07:27:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='task\x00') getdents(r2, &(0x7f0000000040)=""/64, 0x40) getdents64(r2, &(0x7f0000000140)=""/104, 0x68) [ 214.627692][ T9892] overlayfs: unrecognized mount option "contextÊ" or missing value [ 214.643215][ T9895] overlayfs: unrecognized mount option "contextÊ" or missing value 07:27:53 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x10008100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000200)={[], [{@context={'context', 0x2c, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}], 0x22}) 07:27:53 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept(r1, 0x0, 0x0) shutdown(r4, 0x2) 07:27:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) 07:27:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000440)=""/215, 0xd7}, {&(0x7f0000000540)=""/102400, 0x19000}], 0x2, 0x0) [ 214.825993][ T9910] overlayfs: unrecognized mount option "context" or missing value 07:27:53 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept(r1, 0x0, 0x0) shutdown(r4, 0x2) 07:27:53 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000000c0)={{0x1}}) 07:27:53 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="008700003804000019000300e60100006c000000000000000200000002000000040000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 07:27:53 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x1, 0x0, 0x0, 0x0, 0x4}}) 07:27:53 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept(r1, 0x0, 0x0) shutdown(r4, 0x2) 07:27:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) dup3(r3, r2, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r4, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) 07:27:54 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x80000001) shutdown(0xffffffffffffffff, 0x2) 07:27:54 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="008700003804000019000300e60100006c000000000000000200000002000000040000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 07:27:54 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) write$FUSE_ATTR(r0, &(0x7f00000000c0)={0x78}, 0x78) 07:27:54 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c05, &(0x7f0000000300)) 07:27:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x415e, 0x0) write$uinput_user_dev(r1, &(0x7f00000004c0)={'syz0\x00'}, 0x45c) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) write$P9_RFSYNC(r2, &(0x7f0000000000)={0x7}, 0x7) 07:27:54 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x80000001) shutdown(0xffffffffffffffff, 0x2) [ 215.651823][ T9959] FAT-fs (loop2): bogus number of FAT sectors [ 215.658051][ T9959] FAT-fs (loop2): Can't find a valid FAT filesystem [ 215.755589][ T29] audit: type=1800 audit(1590305274.350:6): pid=9963 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16245 res=0 07:27:54 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="008700003804000019000300e60100006c000000000000000200000002000000040000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 07:27:54 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x881000, 0x0) r0 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x1) getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) sendto$packet(r2, &(0x7f0000000040)="10872134ecb43ac876f3ff24e13cf1414d6df2afdf515363e411cd5e74184f595528cfeaf2c56382c92f1cdad140a0c7017055e55f62b51988fda8070389da9ec98307b811ef45db5fc88863d26ae183f7a6f623e835ecea24d33359ed9ab699d645fbdfffdee3c687675f691dfe5fa7f8ae230e93765d48319847bc2ccd935b1ea94648ed8ea14a", 0x88, 0x4090, &(0x7f00000001c0)={0x11, 0x3, r3, 0x1, 0x2, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) write$cgroup_pid(r1, &(0x7f0000000600), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x275a, 0x0) writev(r4, &(0x7f0000000080)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r4, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) fsconfig$FSCONFIG_SET_FD(r4, 0x5, &(0x7f0000000200)='\x00', 0x0, r5) 07:27:54 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x80000001) shutdown(0xffffffffffffffff, 0x2) 07:27:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) dup3(r3, r2, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r4, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) 07:27:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="008700003804000019000300e60100006c000000000000000200000002000000040000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 07:27:55 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) r3 = accept(r1, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x80000001) shutdown(r3, 