AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMBrujx88RYRRaQuU6Tx5uf0HhEfkbZtO/q8ZbE7H5uve872h0nO75j+lhFRRtHHOQAAvau6zbFa18u/vP95B3mHeat5Uy+e+WkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACu7NyxalNRGADgk7SJVidHK4jgoIuNTaxGyOJQ6C4IuoU2lmKqkmZoS5c+gejk6ivYTV/BFxActODg0EHBRZBIkpv0hAZJUXJT/T747/17KeeekyHw3//cAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCxHOyGs708E0KYnT7M295/3Vkedn777MNsL77ceXMxHrM9RC6E8HCtXrs+xrVMuo2t7UfVer3WkEgkkn6S9jcTAAAnRavVah29mokq+K5cEu2rn3J7S53/qoTQejVY/1+J8vCb+v/zy/MXevFz810zvldc/8//7QWfYIXm+tPCxtb2tbX16mpttfa4VCou3Fy4cftWsdB5VlLwxAQAAIA/k08irv+zlaP9/zNRHkas/+8tPrgf32tK/T/UYdMv7ZkAAAD8385d+v4tM+R6Jp8Pm9VmszHfPfb/LnaPKUz12E4lEdf/U5W0ZwUAAACMw8FuZqD/vxLlYcT+/9zrnf14zKkQwkzS/59bflJfGd9yJto4XidOe40AAACkayaJuP+f6+z/z/a3PGRDCFcvd/PkZwBHqv8/vrg78NJ6vP+/NL4lTqRsuft5dM7lEKbLac8IAACAf9npJNrF/n5ub6nx4/li3v5/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4Bc79o8SPRAFAPxLsvmsxAULUSsvIIoWVgsWgtgIXkEUBE8ggnoAsdTSO1h6h60VBLGw3EJPIDM7g8taaJX45/eD2fdmWDIvkyYvAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHxqsP6eV+GnO8zLtHb3crwb4v1YDJ6vZufDCHnRZNE/ULHWdgUAAAD8dt3U21dp/lTfbIZY9mL/X+f/hZ7/enKY535+vO/P8fbiYS73/yfbC0ejm4V9wkX3Dw73lhq7y+9v6uPS5c7jyuvp6kyaduLJx28vVXwg5dbZ9KCO51mc9/sb/2M60XDhAMCXLeaYkvw+FOJym4UB8Gd00vg30v9XvXZrAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGjCWwAAAP//fVhvZA==") bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x0, 0x0, 0x0, 0x0, 0x1800, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x100000011, 0xff0f0000, 0x2811fdff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000000)=ANY=[], 0x208e24b) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 22:56:55 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:f']) r1 = socket$netlink(0x10, 0x3, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="020000000100000000000000846ab3de0000000008000000", @ANYRES32=0x0, @ANYBLOB="10000400000000002000000000000000"], 0x2c, 0x0) lchown(&(0x7f0000000340)='./bus\x00', r2, 0x0) mkdir(&(0x7f0000000280)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)=ANY=[]) pivot_root(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./bus\x00') chdir(&(0x7f00000001c0)='./bus\x00') r4 = syz_mount_image$btrfs(&(0x7f0000005100), &(0x7f0000005140)='./bus\x00', 0x80, &(0x7f0000001180)={[{@user_subvol_rm}, {@noinode_cache}, {@inode_cache}, {@commit={'commit', 0x3d, 0x251390b6}}, {@compress}, {@commit={'commit', 0x3d, 0x2}}, {@ssd_spread}]}, 0x1, 0x50ef, &(0x7f000000a2c0)="$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") r5 = open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r6 = getpid() mount(&(0x7f0000000100)=@md0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000680)='sysfs\x00', 0x24, &(0x7f00000006c0)='fsname') ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0xffff, 0xb1c, 0x7, 0x9, 0x9, r6}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000440)="e6c25008f03cff47dd5da1006403a4f431f6982a314a3c7a5f47a58902e138ae0be4c22c87b8c1b8e6098dfcec13caa46eac833cd0200af5ca9e36901fcf5f55dbe77c0e51efdb6037b33f3f599866ccf900b0d0f1228d2cd01e92f7396e7580b555ea0b4db91f4f6e89368a4913d1851c45d1fe39cc3f90178e79c7ecaa64", 0x7f}, {&(0x7f00000004c0)="aec7", 0x2}, {&(0x7f00000008c0)="9b5aaefe82882985822e2fada2d8b3080ec3f41717a543e058b1ce6fe521417564ddd42347fc2da3615d39e9fce68ce109a8df5da34e4b6f0fd6e74ca7a387ebdc4ca934be3ff1dc141cca74c9148443c0e123eff409e2bbb695c644e55e496be5af274a4dd84f66442b59770129be5625f7c4ddc5b41818f2735dc0253bfa26d6148c31036fd8d12f2056ace9e1f9cb2c8a0c0c54000a77de8e36feaf35613348d9120db2981fe88d355dce563c6c22b11abf3c", 0xb4}, {&(0x7f0000000600)="a35984d0fd7215069a376379a37fff06e0bd288024b172b30b2e9108ca7ea0ee782889edf930359b081c5f1b13f59ed196a78bfac740a0a2dfe9162bac8fb15a5bcf2d767edfd8cdeb5b57731f06", 0x4e}, {&(0x7f0000000c00)}, {&(0x7f0000000cc0)="5bc5f2a32798a37bfeca7bcbb24fffe3c3b6f98d033ed52e113ef670be45e85c547372cd147e4950a64d1ba3f9e6e75665", 0x31}], 0x6, &(0x7f0000001100)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}], 0xc0, 0x40}, 0x40140) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) mount$fuse(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000640), 0x20, &(0x7f0000000980)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x100}}, {@allow_other}, {@allow_other}], [{@audit}, {@dont_appraise}, {@dont_hash}, {@fsname={'fsname', 0x3d, 'btrfs\x00'}}, {@fowner_gt}, {@euid_eq}, {@subj_type={'subj_type', 0x3d, 'blksize'}}]}}) dup2(r5, r4) write$binfmt_elf64(r5, &(0x7f0000000700)=ANY=[], 0x1001) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r3, &(0x7f00000005c0)={0x30000011}) 22:56:55 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cgroup.events\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6d) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xff01) r3 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0x9362, 0x0) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10003, 0x400000000000000) 22:56:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x1f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40087602, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000100)=0x1) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffe000) 22:56:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000001840)={&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000001700)=[@ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_retopts={{0x10}}], 0x28}, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000080)={r0}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x200400, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) 22:56:55 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x15, 0x40000002, 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x10000, &(0x7f0000000200)={[{@nfs_export_off}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@nfs_export_off}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@index_on}], [{@func={'func', 0x3d, 'POLICY_CHECK'}}, {@obj_type}, {@audit}]}) umount2(&(0x7f0000000080)='./file0\x00', 0x0) unlink(&(0x7f0000000280)='./file0\x00') 22:56:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000001840)={&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000001700)=[@ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_retopts={{0x10}}], 0x28}, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000080)={r0}) (async) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x200400, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) [ 324.588316] overlayfs: unrecognized mount option "func=POLICY_CHECK" or missing value [ 324.683156] overlayfs: failed to resolve 'f': -2 22:56:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000001840)={&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000001700)=[@ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_retopts={{0x10}}], 0x28}, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000080)={r0}) (async) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x200400, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) 22:56:55 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devtmpfs\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x15, 0x40000002, 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') (async) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x10000, &(0x7f0000000200)={[{@nfs_export_off}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@nfs_export_off}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@index_on}], [{@func={'func', 0x3d, 'POLICY_CHECK'}}, {@obj_type}, {@audit}]}) (async) umount2(&(0x7f0000000080)='./file0\x00', 0x0) unlink(&(0x7f0000000280)='./file0\x00') 22:56:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x1f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40087602, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000100)=0x1) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_int(r0, &(0x7f0000000000), 0xffe000) [ 324.832580] overlayfs: missing 'lowerdir' 22:56:55 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x11, 0x0, 0x0, 0x81}, 0x48) 22:56:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="600000000302", @ANYRES32], 0x60}}, 0x0) [ 324.883413] overlayfs: unrecognized mount option "func=POLICY_CHECK" or missing value [ 324.983003] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. [ 325.222600] BTRFS info (device loop4): enabling inode map caching [ 325.234762] BTRFS warning (device loop4): excessive commit interval 622039222 [ 325.248014] BTRFS info (device loop4): use zlib compression, level 3 [ 325.262028] BTRFS info (device loop4): enabling ssd optimizations [ 325.269559] BTRFS info (device loop4): using spread ssd allocation scheme [ 325.282496] BTRFS info (device loop4): using free space tree [ 325.298883] BTRFS info (device loop4): has skinny extents [ 325.355521] audit: type=1800 audit(1671404216.282:13): pid=13966 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="loop4" ino=263 res=0 [ 325.535084] F2FS-fs (loop1): Test dummy encryption mount option ignored [ 325.553958] F2FS-fs (loop1): Test dummy encryption mount option ignored [ 325.564401] F2FS-fs (loop1): invalid crc value [ 325.594643] F2FS-fs (loop1): Found nat_bits in checkpoint [ 325.625891] F2FS-fs (loop1): Mounted with checkpoint version = 48b305e4 [ 325.636667] audit: type=1800 audit(1671404216.572:14): pid=13951 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="loop1" ino=10 res=0 22:56:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0x50, 0x1, 0x2, 0xc39e8c4c55764601, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0x8, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x50}}, 0x0) 22:56:56 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x15, 0x40000002, 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x10000, &(0x7f0000000200)={[{@nfs_export_off}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@nfs_export_off}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@index_on}], [{@func={'func', 0x3d, 'POLICY_CHECK'}}, {@obj_type}, {@audit}]}) umount2(&(0x7f0000000080)='./file0\x00', 0x0) unlink(&(0x7f0000000280)='./file0\x00') mkdir(&(0x7f0000000100)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devtmpfs\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) fanotify_init(0x0, 0x0) (async) fanotify_mark(r0, 0x15, 0x40000002, 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') (async) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x10000, &(0x7f0000000200)={[{@nfs_export_off}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@nfs_export_off}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@index_on}], [{@func={'func', 0x3d, 'POLICY_CHECK'}}, {@obj_type}, {@audit}]}) (async) umount2(&(0x7f0000000080)='./file0\x00', 0x0) (async) unlink(&(0x7f0000000280)='./file0\x00') (async) 22:56:56 executing program 1: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x2, 0x17, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 22:56:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x1f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40087602, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000100)=0x1) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffe000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x1f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40087602, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000100)=0x1) (async) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_int(r0, &(0x7f0000000000), 0xffe000) (async) 22:56:56 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000280), 0x1a1000, 0x0) 22:56:56 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) (async) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:f']) (async) r1 = socket$netlink(0x10, 0x3, 0x0) (async) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) (async) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="020000000100000000000000846ab3de0000000008000000", @ANYRES32=0x0, @ANYBLOB="10000400000000002000000000000000"], 0x2c, 0x0) lchown(&(0x7f0000000340)='./bus\x00', r2, 0x0) mkdir(&(0x7f0000000280)='./bus\x00', 0x0) (async) r3 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) (async, rerun: 32) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)=ANY=[]) (async, rerun: 32) pivot_root(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./bus\x00') (async, rerun: 64) chdir(&(0x7f00000001c0)='./bus\x00') (async, rerun: 64) r4 = syz_mount_image$btrfs(&(0x7f0000005100), &(0x7f0000005140)='./bus\x00', 0x80, &(0x7f0000001180)={[{@user_subvol_rm}, {@noinode_cache}, {@inode_cache}, {@commit={'commit', 0x3d, 0x251390b6}}, {@compress}, {@commit={'commit', 0x3d, 0x2}}, {@ssd_spread}]}, 0x1, 0x50ef, &(0x7f000000a2c0)="$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") (async, rerun: 64) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) (rerun: 64) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) (async) r6 = getpid() mount(&(0x7f0000000100)=@md0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000680)='sysfs\x00', 0x24, &(0x7f00000006c0)='fsname') (async, rerun: 32) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0xffff, 0xb1c, 0x7, 0x9, 0x9, r6}) (async, rerun: 32) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000440)="e6c25008f03cff47dd5da1006403a4f431f6982a314a3c7a5f47a58902e138ae0be4c22c87b8c1b8e6098dfcec13caa46eac833cd0200af5ca9e36901fcf5f55dbe77c0e51efdb6037b33f3f599866ccf900b0d0f1228d2cd01e92f7396e7580b555ea0b4db91f4f6e89368a4913d1851c45d1fe39cc3f90178e79c7ecaa64", 0x7f}, {&(0x7f00000004c0)="aec7", 0x2}, {&(0x7f00000008c0)="9b5aaefe82882985822e2fada2d8b3080ec3f41717a543e058b1ce6fe521417564ddd42347fc2da3615d39e9fce68ce109a8df5da34e4b6f0fd6e74ca7a387ebdc4ca934be3ff1dc141cca74c9148443c0e123eff409e2bbb695c644e55e496be5af274a4dd84f66442b59770129be5625f7c4ddc5b41818f2735dc0253bfa26d6148c31036fd8d12f2056ace9e1f9cb2c8a0c0c54000a77de8e36feaf35613348d9120db2981fe88d355dce563c6c22b11abf3c", 0xb4}, {&(0x7f0000000600)="a35984d0fd7215069a376379a37fff06e0bd288024b172b30b2e9108ca7ea0ee782889edf930359b081c5f1b13f59ed196a78bfac740a0a2dfe9162bac8fb15a5bcf2d767edfd8cdeb5b57731f06", 0x4e}, {&(0x7f0000000c00)}, {&(0x7f0000000cc0)="5bc5f2a32798a37bfeca7bcbb24fffe3c3b6f98d033ed52e113ef670be45e85c547372cd147e4950a64d1ba3f9e6e75665", 0x31}], 0x6, &(0x7f0000001100)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}], 0xc0, 0x40}, 0x40140) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) mount$fuse(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000640), 0x20, &(0x7f0000000980)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x100}}, {@allow_other}, {@allow_other}], [{@audit}, {@dont_appraise}, {@dont_hash}, {@fsname={'fsname', 0x3d, 'btrfs\x00'}}, {@fowner_gt}, {@euid_eq}, {@subj_type={'subj_type', 0x3d, 'blksize'}}]}}) dup2(r5, r4) write$binfmt_elf64(r5, &(0x7f0000000700)=ANY=[], 0x1001) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r3, &(0x7f00000005c0)={0x30000011}) 22:56:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, 0x0, 0x2e}, 0x20) [ 325.843077] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 325.874126] overlayfs: unrecognized mount option "func=POLICY_CHECK" or missing value [ 325.877412] overlayfs: failed to resolve 'f': -2 [ 325.884588] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 22:56:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="600000001000050000000000000000000a000008080009400000000844"], 0x60}}, 0x0) 22:56:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0x58, 0x1, 0x2, 0xc39e8c4c55764601, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x44, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x58}}, 0x0) 22:56:56 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) (async, rerun: 32) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:f']) (async, rerun: 32) r1 = socket$netlink(0x10, 0x3, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) (async) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="020000000100000000000000846ab3de0000000008000000", @ANYRES32=0x0, @ANYBLOB="10000400000000002000000000000000"], 0x2c, 0x0) (async) lchown(&(0x7f0000000340)='./bus\x00', r2, 0x0) (async) mkdir(&(0x7f0000000280)='./bus\x00', 0x0) (async, rerun: 32) r3 = creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) (async, rerun: 32) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)=ANY=[]) (async, rerun: 32) pivot_root(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./bus\x00') (rerun: 32) chdir(&(0x7f00000001c0)='./bus\x00') (async, rerun: 32) r4 = syz_mount_image$btrfs(&(0x7f0000005100), &(0x7f0000005140)='./bus\x00', 0x80, &(0x7f0000001180)={[{@user_subvol_rm}, {@noinode_cache}, {@inode_cache}, {@commit={'commit', 0x3d, 0x251390b6}}, {@compress}, {@commit={'commit', 0x3d, 0x2}}, {@ssd_spread}]}, 0x1, 0x50ef, &(0x7f000000a2c0)="$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") (async, rerun: 32) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) (async) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) (async) r6 = getpid() mount(&(0x7f0000000100)=@md0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000680)='sysfs\x00', 0x24, &(0x7f00000006c0)='fsname') (async) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)={'\x00', 0xffff, 0xb1c, 0x7, 0x9, 0x9, r6}) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000440)="e6c25008f03cff47dd5da1006403a4f431f6982a314a3c7a5f47a58902e138ae0be4c22c87b8c1b8e6098dfcec13caa46eac833cd0200af5ca9e36901fcf5f55dbe77c0e51efdb6037b33f3f599866ccf900b0d0f1228d2cd01e92f7396e7580b555ea0b4db91f4f6e89368a4913d1851c45d1fe39cc3f90178e79c7ecaa64", 0x7f}, {&(0x7f00000004c0)="aec7", 0x2}, {&(0x7f00000008c0)="9b5aaefe82882985822e2fada2d8b3080ec3f41717a543e058b1ce6fe521417564ddd42347fc2da3615d39e9fce68ce109a8df5da34e4b6f0fd6e74ca7a387ebdc4ca934be3ff1dc141cca74c9148443c0e123eff409e2bbb695c644e55e496be5af274a4dd84f66442b59770129be5625f7c4ddc5b41818f2735dc0253bfa26d6148c31036fd8d12f2056ace9e1f9cb2c8a0c0c54000a77de8e36feaf35613348d9120db2981fe88d355dce563c6c22b11abf3c", 0xb4}, {&(0x7f0000000600)="a35984d0fd7215069a376379a37fff06e0bd288024b172b30b2e9108ca7ea0ee782889edf930359b081c5f1b13f59ed196a78bfac740a0a2dfe9162bac8fb15a5bcf2d767edfd8cdeb5b57731f06", 0x4e}, {&(0x7f0000000c00)}, {&(0x7f0000000cc0)="5bc5f2a32798a37bfeca7bcbb24fffe3c3b6f98d033ed52e113ef670be45e85c547372cd147e4950a64d1ba3f9e6e75665", 0x31}], 0x6, &(0x7f0000001100)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}], 0xc0, 0x40}, 0x40140) (async, rerun: 64) r7 = socket$inet_udplite(0x2, 0x2, 0x88) (rerun: 64) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) mount$fuse(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000640), 0x20, &(0x7f0000000980)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x100}}, {@allow_other}, {@allow_other}], [{@audit}, {@dont_appraise}, {@dont_hash}, {@fsname={'fsname', 0x3d, 'btrfs\x00'}}, {@fowner_gt}, {@euid_eq}, {@subj_type={'subj_type', 0x3d, 'blksize'}}]}}) dup2(r5, r4) (async, rerun: 32) write$binfmt_elf64(r5, &(0x7f0000000700)=ANY=[], 0x1001) (rerun: 32) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r3, &(0x7f00000005c0)={0x30000011}) [ 325.916287] overlayfs: missing 'lowerdir' [ 325.921141] overlayfs: missing 'lowerdir' [ 325.945936] overlayfs: unrecognized mount option "func=POLICY_CHECK" or missing value 22:56:56 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000c80)) 22:56:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, 0x0) 22:56:57 executing program 2: ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, 0x0) 22:56:57 executing program 3: syz_genetlink_get_family_id$tipc2(&(0x7f0000000e00), 0xffffffffffffffff) 22:56:57 executing program 1: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000006c0)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000e09000/0x4000)=nil, &(0x7f0000d9d000/0x4000)=nil, &(0x7f0000dc9000/0x3000)=nil, &(0x7f0000f94000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00003fe000/0xc00000)=nil, 0x0}, 0x68) 22:56:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x1c}}, 0x0) 22:56:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000096fdeb"], 0x14}}, 0x0) 22:56:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='}'], 0x14}}, 0x0) 22:56:57 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) getsockname$packet(r0, 0x0, 0x0) 22:56:57 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, 0x0, 0x0) 22:56:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x14}, 0x14}}, 0x0) 22:56:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0xffffffffffffffa2, 0x0, 0x0, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x50, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, @MPTCP_PM_ADDR_ATTR_ID={0x5}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}]}, 0x6c}}, 0x0) 22:56:57 executing program 5: r0 = socket(0x10, 0x400000000080803, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000480)=@ethtool_ringparam={0x4}}) 22:56:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000300)={@multicast1, @loopback, 0x0, 0x1, [@private]}, 0x5000) 22:56:57 executing program 2: shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) 22:56:57 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)) 22:56:57 executing program 3: socketpair(0x22, 0x3, 0x0, &(0x7f0000000c80)) 22:56:57 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000440), 0x22a480, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, 0x0) 22:56:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'pim6reg0\x00', 0x1fdcc924e3b92dda}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) 22:56:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) dup2(r2, r0) 22:56:57 executing program 1: rseq(&(0x7f0000000100), 0x20, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) 22:56:57 executing program 0: r0 = epoll_create1(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0xa9aaaa0a, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000200)={0x60000015}) 22:56:57 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'pim6reg0\x00', 0x1fdcc924e3b92dda}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000180)=0x1) 22:56:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x8}, {0x0, 0x4}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000180)=""/145, 0x3d, 0x91, 0x1}, 0x20) 22:56:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x488, 0x0, 0x9403, 0x5, 0x0, 0x2c0, 0x3b8, 0x3d8, 0x3d8, 0x3b8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@local, @mcast1, [], [], 'macvlan0\x00', 'veth0_to_bond\x00'}, 0x0, 0x298, 0x2c0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x4, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @common=@inet=@SET1={0x28}}, {{@ipv6={@private2, @mcast2, [], [], 'veth1_to_bond\x00', 'rose0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffe}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) 22:56:57 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003500)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000000", 0x41d) 22:56:57 executing program 3: mlock2(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x0) munmap(&(0x7f0000ff6000/0xa000)=nil, 0xa000) 22:56:57 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x2b) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x2bb98205) splice(r0, 0x0, r2, 0x0, 0x4ff97, 0x0) 22:56:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0xab) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0e00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)=@newtfilter={0x4c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0x3}, {}, {0xfff3}}, [@filter_kind_options=@f_fw={{0x7}, {0x20, 0x2, [@TCA_FW_INDEV={0x14, 0x3, 'bridge_slave_0\x00'}, @TCA_FW_MASK={0x8}]}}]}, 0x4c}}, 0x0) 22:56:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) dup2(r2, r0) 22:56:57 executing program 5: ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, &(0x7f0000003080)) getrusage(0x0, &(0x7f0000003440)) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, 0x0) 22:56:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[], 0x38}}, 0x0) 22:56:57 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x5452, &(0x7f0000000100)={'ip6gre0\x00', 0x0}) 22:56:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x310, 0x130, 0x9403, 0x5, 0x130, 0x2c0, 0x240, 0x3d8, 0x3d8, 0x240, 0x3d8, 0x3, 0x0, {[{{@ipv6={@local, @mcast1, [], [], 'macvlan0\x00', 'veth0_to_bond\x00'}, 0x0, 0xf8, 0x130, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@connlabel={{0x28}}]}, @common=@inet=@SET3={0x38}}, {{@ipv6={@remote, @dev, [], [], 'veth1_to_bond\x00', 'rose0\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x370) 22:56:57 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@multicast, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30}, @source_quench={0x12, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}}}, 0x0) 22:56:57 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_writev(0x0, &(0x7f0000003400)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) [ 327.020407] Cannot find add_set index 0 as target 22:56:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)={0x50, 0x14, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x25, 0x1, "2218d49b918e4620c080f8d09d43ea72257efc2e6031dfbebf5dafa838668b63dc"}, @INET_DIAG_REQ_BYTECODE={0x11, 0x1, "9a1ded95f1c81dcaac39bdad2c"}]}, 0x50}}, 0x0) 22:56:58 executing program 2: syz_open_dev$vcsu(&(0x7f0000000000), 0xffffffffffffffff, 0x0) 22:56:58 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, 0xffffffffffffffff, 0x0) 22:56:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000004a40)) 22:56:58 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) 22:56:58 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4008af00, 0x0) 22:56:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={r0, 0xffffffffffffffff}) fcntl$setlease(r0, 0x6, 0x20000000) 22:56:58 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x890b, &(0x7f0000000000)={'batadv_slave_0\x00'}) 22:56:58 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x200242, 0x0) fcntl$setlease(r0, 0x406, 0x0) 22:56:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:56:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000020087a000000000ffffff7f1816"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0x9c, &(0x7f0000000100)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:56:58 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:56:58 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xa}, 0x48) 22:56:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x4d) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001140)={@local, @loopback, @private1, 0x0, 0x0, 0x8}) 22:56:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xf4206, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:56:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x894c, 0x0) 22:56:58 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xb64, 0x0) mmap$usbfs(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) 22:56:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001400)={0x18, 0x3, &(0x7f0000000280)=@framed, &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:56:58 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x4, 0x0, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:56:58 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RREAD(r1, &(0x7f00000001c0)={0xb}, 0xb) read$usbfs(r0, &(0x7f0000000080)=""/152, 0x98) 22:56:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x4c, 0x12, 0x1}, 0x4c}}, 0x0) 22:56:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:56:58 executing program 5: keyctl$KEYCTL_WATCH_KEY(0xb, 0x0, 0xffffffffffffffff, 0x0) 22:56:58 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x4020940d, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @local}}) [ 327.981789] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. 22:56:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 22:56:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:56:58 executing program 3: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000040)=[@dead_binder_done, @clear_death, @increfs_done, @enter_looper], 0x0, 0x0, 0x0}) 22:56:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005440)={&(0x7f0000003500), 0xc, &(0x7f0000005400)={0x0}}, 0x8001) 22:56:59 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) 22:56:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup2(r0, r0) utimensat(r1, 0x0, &(0x7f0000000480)={{}, {0x77359400}}, 0x0) 22:56:59 executing program 3: r0 = socket(0x11, 0x3, 0x0) accept4$inet6(r0, 0x0, 0x0, 0x0) 22:56:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000000)=0x2, 0x4) fcntl$setlease(r0, 0x6, 0x20000000) 22:56:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:56:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) dup3(r0, r1, 0x0) 22:56:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000000)={'gre0\x00', &(0x7f00000000c0)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 22:56:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000001200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:56:59 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) 22:56:59 executing program 5: socket$inet6(0xa, 0x0, 0x931f) 22:56:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x5411, 0x0) 22:56:59 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x800c0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000006c0)) 22:56:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)={0x14}, 0x14}, 0x8}, 0x0) 22:56:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) sendmmsg$inet6(r0, &(0x7f00000015c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 22:56:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x4c, 0x12, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x263d}}}, 0x4c}}, 0x0) 22:56:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x10, 0x20000000) 22:56:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x10, 0x1ffff000) 22:56:59 executing program 5: syz_open_dev$loop(&(0x7f00000000c0), 0xfffffffffffffff8, 0x4000) 22:56:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)=ANY=[]}) 22:56:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000400)) 22:56:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, 0x0) 22:56:59 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{}, {0x0, 0x3938700}}, 0x0) [ 328.348496] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. 22:56:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x1276, 0x0) 22:56:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8922, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:56:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup2(r0, r0) utimensat(r1, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) 22:56:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0xf4240, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:56:59 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 22:56:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'tunl0\x00', 0x0}) 22:56:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8931, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:56:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x9) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000080)={'wg1\x00'}) [ 328.524561] sit0: mtu less than device minimum 22:56:59 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:56:59 executing program 3: sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x5, 0x20000000) 22:56:59 executing program 1: sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000002d00)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x5, 0x20000000) 22:56:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x4c, 0x10, 0x1}, 0x4c}}, 0x0) 22:56:59 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x1262, 0x0) 22:56:59 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x89a0, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @local}}) 22:56:59 executing program 1: socket(0x10, 0x0, 0x7793) 22:56:59 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x17, 0x0, 0x0, 0x2}, 0x48) 22:56:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000140)={0xffffffffffffffff, 0x2, &(0x7f0000000100)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 22:56:59 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x800, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000380)=[@reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000440)='.'}) [ 328.666649] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. 22:56:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x0, 0x0, 0x9}, 0x48) 22:56:59 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x84c02) write$binfmt_elf64(r0, 0x0, 0x0) 22:56:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt(r0, 0x1, 0x9, &(0x7f0000000000)="87da2453", 0x4) 22:56:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f0000004c00)=[{{&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/64}, {&(0x7f0000000140)=""/125}, {&(0x7f00000001c0)=""/112}, {&(0x7f0000000240)=""/52}, {&(0x7f0000000280)=""/97}, {&(0x7f0000000300)=""/151}, {&(0x7f00000003c0)=""/241}, {&(0x7f00000004c0)=""/27}, {&(0x7f00000005c0)=""/212}], 0x0, &(0x7f0000000780)=""/100}}, {{&(0x7f0000000880)=@ieee802154={0x24, @long}, 0x0, &(0x7f0000000e80)=[{&(0x7f00000015c0)=""/4096}, {&(0x7f0000000900)=""/141}, {&(0x7f00000009c0)=""/107}, {&(0x7f0000000a40)=""/231}, {&(0x7f0000000b40)=""/175}, {&(0x7f0000000c00)=""/197}, {&(0x7f0000000d00)=""/41}, {&(0x7f0000000dc0)=""/180}], 0x0, &(0x7f0000000f00)=""/251}}, {{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000025c0)=""/4096}, {&(0x7f0000001000)=""/244}, {&(0x7f00000035c0)=""/4096}, {&(0x7f0000000d40)=""/2}, {&(0x7f0000001100)=""/33}], 0x0, &(0x7f00000011c0)=""/30}}, {{&(0x7f0000001200)=@l2tp={0x2, 0x0, @dev}, 0x0, &(0x7f00000012c0)=[{&(0x7f0000001280)=""/49}], 0x0, &(0x7f0000001300)=""/137}}, {{&(0x7f00000013c0)=@xdp, 0x0, &(0x7f00000014c0)=[{&(0x7f0000001440)=""/91}], 0x0, &(0x7f0000001500)=""/41}}, {{0x0, 0x0, &(0x7f0000004a80)=[{&(0x7f0000001540)}, {&(0x7f00000045c0)=""/79}, {&(0x7f0000004640)=""/34}, {&(0x7f0000004680)=""/212}, {&(0x7f0000004780)=""/243}, {&(0x7f0000004880)=""/204}, {&(0x7f0000004980)=""/203}], 0x0, &(0x7f0000004b00)=""/223}}], 0x2c, 0x61, 0x0) 22:56:59 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000001640)={'wg1\x00'}) 22:56:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr(r0, &(0x7f0000000300)=@known='security.selinux\x00', &(0x7f0000000340)='[[/.(,\\V+%$,(&\\)+.\x00', 0x13, 0x0) 22:56:59 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, 0x0) 22:56:59 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127c, &(0x7f0000000080)) 22:56:59 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000020087a000000000ffffff7f181600008efc79edca"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0x9c, &(0x7f0000000100)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:56:59 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGFLAGS(r0, 0x40047452, 0x0) 22:56:59 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xb64, 0x0) mmap$usbfs(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x100000a, 0x13, r0, 0x0) 22:56:59 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGFLAGS(r0, 0x8983, 0x0) 22:56:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x891c, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:56:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x40c, 0x0) 22:56:59 executing program 1: r0 = eventfd2(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x400) dup3(r0, r1, 0x0) 22:56:59 executing program 2: pipe2(&(0x7f0000006980), 0x84000) 22:56:59 executing program 4: r0 = eventfd2(0x0, 0x0) fremovexattr(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="8b"]) 22:56:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8906, 0x0) 22:56:59 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6, 0x7013, r0, 0x0) 22:57:00 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xb64, 0x0) mmap$usbfs(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000001, 0x11, r0, 0x0) 22:57:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:00 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xb64, 0x121002) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 22:57:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x1268, &(0x7f0000000080)) 22:57:00 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001280), 0x0, 0x0) bind$bt_rfcomm(r0, 0x0, 0x0) 22:57:00 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127e, 0x0) 22:57:00 