0x2) 07:27:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="008700003804000019000300e60100006c000000000000000200000002000000040000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 07:27:55 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x10008100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='rootcontext=user_u#cont\"xt,staff_u,defcontexta']) 07:27:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000280)=@raw={'raw\x00', 0xc01, 0x3, 0x1e0, 0x0, 0x5002004a, 0x0, 0x90, 0x0, 0x148, 0x3c8, 0x3c8, 0x148, 0x3c8, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11], 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ip={@broadcast, @rand_addr, 0x0, 0x0, 'erspan0\x00', 'veth0_macvtap\x00'}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x240) memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, 0x0) 07:27:55 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x881000, 0x0) r0 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x1) getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) sendto$packet(r2, &(0x7f0000000040)="10872134ecb43ac876f3ff24e13cf1414d6df2afdf515363e411cd5e74184f595528cfeaf2c56382c92f1cdad140a0c7017055e55f62b51988fda8070389da9ec98307b811ef45db5fc88863d26ae183f7a6f623e835ecea24d33359ed9ab699d645fbdfffdee3c687675f691dfe5fa7f8ae230e93765d48319847bc2ccd935b1ea94648ed8ea14a", 0x88, 0x4090, &(0x7f00000001c0)={0x11, 0x3, r3, 0x1, 0x2, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) write$cgroup_pid(r1, &(0x7f0000000600), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x275a, 0x0) writev(r4, &(0x7f0000000080)=[{&(0x7f00000000c0)='7', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r4, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) fsconfig$FSCONFIG_SET_FD(r4, 0x5, &(0x7f0000000200)='\x00', 0x0, r5) 07:27:55 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) r3 = accept(r1, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x80000001) shutdown(r3, 0x2) [ 216.620741][ T9993] overlayfs: unrecognized mount option "rootcontext=user_u#cont"xt" or missing value [ 216.716316][T10001] xt_CT: You must specify a L4 protocol and not use inversions on it [ 216.739831][T10002] xt_CT: You must specify a L4 protocol and not use inversions on it 07:27:55 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) 07:27:55 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x10008100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@nfs_export_off='nfs_export=off'}], [], 0x22}) 07:27:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:27:55 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) r3 = accept(r1, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x80000001) shutdown(r3, 0x2) 07:27:55 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = syz_open_dev$usbfs(0x0, 0x0, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x57, 0xa8, 0xa1, 0x40, 0x12d1, 0x1413, 0x0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xa8, 0x34, 0x1f}}]}}]}}, 0x0) r2 = dup2(r0, r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$MON_IOCH_MFLUSH(r2, 0x80089203, 0x0) 07:27:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) r4 = dup3(r3, r2, 0x0) r5 = socket(0x1e, 0x4, 0x0) recvfrom$packet(r4, &(0x7f0000000140)=""/169, 0xa9, 0x0, 0x0, 0x0) sendmmsg(r5, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) 07:27:55 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) write$uinput_user_dev(r1, &(0x7f0000000e00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffc]}, 0x45c) 07:27:55 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = accept(r1, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x80000001) shutdown(r2, 0x2) [ 217.309598][T10018] overlayfs: unrecognized mount option """ or missing value [ 217.318369][T10020] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 07:27:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 217.493800][T10037] input: syz0 as /devices/virtual/input/input5 [ 217.532284][T10031] ================================================================== [ 217.540590][T10031] BUG: KASAN: use-after-free in __mutex_lock+0x1033/0x13c0 [ 217.547795][T10031] Read of size 8 at addr ffff8880a7580150 by task syz-executor.0/10031 [ 217.556026][T10031] [ 217.557596][T10041] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 217.558383][T10031] CPU: 1 PID: 10031 Comm: syz-executor.0 Not tainted 5.7.0-rc6-next-20200522-syzkaller #0 [ 217.558402][T10031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.558408][T10031] Call Trace: [ 217.558428][T10031] dump_stack+0x18f/0x20d [ 217.558447][T10031] ? __mutex_lock+0x1033/0x13c0 [ 217.597244][T10031] ? __mutex_lock+0x1033/0x13c0 [ 217.602118][T10031] print_address_description.constprop.0.cold+0xd3/0x413 [ 217.609120][T10031] ? cdev_device_del+0x69/0x80 [ 217.613882][T10031] ? joydev_disconnect+0x3d/0xb0 [ 217.618816][T10031] ? __input_unregister_device+0x1b0/0x430 [ 217.624623][T10031] ? input_unregister_device+0xb4/0xf0 [ 217.630085][T10031] ? uinput_destroy_device+0x1e2/0x240 [ 217.635550][T10031] ? vprintk_func+0x97/0x1a6 [ 217.640147][T10031] ? __mutex_lock+0x1033/0x13c0 [ 217.644999][T10031] kasan_report.cold+0x1f/0x37 [ 217.649840][T10031] ? __mutex_lock+0x1033/0x13c0 [ 217.654672][T10031] __mutex_lock+0x1033/0x13c0 [ 217.659330][T10031] ? joydev_cleanup+0x21/0x190 [ 217.664079][T10031] ? print_usage_bug+0x240/0x240 [ 217.669005][T10031] ? trace_hardirqs_off+0x50/0x220 [ 217.674105][T10031] ? mutex_trylock+0x2c0/0x2c0 [ 217.678869][T10031] ? mark_held_locks+0x9f/0xe0 [ 217.683621][T10031] ? kfree+0x1eb/0x2b0 [ 217.687678][T10031] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 217.693694][T10031] ? kfree_const+0x51/0x60 [ 217.698104][T10031] ? joydev_cleanup+0x21/0x190 [ 217.702846][T10031] joydev_cleanup+0x21/0x190 [ 217.707446][T10031] joydev_disconnect+0x45/0xb0 [ 217.712204][T10031] __input_unregister_device+0x1b0/0x430 [ 217.717878][T10031] input_unregister_device+0xb4/0xf0 [ 217.723142][T10031] uinput_destroy_device+0x1e2/0x240 [ 217.728445][T10031] ? uinput_destroy_device+0x240/0x240 [ 217.733884][T10031] uinput_release+0x37/0x50 [ 217.738366][T10031] __fput+0x33e/0x880 [ 217.742352][T10031] task_work_run+0xf4/0x1b0 [ 217.746857][T10031] exit_to_usermode_loop+0x2fa/0x360 [ 217.752145][T10031] do_syscall_64+0x6b1/0x7d0 [ 217.756759][T10031] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 217.762646][T10031] RIP: 0033:0x416621 [ 217.766535][T10031] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 217.786138][T10031] RSP: 002b:00007ffd362e68f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 217.794554][T10031] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000416621 [ 217.802519][T10031] RDX: 0000000000000000 RSI: 00000000000000d0 RDI: 0000000000000004 [ 217.810477][T10031] RBP: 0000000000000001 R08: 00000000551800d0 R09: 00000000551800d4 [ 217.818433][T10031] R10: 00007ffd362e69e0 R11: 0000000000000293 R12: 00000000007955a8 [ 217.826393][T10031] R13: 00000000000351e9 R14: ffffffffffffffff R15: 000000000078bf0c [ 217.834353][T10031] [ 217.836661][T10031] Allocated by task 10037: [ 217.841069][T10031] save_stack+0x1b/0x40 [ 217.845209][T10031] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 217.850825][T10031] kmem_cache_alloc_trace+0x153/0x7d0 [ 217.856193][T10031] joydev_connect+0x83/0xd2f [ 217.860781][T10031] input_attach_handler+0x194/0x200 [ 217.865966][T10031] input_register_device.cold+0xf5/0x246 [ 217.871591][T10031] uinput_ioctl_handler.isra.0+0x1210/0x1d80 [ 217.877574][T10031] ksys_ioctl+0x11a/0x180 [ 217.881902][T10031] __x64_sys_ioctl+0x6f/0xb0 [ 217.886483][T10031] do_syscall_64+0xf6/0x7d0 [ 217.890970][T10031] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 217.896842][T10031] [ 217.899144][T10031] Freed by task 10031: [ 217.903198][T10031] save_stack+0x1b/0x40 [ 217.907351][T10031] __kasan_slab_free+0xf7/0x140 [ 217.912179][T10031] kfree+0x109/0x2b0 [ 217.916051][T10031] device_release+0x71/0x200 [ 217.920629][T10031] kobject_put+0x1c8/0x2f0 [ 217.925024][T10031] cdev_device_del+0x69/0x80 [ 217.929604][T10031] joydev_disconnect+0x3d/0xb0 [ 217.934355][T10031] __input_unregister_device+0x1b0/0x430 [ 217.939985][T10031] input_unregister_device+0xb4/0xf0 [ 217.945259][T10031] uinput_destroy_device+0x1e2/0x240 [ 217.950520][T10031] uinput_release+0x37/0x50 [ 217.954998][T10031] __fput+0x33e/0x880 [ 217.958965][T10031] task_work_run+0xf4/0x1b0 [ 217.963448][T10031] exit_to_usermode_loop+0x2fa/0x360 [ 217.968708][T10031] do_syscall_64+0x6b1/0x7d0 [ 217.973279][T10031] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 217.979151][T10031] [ 217.981458][T10031] The buggy address belongs to the object at ffff8880a7580000 [ 217.981458][T10031] which belongs to the cache kmalloc-8k of size 8192 [ 217.995589][T10031] The buggy address is located 336 bytes inside of [ 217.995589][T10031] 8192-byte region [ffff8880a7580000, ffff8880a7582000) [ 218.008956][T10031] The buggy address belongs to the page: [ 218.014593][T10031] page:ffffea00029d6000 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 head:ffffea00029d6000 