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x8142, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 22:57:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x408, 0x0) 22:57:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) sendmmsg$inet6(r0, &(0x7f00000015c0)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[@rthdr_2292={{0x18, 0x29, 0x39, {0x0, 0x0, 0x2}}}], 0x18}}], 0x1, 0x0) 22:57:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x1261, 0x0) 22:57:00 executing program 2: syz_open_dev$vcsu(&(0x7f0000000c40), 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 22:57:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x891d, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x14, 0x0, 0x0) 22:57:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x6, 0x1ffff000) 22:57:00 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x7, &(0x7f0000000000)=@framed={{}, [@map_fd={0x18, 0x3, 0x1, 0x0, 0x1}, @func, @func]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0x5b, &(0x7f00000000c0)=""/91, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:00 executing program 4: socket$netlink(0x10, 0x3, 0xef7778067285a601) 22:57:00 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x406, r0) 22:57:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip_vti0\x00', 0x0}) 22:57:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 22:57:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89b0, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:00 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x8, &(0x7f0000000000)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @func]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @multicast1}}}}) 22:57:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x40e, 0x0) 22:57:00 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127c, 0x0) 22:57:00 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x4, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0xd, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x2, 0x6, 0x7736, 0x7}, 0x10}, 0x80) 22:57:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001500)={0x11, 0xf, &(0x7f00000011c0)=ANY=[@ANYBLOB="180000000900000000000000c000000018000000040000000000000007000000d9030000100000001800000000010000000000000010000018510000050000000000000000000000850000009400000018240000", @ANYRES32, @ANYBLOB='\x00\x00\v'], &(0x7f0000001240)='syzkaller\x00', 0x4, 0xe3, &(0x7f0000001280)=""/227, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:00 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x5b, &(0x7f00000000c0)=""/91, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:00 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x8, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x7013, r0, 0x0) 22:57:00 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xb64, 0x0) read$usbfs(r0, &(0x7f0000000000)=""/19, 0x13) 22:57:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x1, &(0x7f0000000040)=@raw=[@exit], &(0x7f00000000c0)='GPL\x00', 0x5, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8902, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:00 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x16, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:00 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x89a1, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @local}}) 22:57:00 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) dup2(r0, 0xffffffffffffffff) 22:57:00 executing program 3: r0 = socket(0x11, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r0, r1, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r2, &(0x7f0000001fc0)={&(0x7f0000000e40), 0xc, &(0x7f0000001f80)={0x0}}, 0x0) 22:57:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8955, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8929, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x4c02, 0x0) 22:57:00 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xb64, 0x121002) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, &(0x7f00000018c0)) 22:57:00 executing program 2: request_key(&(0x7f0000000080)='id_resolver\x00', 0x0, 0x0, 0xfffffffffffffffa) 22:57:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB=','], 0x2c}}, 0x0) 22:57:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x0, 0xf4240, &(0x7f0000000080)=@framed={{}, [@exit]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x5, 0x0) 22:57:00 executing program 1: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0010078080000000000004864c12007000670000802f"]}) 22:57:00 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127d, 0x0) 22:57:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x4c, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x2c00}}}, 0x4c}}, 0x0) 22:57:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x5452, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x4c09, 0x0) 22:57:00 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='system.posix_acl_default\x00') 22:57:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr(r0, &(0x7f0000000080)=@known='security.selinux\x00', &(0x7f0000000100)=':\\)\xcc+}\x00', 0x7, 0x0) [ 329.856489] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 22:57:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="7c0000008030b9"], 0x7c}}, 0x0) 22:57:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fedbdf250200000009e8030073797a"], 0x38}}, 0x0) 22:57:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8904, 0x0) 22:57:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'team_slave_1\x00', {0x2, 0x0, @loopback}}) 22:57:00 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/module/mac80211', 0x18e640854608e014, 0x0) 22:57:00 executing program 1: r0 = socket(0x2c, 0x3, 0x0) accept$inet6(r0, 0x0, 0x0) 22:57:00 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) [ 330.415721] device hsr_slave_1 left promiscuous mode 22:57:01 executing program 2: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xfffffffffffffffc) 22:57:01 executing program 5: socket(0x28, 0x0, 0x6ca8) 22:57:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x9, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x4b, 0x4) 22:57:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89a0, 0x0) 22:57:01 executing program 0: open(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) 22:57:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0xb, 0x0) 22:57:01 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x401870c8, 0x0) 22:57:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x80) ioctl$BLKALIGNOFF(r0, 0x4c00, 0x0) 22:57:01 executing program 5: r0 = socket$igmp(0x2, 0x3, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r0) 22:57:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x890b, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89b1, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x4c, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x0, [0x0, 0x0, 0x2c]}}}, 0x4c}}, 0x0) 22:57:01 executing program 3: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000009b80)={0x0, 0x0, &(0x7f00000099c0)=[{&(0x7f0000006ec0)={0x10}, 0x10}], 0x1}, 0x0) clock_gettime(0x0, &(0x7f0000006d00)) 22:57:01 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x40081271, &(0x7f0000000080)) 22:57:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) sendmmsg$inet6(r0, &(0x7f00000015c0)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[@rthdr_2292={{0x28, 0x29, 0x39, {0x0, 0x2, 0x2, 0x0, 0x0, [@dev]}}}], 0x28}}], 0x1, 0x0) 22:57:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x8, 0x0) 22:57:01 executing program 4: r0 = eventfd2(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) dup3(r0, r1, 0x0) 22:57:01 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000180)='ns/uts\x00') 22:57:01 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x80000000}, 0x8) 22:57:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000007a80)={0x77359400}) 22:57:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x8, 0x2) 22:57:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x9) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, 0x0) 22:57:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) sendmmsg$inet6(r0, &(0x7f00000015c0)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x9}, 0x1c, 0x0}}], 0x1, 0x0) 22:57:01 executing program 1: r0 = eventfd2(0x0, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 22:57:01 executing program 3: socket(0x1e, 0x0, 0x7fff) 22:57:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x300}, 0x0) 22:57:01 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xb64, 0x121002) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x0, 0xffffff3b, &(0x7f0000000100)}) 22:57:01 executing program 2: epoll_wait(0xffffffffffffffff, &(0x7f0000001040)=[{}], 0x1, 0x0) 22:57:01 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x8940, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @local}}) 22:57:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x1265, 0x0) 22:57:02 executing program 1: utimensat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) 22:57:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x4c, 0x12, 0x1, 0x0, 0x0, {0x2}}, 0x4c}}, 0x0) 22:57:02 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x1268, 0x0) 22:57:02 executing program 4: open(&(0x7f00000000c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x8040, 0x0) 22:57:02 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGFLAGS(r0, 0x89a0, 0x0) 22:57:02 executing program 1: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'gre0\x00', 0x0}) 22:57:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x6, 0x7013, r0, 0x0) 22:57:02 executing program 2: ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000000)) pipe(&(0x7f0000002300)) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) 22:57:02 executing program 4: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) [ 331.142325] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. 22:57:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xf4240, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x26, 0x20000000) 22:57:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr(r0, &(0x7f00000001c0)=@random={'security.', '\x00'}, 0x0, 0x0, 0x0) 22:57:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)={0x14}, 0x14}, 0x300}, 0x0) 22:57:02 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGFLAGS(r0, 0x80487436, 0x0) 22:57:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x6, 0x0) 22:57:02 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x8, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 22:57:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}]}, &(0x7f0000000000)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000001200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:02 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001280), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 22:57:02 executing program 3: r0 = socket(0x11, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r0, r1, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r2, &(0x7f0000001fc0)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x7ffff000}, 0x14, &(0x7f0000001f80)={0x0}}, 0x0) 22:57:02 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0xc020660b, 0x0) 22:57:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'tunl0\x00', 0x0}) 22:57:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f00000002c0)=0x1, 0x4) 22:57:02 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000c40), 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 22:57:02 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x4c01, 0x0) 22:57:02 executing program 2: r0 = socket(0x2, 0x3, 0x3) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r0, r1, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r2, &(0x7f0000001fc0)={&(0x7f0000000e40), 0x14, &(0x7f0000001f80)={0x0}}, 0x0) 22:57:02 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000100)={0x0, 0x41, "e89718dd3359f4adc00809947f85ee2d485d81fe7f53eeeb21048c1b93bbda340d03c18e43ccbbdacd9b29ea629001015d92c1f61dd9c0cea6041a1048dd35546b"}) 