order:2 compound_mapcount:0 compound_pincount:0 [ 218.029757][T10031] flags: 0xfffe0000010200(slab|head) [ 218.035023][T10031] raw: 00fffe0000010200 ffffea0001416608 ffffea000169c908 ffff8880aa0021c0 [ 218.043604][T10031] raw: 0000000000000000 ffff8880a7580000 0000000100000001 0000000000000000 [ 218.052170][T10031] page dumped because: kasan: bad access detected [ 218.058555][T10031] [ 218.060869][T10031] Memory state around the buggy address: [ 218.066498][T10031] ffff8880a7580000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 218.074537][T10031] ffff8880a7580080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 218.082582][T10031] >ffff8880a7580100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 07:27:56 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = accept(r1, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x80000001) shutdown(r2, 0x2) [ 218.090654][T10031] ^ [ 218.097305][T10031] ffff8880a7580180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 218.105341][T10031] ffff8880a7580200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 218.113386][T10031] ================================================================== [ 218.121424][T10031] Disabling lock debugging due to kernel taint [ 218.129189][ T2475] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 218.136773][T10031] Kernel panic - not syncing: panic_on_warn set ... 07:27:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) r4 = dup3(r3, r2, 0x0) r5 = socket(0x1e, 0x4, 0x0) recvfrom$packet(r4, &(0x7f0000000140)=""/169, 0xa9, 0x0, 0x0, 0x0) sendmmsg(r5, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)="ee", 0x101d0}], 0x1}}], 0x92, 0x0) 07:27:56 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) [ 218.143364][T10031] CPU: 1 PID: 10031 Comm: syz-executor.0 Tainted: G B 5.7.0-rc6-next-20200522-syzkaller #0 [ 218.154624][T10031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.164669][T10031] Call Trace: [ 218.167954][T10031] dump_stack+0x18f/0x20d [ 218.172286][T10031] ? __mutex_lock+0xf50/0x13c0 [ 218.177049][T10031] panic+0x2e3/0x75c [ 218.180939][T10031] ? __warn_printk+0xf3/0xf3 [ 218.185526][T10031] ? preempt_schedule_common+0x5e/0xc0 [ 218.190981][T10031] ? __mutex_lock+0x1033/0x13c0 [ 218.195822][T10031] ? __mutex_lock+0x1033/0x13c0 [ 218.200686][T10031] ? preempt_schedule_thunk+0x16/0x18 [ 218.206046][T10031] ? trace_hardirqs_on+0x55/0x230 [ 218.211060][T10031] ? __mutex_lock+0x1033/0x13c0 [ 218.215931][T10031] ? __mutex_lock+0x1033/0x13c0 [ 218.220764][T10031] end_report+0x4d/0x53 [ 218.224951][T10031] kasan_report.cold+0xd/0x37 [ 218.229719][T10031] ? __mutex_lock+0x1033/0x13c0 [ 218.234558][T10031] __mutex_lock+0x1033/0x13c0 [ 218.239312][T10031] ? joydev_cleanup+0x21/0x190 [ 218.244053][T10031] ? print_usage_bug+0x240/0x240 [ 218.248966][T10031] ? trace_hardirqs_off+0x50/0x220 [ 218.254051][T10031] ? mutex_trylock+0x2c0/0x2c0 [ 218.258833][T10031] ? mark_held_locks+0x9f/0xe0 [ 218.263580][T10031] ? kfree+0x1eb/0x2b0 [ 218.267632][T10031] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 218.273585][T10031] ? kfree_const+0x51/0x60 [ 218.277975][T10031] ? joydev_cleanup+0x21/0x190 [ 218.282712][T10031] joydev_cleanup+0x21/0x190 [ 218.287295][T10031] joydev_disconnect+0x45/0xb0 [ 218.292044][T10031] __input_unregister_device+0x1b0/0x430 [ 218.297653][T10031] input_unregister_device+0xb4/0xf0 [ 218.302910][T10031] uinput_destroy_device+0x1e2/0x240 [ 218.308181][T10031] ? uinput_destroy_device+0x240/0x240 [ 218.313613][T10031] uinput_release+0x37/0x50 [ 218.318092][T10031] __fput+0x33e/0x880 [ 218.322047][T10031] task_work_run+0xf4/0x1b0 [ 218.326527][T10031] exit_to_usermode_loop+0x2fa/0x360 [ 218.331797][T10031] do_syscall_64+0x6b1/0x7d0 [ 218.336363][T10031] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 218.342239][T10031] RIP: 0033:0x416621 [ 218.346109][T10031] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 218.365691][T10031] RSP: 002b:00007ffd362e68f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 218.374091][T10031] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000416621 [ 218.382051][T10031] RDX: 0000000000000000 RSI: 00000000000000d0 RDI: 0000000000000004 [ 218.390180][T10031] RBP: 0000000000000001 R08: 00000000551800d0 R09: 00000000551800d4 [ 218.398126][T10031] R10: 00007ffd362e69e0 R11: 0000000000000293 R12: 00000000007955a8 [ 218.406082][T10031] R13: 00000000000351e9 R14: ffffffffffffffff R15: 000000000078bf0c [ 218.415383][T10031] Kernel Offset: disabled [ 218.419699][T10031] Rebooting in 86400 seconds..