22:57:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x25, 0x20000000) 22:57:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x24, 0x20000000) 22:57:02 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={0x0}}, 0x0) 22:57:02 executing program 5: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={@loopback}) 22:57:02 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000001280), 0x311802, 0x0) 22:57:02 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001080), 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, 0x0) 22:57:02 executing program 2: r0 = epoll_create1(0x0) ioctl$FIBMAP(r0, 0x1, 0x0) [ 331.518206] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it! 22:57:02 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127e, &(0x7f0000000080)) 22:57:02 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="18440000ffffffff0000000000000000234580000000000018490000fdffffff000000000000000018540000070000000000000000000000186500000c0000000000000080000000c8a3a69400000000183a0000010000000000000000000000182a"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:02 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8995, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@bridge_dellink={0x20}, 0x20}}, 0x0) 22:57:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x541b, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:02 executing program 5: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)) 22:57:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)={0x54, 0x14, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x29, 0x1, "2218d49b918e4620c080f8d09d43ea72257efc2e6031dfbebf5dafa838668b63dc5dcdd576"}, @INET_DIAG_REQ_BYTECODE={0x11, 0x1, "9a1ded95f1c81dcaac39bdad2c"}]}, 0x54}}, 0x0) 22:57:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x8, 0x1ffff000) 22:57:02 executing program 1: socket(0x10, 0x0, 0x80) 22:57:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x407, 0x0) 22:57:02 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x8937, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @local}}) 22:57:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8983, 0x0) 22:57:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8953, 0x0) 22:57:02 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x1260, 0x0) 22:57:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xc}]]}, 0x1c}}, 0x0) 22:57:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x9, &(0x7f0000000000)=@framed={{}, [@map_fd={0x18, 0x3, 0x1, 0x0, 0x1}, @map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0x5b, &(0x7f00000000c0)=""/91, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x4, 0xff, 0x7}, 0x10}, 0x80) [ 331.815518] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 22:57:02 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1ff, 0x0) read$watch_queue(r0, &(0x7f0000000040)=""/140, 0x8c) 22:57:02 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x18, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x4, 0x0, 0x0, 0x6}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x7013, r0, 0x0) 22:57:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr(r0, &(0x7f0000000300)=@known='security.selinux\x00', &(0x7f0000000340)='[:/.(,\\V+%$,(&\\)+.\x00', 0x13, 0x0) 22:57:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xd, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:02 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0xfffffffffffffff8, 0x0) fremovexattr(r0, &(0x7f0000000000)=@random={'user.', '#\x97$\x00'}) 22:57:02 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000c40), 0x401, 0x0) read$FUSE(r0, &(0x7f0000003300)={0x2020}, 0x2020) 22:57:02 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xb64, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0xc0189436, &(0x7f0000000780)={0x0, 0x0, "6e773410ad11cb32d9cf54339459d56d5e523a8b41c73924e4166476fb3a7b81a392e7f381b5feac0207f70e5acf1f57d3d01714ab38c64487c97535525a876eb43671f2a75317013e6dbdf224fbe0307d8e9434eb3406722fe5016f69335e0abdafea56527b38df70760e5a89066008d16cc530ce0f64af179554124c396b82939ea4d377f805d67b64847f86e1131f45c7b66049a20c34c8ccf612afcae109db473e1d1c8e8c4bfe1ab309b7d8eaca2f38dffc0aa71a67c072bb730ff96bb6e89ba3ebdc35d44bdab2e3fe43e782150f1ab8d34afbc1d2a618f70e11c4bcf89f4006affbd2275e17050c34c8567883776b4e5ce27e9cb9470be230b4a01b7e"}) 22:57:02 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x4c00, 0x0) 22:57:02 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xb64, 0x0) mmap$usbfs(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) 22:57:02 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x46100, 0x0) 22:57:02 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002ac0)={0x6, 0x3, &(0x7f00000019c0)=@framed, &(0x7f0000001a00)='GPL\x00', 0x0, 0x1000, &(0x7f0000001a40)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:03 executing program 5: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0xc, 0x0, &(0x7f0000000040)=[@dead_binder_done], 0x0, 0x0, 0x0}) 22:57:03 executing program 1: r0 = socket(0x11, 0xa, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r0, r1, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r2, &(0x7f0000001fc0)={0x0, 0x0, &(0x7f0000001f80)={0x0}}, 0x0) 22:57:03 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x15, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:03 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000bc0)={'pim6reg1\x00'}) 22:57:03 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000001400)={'wg0\x00'}) 22:57:03 executing program 2: ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000000)) pipe(&(0x7f0000002300)) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 22:57:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup2(r0, r0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) 22:57:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x12, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x890c, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:03 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000040)=@raw=[@kfunc, @call, @exit], &(0x7f00000000c0)='GPL\x00', 0x5, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:03 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fremovexattr(r0, &(0x7f0000000080)=@random={'security.', '(&\x00'}) 22:57:03 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGFLAGS(r0, 0x8903, 0x0) 22:57:03 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x80081272, 0x0) 22:57:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8923, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:03 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100), 0x228803, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 22:57:03 executing program 1: r0 = socket(0x2c, 0x3, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, 0x0, 0x0) 22:57:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup2(r0, r0) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 22:57:03 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001280), 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, 0x0, 0x0) 22:57:03 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 22:57:03 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002ac0)={0x6, 0x3, &(0x7f00000019c0)=@framed, &(0x7f0000001a00)='GPL\x00', 0x180000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000140)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}}}}) 22:57:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 22:57:03 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x40, 0x0, 0x0, 0x0, 0x0, 0x0}) 22:57:03 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x7c}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) 22:57:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @empty, {[@noop]}}}}}) 22:57:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8912, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:03 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:03 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x8008af00, 0xfffffffffffffffe) 22:57:04 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002ac0)={0x6, 0x0, 0x0, &(0x7f0000001a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x4c, 0x12, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x0, [0x0, 0x0, 0x4, 0x4]}}}, 0x4c}}, 0x0) 22:57:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x88) fcntl$setlease(r0, 0x6, 0x20000000) 22:57:04 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002ac0)={0x6, 0x3, &(0x7f00000019c0)=@framed, &(0x7f0000001a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002a80), 0x10}, 0x80) 22:57:04 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x450802, 0x0) 22:57:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) sendmmsg$inet6(r0, &(0x7f00000015c0)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[@rthdr_2292={{0x28, 0x29, 0x39, {0x0, 0x2, 0x2, 0x0, 0x0, [@dev]}}}], 0x28}}], 0x1, 0x0) 22:57:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)=0x4) ioctl$KVM_RUN(r2, 0x8004ae98, 0x0) [ 333.297254] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 22:57:04 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0xfffffffffffffda2) 22:57:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x12, 0x1}, 0x4c}}, 0x0) 22:57:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x4c, 0x12, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x0, [0x0, 0x0, 0x4]}}}, 0x4c}}, 0x0) 22:57:04 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x4, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0xd, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0x6, 0x7736, 0x7}, 0x10}, 0x80) 22:57:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4, 0x0, @loopback, @multicast1, {[@timestamp_prespec={0x44, 0x4}]}}}}}) 22:57:04 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x4c08, 0x0) 22:57:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, 0x0, 0x378) 22:57:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x9effffff}, 0x0) [ 333.448684] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 22:57:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr(r0, &(0x7f0000000300)=@known='security.selinux\x00', &(0x7f0000000340)='[[/.(,\\V+%$:(&\\)+.\x00', 0x13, 0x0) 22:57:04 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x4, 0xff, 0x7}, 0x10}, 0x80) 22:57:04 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x4c04, 0x0) 22:57:04 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 22:57:04 executing program 5: r0 = socket(0x2c, 0x3, 0x0) getsockname$netlink(r0, 0x0, 0x0) 22:57:04 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x401870cb, 0x0) 22:57:04 executing program 3: socket(0x1, 0x0, 0x3f) 22:57:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x894a, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x8, 0x1) 22:57:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x10, 0x0) 22:57:04 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x200242, 0x0) fcntl$setlease(r0, 0x3, 0x0) 22:57:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8917, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8916, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5}]]}, 0x1c}}, 0x0) 22:57:04 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x0, 0x0, 0x0, 0x0, 0x18}, 0x48) 22:57:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) 22:57:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x29, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) close(r0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 22:57:04 executing program 3: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 22:57:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={@private2}) 22:57:04 executing program 0: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 22:57:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x401070c9, 0x0) 22:57:04 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 22:57:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000001c0)={&(0x7f0000000300), 0xc, &(0x7f0000000180)={0x0}, 0x300}, 0x0) 22:57:04 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @local}}) 22:57:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xc}]]}, 0x1c}}, 0x0) 22:57:04 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x125d, &(0x7f0000000080)) 22:57:04 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup2(r0, r0) getsockopt$inet6_opts(r1, 0x29, 0x36, 0x0, &(0x7f0000000c80)) 22:57:04 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x9, &(0x7f0000000000)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @func, @func]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x7013, r0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340), 0xffffffffffffffff) 22:57:04 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, 0x0, 0x0) 22:57:04 executing program 0: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x1000}, 0x0) 22:57:04 executing program 1: ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000002500)={{0x0, 0x0, 0x80}, "a695b647c0c23f4c9da6a81367da57c57c32bc9bb636185e12277cc8859e69d957d3afdf0e2e9b7e84237670d47a646c53d2c61e32a0f07cd06ded8d6709b9170c84b56b636f0e3fe03a54839b099fb81663342bfe234fc3dbfb38b35b26f6c614020b63926e7e7f6673fe3cf2afe47f384b33415901f806a3dbfeee48e8bdb71112a77a983c4e0a441abd8e992267efc90619b5bab8dda25e5c79aff4523482511e45ef3780d37a36fcbf9f6ca46ffafde6c713c8e71108672a3a126f5aaf57bd96643ef2c85c0ff8f8bb828099d763f309943377de0372e6600fc0b865d3f72e3a28766a7c71c4dd76f79c18c06e2db739734e67c14202ece189261278578db7f53578954e07dfec039ad77042621b61cde763905b83b328ecc6c1ed9700c4c970defa9d8dc60f7b0f3afa09f99c0db7b493ca23606b34998f2ebe689100d1be768a5e17508a3b6740eeb84005a9f42e3977014cd4125cea94a505d5d8e4c17442ab7b970ca2576b7b23479bbb4d8a144545f48ae82a1a68e37c04ed091d67985a41ab73b13d971ac4fca9885e28550ad9e91f99a69daad45d01c8a944283dac8044d69c2265800c6857a0e88b5dcbacb7a63e9c297e4cd25866924968883af3c1330e92e787086bc8c7d9ed4c28632f79b5ee78da6bac002b48b7b96e59619120b9c2c2e9a42608fd3099040d895180837b115d4916f2283f0acd4e5dbce8d60fad24066dbebe43bc5e5b666df9f63a5fd38f26dbdf3f573943ac9d7646b094a1d6e72ac3f52a88d8c360b7670da09d348b1e7d47b7fb7aee9909774a4cd205d8046d441d020c7eff1af1eebd4a706a74289f0a18565baceb9704d7bf41508ae58038c48b20af0392a80cdf2c9d61f431de61b2b06ab57fe843a9e60594a55ec42453222666ae3ede54507f517571395e79734b642d0d04075164b3417635d9c0454c8ea8e67de429e09cd149fc3ea0e0ab43f9ece6407b441cb2c7de5271cdb71a38ad1aa8e4c0d09458412de8c08527028d108aee2ae36ab610c1aa033a76d6f44d2ac7e4afc6beb9e1d9215d2368aad6747b9f8c028281ad25eb398fdb6fc673b39131c34defe8df7771bd57b9cf9e23750b187626e87ecfceb515c5b78c9e9ec55882ead83813bbc34675d93aba28d54dc52e35dc8a97987bc58a5e3bdac5aaf69bef0c9472718ab1cae678040b78266c2e8620eeed08252d6a454a0265a0edbeee11f7425e46c2074739dba31e71491194483e489cc95495a3e0f067d1d32b7bef78bfe6c4b9e24ca382124b59f18e48b48d5a003e6d9dbce27f2334e8c4bd90c4d69f944df2bf926a5d36a56e51c29120a005d112892eb574b60a70814c5c434f9b4451bb9e8cb86e156966b712aba520d73510c83cd582615f94801bc7d3763e4d2108efe0143f6feaff0e145ff58ef4c771b90dc8866226025e09a4ad817296e020986ada2295b049043c9316050fdc107e96a5567a28dff9f84b7b02acb55d9320e2eeb057bc1ade79f431418d17a0c32feb0381ca7531a0d66b5a73ea97376a543ed9bb319d894fdcdfbf55d60840b1e234d47d3ed90e87ce4f14b89c2ddaed4464ab4b638b9a633c856239301399ce514f7ca1f3607e8dea6f44f45873d48a72c6215f2a0bfcb0808d9b5df1a8c3a6743ad45dc35a96ef5417235e5ed366b69ad9ff585e8b7a2df08ea81063c7a91b314c7fe5f69752acaec18aef8a861d414f0864ba950ee21218ffa25fad0ef3ba50c339fe4772bd02bac72adb66cdcb878673ef1c8d54d4d7d1cedf943b1edb6c5a26104145c781e520d9cf59ac8436da4555e3ee6458ab2240ffe950f07a5e7d209bdc878dea7302bad2f3ad4eb22a84f53e673aaebc55c7ba7d737d90bd404bbe034da5c019661d19efca268fb7de8573f6a9bc62a4968fc33f1630e76537c46cd7c087e01cd7192b4ca53209683904ffd11db3f4b09766419ded372da84551132de27a1918a05f1ac82401ff899684a68a6238643ad558c7a49819421ea10a66fd5eb9dbf0965aec5a5346548d98cf3be7ac5f0e8e400ff360904acb8d5986a587e12485c8d1c530562e96cf51d9a05e8f9342ec3ed12e4fcc32d3001fce5c8aebd2b84f39eed379e9d2cddb9d86b3a1157d1c4aeaf4cf4d14b8b9241a5b2688c4e08cd970d4f80bb9929c2500f47a00a818cfd3af25b78a8e2b91ebcc243cac57de11a3d90fb693c14b46934016a2cfdc3a683ffbffdd6971e59f526f895f95bd7a3cbd101bea47d54546f4ce0a6254ade461e42f04662c2d4fc0b4837f4f3f81be2f1f88a6f59867ec97a37e46575dd7b2e21c9165dc55be62aa41e578b79aa52797dbd4aa8fb2bca09aed8b3c653402dd3a3734f719544c0ab1189f4cc56fa90b2dad96daacc3221882b17a88f64840b88f57643f7239abb0294e943e7a030f64ea381d150f5e07182d78a57b9eea50d344b0202c0d4a928f5fa968202bf0da3187a36bcbbb9d93c18b47d4a94122ab4bfdc44ce96f611547c4769e44fbed76724176e1da49e77172178c8ad0f500871c3f18539dc486b4caf664ce1b25c7808d0f67265bd378157db618090e74451012742086eb27b53521f95486fb676609da81dbfcfeb9a4934d4b6c1ef70fd284da089192e7ecb827698165cf3a658864ee292965142440fb87fb45eb5ec5a4226f2388cbabe7f582b8dd1101fb66f33a5e3fcd909320ae486bb05c6b6a6df502dfd654319c640c263a30572ed6fb6981a79e549d5210091f729969f624c0bc19666ed244259debd95300e8e93ef5ce08c798ac2e7d6abedfddb99188983e4b21c2599bcf8456ad4b3f46d6bdf68ecccdcbed5d518047d66f948ee83fedc6b5531396c179c3936035ad03aae9de103e816526ed5aa7d6cab45b9b510e6d7fe299d581cfb6f0cda978bb3da5e611767de1aca208e919cd1ab54a99483e6e7ab55ac37a4d3854aaa0abe97ed5e765986017c962ad0e5965108803fc97db399c7ce325256ccfcc4ccd5d4d7166c8457fd3b311b378658af3a54bc38e81594a3b0da134c2d84f1d9fb36c8d73c869280a1d833413fc97813fa841c84b1d27a4ca432da39e3bcc6dfc9293e8be1fe6cb002b703e9de6701be439526c2eff62902aa94de38bcd58047e3e58df271ce94564417a4985f77939be05d771f67e2e409bcc80ebe429110bd32820891f9f0a4033e373b99e2e455e37124de62dd112232b91aa080221546bd493e121ac2d35055d6fc180c02c9b2587b679b85f7d33e02750f610bc8b2ccde0817bdea92f9088718f47840d9fe4c54fd5c1a533e32085fcc750265dc234f76460a914f40268695f55e6e166e519f4f23e613730537e298743ab148dae977eba7a574c7a9bdbd62712ee249b064618b4bd4074dafc37be4507f0f22907162910a76f41285d9d7f11bc9bb19be8342395b43122a67cd6de6d1b2ff75499e8be3775ca3a1dd2198e0ad31daf7e9a3a861290dfdf55dd17f69d850579cf2fce5cd40ba3d3d1fd3ac7198e98770cf1e27d447ac55325137aaeea86b09dd150a3602f41beb482f87a9534d52bc0b875bd32b91b94d1e58a0a773535c3490dcfcaaa6b5d4c7e3e5ba80d8cac38485ca0746574f3067a8aa352f5c176d62f5304523911610a79a048bc28ae2f188fbceb08968bbf5f356f31c8ced49352a11fdc243b739b15087bf1daaf51ca923e83ae437ccdd3f538fc33ef2e1fb2687da2dfa9ad5527ec65e11a328f6709a8d201e7556d486ed6f39d89095ab8c1e870f352f714c12c797d19c00dad3b27b393fb1321e443c5f2098966cb17356c7f15ffd33ddfc3419daff78ee16e3e85e491a563f24ecfc079c6d2f80cb50beef8431b4d6786546fde51451d2296ca5196b9f235b9c1021fce32552b4875d5bbc25a505b0e8130b108391b8e3b85cc6dbac49a68d2e208700a09d2aa9d44d86178c9fc84e3bac44d0452f1cc560aa3a674602f7debaee3bdca7b7ea0ecd2b6da8fc415b5a4f3a3ccd32d9774e8b6373cbf5b27cc3e113fe9d201f8cf8957f52f1bfdb9cef6dcbfac497ed47971fbb1474cf0cf653b5b4dc08142da8d140540fbd29460d8191710aff4a16632394c9ee03229aa3e053164cee04be315fa59e05e19655d2eb536efc44c80222d127be90045f50fd81847e983d1ad603a460a748c4d11562f0a8544edd9e60bf1d02a6c1c4ee6fb19c82f1d2578ce0276b769b1ea9a72403ce1adc9270cf362adce33c8fa12944a62661b4494e4b84d7cdb679dba44c0c1085ec9697260f78ff2ab5931706c5d43847ea33662d3afb5f16da8a1fb650e5d83270a58d3ab27dceb39a818f611f664360bf54ba32d593008c2f490a9204490fedac0b987919c79b86705614e519cb5f833e96d6920f8411222d33de8da90acca2c6d52fd9e55fa7265bd2d21f0d3727601b0f8537e2f09dff1a731759159c0990fa6b99a3fbf9e829ba1b179442f35d43d8d0a162a7f44b828fac27410852dfc7717926e4881949f3ea989f8eed65166c441f64ef9bcb2eafce60e3ca165d234138be2ff8c4c9f3ae997d406cad0bf99acd8593a25d61afa1fefddd499f1c6a4c71d570a8a5ae934051f725abd9c5a96a92a1c9f1aaa7c6b0787f4b16a06e641762847bd12fe795b2a178e514e3fd3e2eda28f5b7be95d5b09e1c6b1866c31806342e5d411cb3d9660ab2e868d0a7150d1f6cad1997d20e8a1459611392c44cbbd5f6529f47376529e8c452762127949bfdddf88b9e6c8c12e3cc023a9a1f8c379649a76a23c877c98ee41f7ac74f97fad35dd5d07710097b73e1ea6eaed585531c5fefca66ffb5fea944ea5d6c1d7ac48f3648416be5f8a55527c413d5ae5dac7e05ade44c1f32d6f5f3781cf37526c0eb701656f40501df733d9a4f6a7a5484284ed3fcdce3624e6ae2e5a2c70ca0d90614c644167dab4402993a69b2ba9d9b0bc874edb8b095346bdcf10fd432fccd52beb37556d70e48ee57e8cc01aca0fcc99ee691f3cd88ee6f1873aa67adefe8960ab196b7338bf659fa3db62a46fdd67318f694186db2d8676fd14978185f9b081675ea31442f5001296c8f8ce4753fd9a1dd7c4fc2aef1c6a3fa9a6838fabe601f449e142f052b93c4789e7241bd713284f407f49d9741b60ad2c81ed267667b0c66e25572ef42539eaa6060af7208a05088985e35c3a40d0342f9d4e23634b7c682b55d677bd537a3e6fe966bfb16c017af6208f77c78fb6a1cdddf25218c3354a7bd685d41601ac4811127c027eda61b49fbb6ab2b6da2554c978691ea6f93ad76b6ed7ad28cc1723bfb4ec09dab449fb8c23dfe97655f1a2d8d6d1ffe667bbd2b1cd2044314e0932e0962b40a7e3689a34b8ea0dae8d17de6c6212818f50c2e8e825d127d475f52e299f79aef18a6b5f38660aae215639a66eac223d1bb6c06cb53f5b81fb1c634b97055e264c17078bf2b98c494715726d53645364f07e193a378141673276111ba9af8cc506d32ebf07485a9e1a69488e95c8bb06087aa284cb2adda4e255e1123498b36e8ab94d84d83a63ee8ea053bf78b1785ac91655d6a206a5cbfe7fd6e16e5ce21ae0c3b0a55d9fcb28164a99a2a08263b07e8e4b8a34dce950a5044fda4b6fd5b6cc7d5eacecb75e026d0542a4f4850bfbafb3b8bebb10bb016af4f9cb3fb6d0be4f6bf7367edb693798bd1abdf9818c9851cd19ce114a836a3fc9d232df32bbabc7c7c1991773c14eb491858b0118e8984e5fe4ce0a74090705e267bcd513085bc3133e02b5b65cf50d82a44f5a996a873f53d6cfa19f", "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"}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000004a40)) 22:57:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) fremovexattr(r0, &(0x7f0000000180)=@known='security.selinux\x00') 22:57:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) write$P9_RWSTAT(r0, 0x0, 0x0) 22:57:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="00c0000100000400fffffffe41df008400660000ea299078ac"]}) 22:57:05 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xb64, 0x121002) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f0000000080)=0x6) 22:57:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000001480)=ANY=[], 0x378) 22:57:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, 0x0) 22:57:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:05 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) 22:57:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr(r0, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0) 22:57:05 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x2, &(0x7f0000000040)=@raw=[@call, @exit], &(0x7f00000000c0)='GPL\x00', 0x5, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:05 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x7c}}, 0x0) 22:57:05 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x8907, 0x0) 22:57:05 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='hugetlb.2MB.rsvd.max_usage_in_bytes\x00', 0x2, 0x0) 22:57:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8932, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:05 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xb64, 0x121002) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000040)) 22:57:05 executing program 2: r0 = socket(0x2, 0x3, 0x3) accept$inet6(r0, 0x0, 0x0) 22:57:05 executing program 1: request_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) 22:57:05 executing program 5: r0 = socket(0x2, 0x3, 0x3) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r0, r1, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r2, &(0x7f0000001fc0)={0x0, 0x0, &(0x7f0000001f80)={0x0}}, 0x0) 22:57:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x125e, 0x0) 22:57:05 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x200242, 0x0) fcntl$setlease(r0, 0x2, 0x0) 22:57:05 executing program 1: open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 22:57:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x8, 0x4) syz_genetlink_get_family_id$smc(&(0x7f00000002c0), r0) 22:57:05 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x40101283, 0x0) 22:57:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005440)={0x0, 0x0, &(0x7f0000005400)={0x0}}, 0x8001) 22:57:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8912, 0x0) 22:57:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x406, 0x1ffff000) 22:57:05 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_GET_EXTENDED_ERROR(r0, 0xc00c6211, 0x0) 22:57:05 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', 0x0}) 22:57:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 334.459166] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 22:57:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) 22:57:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8918, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:05 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18100000020087a000000000ff"], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0x9c, &(0x7f0000000100)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:05 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000000)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:05 executing program 2: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'sit0\x00', 0x0}) 22:57:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8941, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:05 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='syzkaller\x00', 0x230000, 0x86, &(0x7f0000000080)=""/134, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:05 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r0, r1) 22:57:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x4c03, 0x0) 22:57:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f2, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:05 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0xfffffffffffffff8, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) 22:57:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f00000002c0), 0x4) 22:57:05 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x301, &(0x7f0000000080)) 22:57:05 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x1267, &(0x7f0000000080)) 22:57:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1ffff000, 0x0, 0x7013, r0, 0x0) 22:57:05 executing program 0: syz_open_dev$loop(&(0x7f0000000000), 0xfffffffffffffffa, 0x4042) 22:57:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x32a3}, 0x14}}, 0x0) 22:57:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xa, 0x0, &(0x7f0000000240)) 22:57:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)) 22:57:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_elf64(r0, 0x0, 0x0) 22:57:05 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, 0x0) 22:57:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)={0x14, 0x14, 0x1}, 0x14}}, 0x0) 22:57:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$SMC_PNETID_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) 22:57:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8991, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x4}, 0x48) 22:57:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000440)) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0}, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000c40), 0x401, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x24, 0x0, 0x0, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x9}}}, 0x24}}, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x42014}, 0x8000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0xfffffffffffffff5}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_WRITE(r3, &(0x7f0000000080)={0x18, 0xfffffffffffffffe, 0x0, {0xb46b}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000001280), 0x0, 0x0) 22:57:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) sendmmsg$inet6(r0, &(0x7f00000015c0)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[@rthdr_2292={{0x28, 0x29, 0x39, {0x0, 0x2, 0x0, 0x0, 0x0, [@dev]}}}], 0x28}}], 0x1, 0x0) 22:57:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x4c, 0x12, 0x101}, 0x4c}}, 0x0) 22:57:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000440)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 22:57:05 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'tunl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, {[@ssrr={0x89, 0x17, 0x0, [@loopback, @loopback, @multicast1, @empty, @broadcast]}, @ssrr={0x89, 0x17, 0x0, [@private, @local, @loopback, @private, @rand_addr]}, @rr={0x7, 0xf, 0x0, [@rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) 22:57:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x9) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, &(0x7f0000000040)) 22:57:06 executing program 1: r0 = eventfd2(0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000), 0x0, 0x0, 0x0) 22:57:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x891e, &(0x7f0000000080)={'sit0\x00', 0x0}) [ 335.050289] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. 22:57:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x40101288, 0x0) 22:57:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 22:57:06 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x125d, 0x0) [ 335.101209] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. 22:57:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8953, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYRES8=r0], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0x9c, &(0x7f0000000100)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:06 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000c40), 0x0, 0x0) connect$pppl2tp(r0, 0x0, 0x0) 22:57:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x2, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x88) fcntl$setlease(r0, 0x6, 0x20000000) 22:57:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast1, @empty}}}}) 22:57:06 executing program 4: request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) 22:57:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 22:57:06 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, 0x0) 22:57:06 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000380)={@local}) 22:57:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8994, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00', @ANYRES16=0x0, @ANYBLOB="00012d"], 0x38}}, 0x0) 22:57:06 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89a0, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:06 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0xb64, 0x121002) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045510, &(0x7f0000000000)) 22:57:06 executing program 3: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200)) 22:57:06 executing program 0: socket(0x64, 0x0, 0x0) 22:57:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr(r0, &(0x7f0000000300)=@known='security.selinux\x00', &(0x7f0000000340)='[[/.(,:V+%$,(&\\)+.\x00', 0x13, 0x0) 22:57:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x238, 0x140, 0x0, 0x140, 0x3f8, 0x500, 0x500, 0x500, 0x500, 0x500, 0x6, 0x0, {[{{@ipv6={@loopback, @dev, [], [], 'pim6reg0\x00', 'veth0_to_bridge\x00', {}, {}, 0x0, 0x0, 0x0, 0x44ff5cbfe7e5c898}, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@ipv6={@loopback, @private1, [], [], 'wg2\x00', 'vlan0\x00'}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@mcast1, @ipv4=@multicast2}}}, {{@ipv6={@empty, @loopback, [], [], 'veth1_to_batadv\x00', 'pimreg0\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, [], [], 'wg1\x00', 'pim6reg1\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5b8) 22:57:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000fee000/0x11000)=nil, 0x11000, 0x4, 0x11, r0, 0x0) 22:57:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f00000000c0)=0x3, 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'sit0\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB='gretap0\x00\x00', @ANYRES32=0x0, @ANYBLOB="8021002053549829000000074513005400640000042f90780000000000000000070fcfac1414aaffffffffac1414aa44241573ac1e01010000007fac1414aa00000002ac1414aa00000003e0000001fffffffd830b32e00000010a01010000004845dfcf696e4ee32f85d2ef28ad1c329d6dce42d27c4ca7359c0149f0f1ec52ee0d7637fc1c16d715dd55cef5a7068c5a67ef715d5efd6bcc6e788a19bab0e2a94a569ae4d89050c6af02089411de630dd4667a03323ef914694dbf1a36f9205092c4c3e0019b7b75c1f5911381bd6503cb38f31183e1d1fbe7065c20aa9f8cfd6610dfa328f0cbbf21fc447d3a1fd4cf5b5b9da56f81f013b220ea7c0b5e5d404d"]}) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000440)) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000700)=ANY=[@ANYRES16, @ANYBLOB="020026bd7000fbdbdf250c0000", @ANYBLOB], 0x78}}, 0x8080) read$FUSE(0xffffffffffffffff, &(0x7f00000012c0)={0x2020, 0x0, 0x0}, 0x2020) r2 = syz_open_dev$vcsu(&(0x7f0000000c40), 0x0, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) r3 = socket$netlink(0x10, 0x3, 0x4) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), r2) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x24, r4, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x9}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000080}, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc}, 0x1c}}, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) r5 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_WRITE(r5, &(0x7f0000000080)={0x18, 0xfffffffffffffffe, r1, {0xb46b}}, 0x18) openat$bsg(0xffffffffffffff9c, &(0x7f0000001280), 0x0, 0x0) 22:57:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) 22:57:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr(r0, &(0x7f0000000300)=@known='security.selinux\x00', &(0x7f0000000000)='[[/.(,M1w\xfa\xd8\x8f-\xa5|\x02\x00\x00\x00\x00\x00\x00\x00,(2\\)+.\x00', 0x1f, 0x0) 22:57:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x25, 0x0) 22:57:06 executing program 5: syz_open_dev$loop(&(0x7f00000004c0), 0x0, 0x783) 22:57:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r1, 0x1}, 0x14}}, 0x0) 22:57:06 executing program 2: open(&(0x7f00000000c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) 22:57:06 executing program 3: request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='}\xf6+\x00', 0xfffffffffffffffe) 22:57:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000), 0x8000, 0x204181) dup3(r0, r1, 0x0) 22:57:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8940, 0x0) 22:57:06 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) 22:57:06 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/block/ram10', 0x0, 0x0) 22:57:06 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001000), 0x0) dup2(0xffffffffffffffff, r0) 22:57:06 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x7c}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) 22:57:06 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 22:57:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr(r0, &(0x7f0000000300)=@known='security.selinux\x00', &(0x7f0000000340)='[[/.(,\\V+%$,(&\\)+.\x00', 0x20000353, 0x0) 22:57:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @empty}}}}) 22:57:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8904, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x4c, 0x12, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x4e23}}}, 0x4c}}, 0x0) 22:57:06 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) write$binfmt_elf64(r0, 0x0, 0x0) 22:57:06 executing program 4: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x800, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000540)={0x98, 0x0, &(0x7f0000000380)=[@reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000080)={@flat=@weak_binder={0x77622a85, 0x300a, 0x2}, @fda={0x66646185, 0x7, 0x0, 0x19}, @ptr={0x70742a85, 0x0, &(0x7f0000000040)=""/39, 0x27, 0x0, 0x16}}, &(0x7f0000000100)={0x0, 0x18, 0x38}}, 0x400}, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0xc5, 0x0, &(0x7f0000000440)="2e4c2ddbaebc9b86f44b73f7de7c0b290d784630d69bf730976fe48c835cdaad3638549c4c85adf5f3ad1d7d847bfdffd2f39ff6068223fbff58e4f2db5b7e22987686f26da09e6fa1d134d699cd8b75b2070a34cb65c7f0fce3e80cf8782417a9e8e4ae2fba4dcf819fd750bbc4472ed4b64d88ab5dd7e1933dfaa5a557f15a1c02c3cebe182eba32b55d3cfc1fce72bc0383af05de8366aa05f13b8c195f639ea36a1532d35c2aba52fbb2f79ff4829c9a70ac39af854baa6b49fe1dee5fd85afddde9d6"}) 22:57:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x8947, &(0x7f0000000080)={'sit0\x00', 0x0}) 22:57:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0xa030}, 0x0) 22:57:06 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 22:57:06 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 22:57:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'netdevsim0\x00', {0x2, 0x0, @broadcast}}) [ 335.895737] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 22:57:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) 22:57:06 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 22:57:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)) 22:57:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000002d00)={0x0, 0x0, &(0x7f0000002cc0)={&(0x7f0000000e00)=ANY=[@ANYBLOB="10"], 0x14}}, 0x0) 22:57:06 executing program 2: r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 22:57:06 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x401870cc, 0x0) 22:57:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) 22:57:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) fremovexattr(r0, &(0x7f0000000000)=@random={'security.'}) 22:57:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x30a0}, 0x0) 22:57:07 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000080)=@framed={{0x9}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @multicast1, {[@timestamp_prespec={0x44, 0x4}]}}}}}) 22:57:07 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000001c0)={&(0x7f0000000300), 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x40, 0x0, 0x0, 0x0, 0x0, {}, [@SEG6_ATTR_HMACKEYID, @SEG6_ATTR_SECRET={0x0, 0x4, [0x0, 0x0]}, @SEG6_ATTR_HMACKEYID, @SEG6_ATTR_HMACKEYID]}, 0xfffffffffffffe62}, 0x300}, 0x0) 22:57:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0xa, 0x1ffff000) 22:57:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x4c, 0x11}, 0x4c}}, 0x0) close(r0) 22:57:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) dup3(r0, r1, 0x0) 22:57:07 executing program 5: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'syztnl0\x00', 0x0}) 22:57:07 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/config', 0x24000, 0x0) 22:57:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00', @ANYRES32]}) 22:57:07 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x8, &(0x7f0000000000)=@framed={{}, [@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}, @map_val={0x18, 0xa, 0x2, 0x0, 0x1}, @func]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x5b, &(0x7f00000000c0)=""/91, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:07 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127b, &(0x7f0000000080)) 22:57:07 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 22:57:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000000)=""/25, &(0x7f0000000040)=0x19) 22:57:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setlease(r0, 0x26, 0x0) 22:57:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @multicast1}}}}) 22:57:07 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0xfffffffffffffff8, 0x0) preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000380)=""/39, 0x27}], 0x1, 0x0, 0x0) 22:57:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x48) 22:57:07 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001180)={'ip6tnl0\x00'}) 22:57:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000004c0)={'bond_slave_0\x00', &(0x7f0000000480)=@ethtool_gstrings={0x1b, 0x8}}) 22:57:08 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xb}, 0x48) 22:57:08 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x80081270, &(0x7f0000000080)) 22:57:08 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/pid_for_children\x00') 22:57:08 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a], [0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x100, 0x0, 0x0, 0x1b]}, 0x45c) 22:57:08 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/schedstat\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x4020940d, 0x0) 22:57:08 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/schedstat\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x2, 0x0) 22:57:08 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGFLAGS(r0, 0x89a1, 0x0) 22:57:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x4, 0x0, 0x0, 0x0, 0x4}, 0x48) 22:57:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}}, 0x28}}, 0x0) 22:57:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 22:57:08 executing program 2: bpf$BPF_BTF_LOAD(0x19, 0x0, 0x0) 22:57:08 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/schedstat\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x401c5820, 0x0) 22:57:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x63, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000002c0)=""/165, 0x1a, 0xa5, 0x1}, 0x20) 22:57:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x2}]}}, &(0x7f00000002c0)=""/165, 0x26, 0xa5, 0x1}, 0x20) 22:57:08 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x2, &(0x7f0000000380)) 22:57:08 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/schedstat\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x5450, 0x0) 22:57:08 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/schedstat\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x4b47, 0x0) 22:57:08 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/schedstat\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x40086602, 0x0) 22:57:08 executing program 5: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 22:57:08 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000ec0)={0x67446698, 0x0, 0x0, 0x0, 0x0, "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"}, 0xec1) 22:57:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f00000002c0)=""/165, 0x26, 0xa5, 0x1}, 0x20) 22:57:08 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_MFC(r0, 0x0, 0xcd, &(0x7f0000000000)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, "499b558074260dd1a19fd62f32f45c9c32913f63a9bf9efdbe0bcdf29233bf27"}, 0x3c) 22:57:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000ec0)={0xec4, 0x0, 0x0, 0x70bd28, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x68c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x160, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '}\x1a/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-]\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '\'\'!:/*}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '^)[.*\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ':)}@\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_BITS={0xa8, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '.(!^:}\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ',-%{\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0x134, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, '(-,\xb8(/{!^++,(\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '\'*+\x96+]-\xb1-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x6d, 0x5, "87a7619d457f77345510494cf10cb376dca57992c83a25cb193fe71eb7cad9ed8d0dcbc6e39260c1b88b59ef0a6ba35c361ec04933f2267e1c4b41ffd1a1a221c925ddbd9fc90014f8f7d2217c2ffd6b08fb46b64d23fe1395f3d73f1b17ce2bd797da12093aa902fd"}, @ETHTOOL_A_BITSET_MASK={0xe9, 0x5, "d3776d19429739c036addd7ffd60e0353500dffd0a729e9a0a44eb713b459c97768959be3d15ce6fc70f641ac92e52eceac365af46b410270847a01de29be5b2272abcbdec1053a3d2e74ae150f5d923cb290a0f7544522cd61f14d78fb970213edf6a082c0dd23dc3396aae28d23725b044c9c8a420e741c1cdbc0d7ce5a93be38e46a688caf072be1fce502313931655397eef41c8a00eea3115f37b410386bbc3d112776f2ee9efc5612c0b9b4353a3bd95a4217448ce2f70654d412f9ab3e0badf623592ffe8774c55e5195ccdfb68f270ffca19f1c997cfe83f7f8b409ceb6e32d7a2"}, @ETHTOOL_A_BITSET_VALUE={0xe9, 0x4, "dfc7c871eacc29ce3d2a32f99c76596dd6508070d73a6f679bab755cb4dbd51667b296593659dda598dc79a4feb6618b008be15c106c3d90ed994cbbb0de31f0593c009e8136ca85406ffc309c3529558b1596d0c2ff899e6f30accef7ee59b314d8ccefb6ba2b3efe066e54bc580e31967a98f7a99f42019d1530a5a251feb57faecb1057f89886123ea34bbc3f5f5fda941f0c51b62b4beea1876a8558e86b37d7db89ea2a2a0b417158312c1a13c3b69cd7fa488c2c9f34025bc3987c97961baa1b760174695673949660d63c16447434f070b3014e3e0efcc1152f89e1cffd8b5ce6af"}, @ETHTOOL_A_BITSET_MASK={0xe1, 0x5, "f9adc7619bd7facb8bd22bdae5e8a59a71e6d2f5c7434d0b77571a91de6d7a62214c9c56a46deb7c9563f4094471e1ba2d2446c4de8d3b9d1e02c85d6400b5a4e641b9c4e9b41a808ccfcb16f8c5e5fd88032e2255073ace0b07910291438ed15a60eec544fce53884ed835404f008db504023b6ed2eaad408c447712d7c6453f5d616fbac435dd0fcc278be3d1c313b566e12cbaf98d6a6a9b59f37207490148c43521725556a1536ae558105b2afd7088db1c67ee27100fce05b15a9ce0ba23a8451e9ff0546a7173b5ee443407c0e6a099cda670105580271f260d9"}, @ETHTOOL_A_BITSET_BITS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1b0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xed, 0x4, "2d56e66bb90b1eaaa6d7020d41deb7d456ea0c53723ac517fd9916b2ea59b18b155f82e6850380a4cfa76dbc90eff961028f9e09acc238b4d72ffb5dbefaa4986d9ed3b002b1d5b0559abd420eb52ddb25194ba6c194aec8ae257c1343cb0dc33912716890ee33a774ceb93928b7362ec80f06c218b54ea16662482790a326c5691a3ca46fbdcee1573a6a5c89ac55e39d3a75949ff2633bd393c756f9f327c0051437964febf3d052c105e57f53b6a78c359a771d51b2a1e8d82d94a3489741e1fb9f6c1008e4a1bd64564f5c1dd9b6c071e61641cd3900998a40008335d110a047599f8722057ccb"}, @ETHTOOL_A_BITSET_BITS={0x4c, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%\'\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '#\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x69, 0x4, "6c108e8a5c8f4f4885a4a98d28a6b0eb7681a77c53621f0b4f080b0f5acfb0698bfa6f5cae09951a5690cd2421ab5e72fbcb5c262f5b94868feb6e316263871c0501d4bd84853e7b242172606f63290a40ab97b849385b97f6784ffb628e111cc899e12f81"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x2ec, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x60, 0x3, 0x0, 0x1, [{0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '#@'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}]}]}, @ETHTOOL_A_BITSET_BITS={0x158, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '@/-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '$[\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ')\xd7\x1f\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ']\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!/\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x81, 0x5, "f66d8c966b4fb65e50db616be4fdac68a349ac4033146368c824336677f5367425517351adc2867a0578e6d0e0e2e5dd8b731c147c93386bb27717cf039f761ee19f97fa491f3da3554b1826d3b967785891036231a51afe833037790e4f287b3bfc6a0a81f31996fabf41415682e4d8b77a2d134c1b967989e85f1af6"}, @ETHTOOL_A_BITSET_MASK={0xa1, 0x5, "daa09d6bf6eb54df524ad2be3494aed74fea66a8bba47937dad7ae47175377b15edb3cedfd793b0dda0422a9da23363e3b6dc96ccd0b3175dc22533587662c4fd5130f568b47813846894712478a1a7dec06a447aabd28ffb349f9cb1077846dd62fae07df19be1bb2425b199688758571f1f6541876fe2b2a369851f1e5f721ad3ae1aad41be141609b3972f23089410f9436d6833367798ed926881a"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x154, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x110, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '-]\xdc-,]!*\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '-]!#\\-!\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '$&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3d, 0x4, "83dcb6e5896d289f12970c7e8ed70ebf26531463cf419f38d87033df4bca360ef8ae06c7094b4ac01b723d93e9444f9b9cd9b8b1bfbdc3f67b"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1b4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xac, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '^\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ',^$\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xd5, 0x4, "e155858dd30d3f341c750bad75d20bfe006c53ca48305e6f74cf306d6135be38ea23e19974aaa6d27b53771e8de4dd4a3db2c44ff598c5ad632ac103439aabde406f0e802371e0fbe0ec2e9cc950db5d33d380c26cd77428c0d2c497547b1e22f620fc81da87fd13da8dd479c38f4bd6297d4b10ea3d4a0cd38d3b63413fe28da9ea3b02df996b227bb613c2aad7b71827c4eb12705026f0a753578f2e35d2905d1685c01743c0bdba2e0bcb3e36b8ba1d97bd437c061f3ff4e57607e2373b938f75508cc244aa7cf42e05b7596d1b9350"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0x11, 0x5, "788eeb27a0567a80d04bed8b03"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x68, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x5c, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '}\x1e,!&%.\'[-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}]}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x4000}, 0x40040) 22:57:08 executing program 4: socket(0x10, 0x0, 0x9639) 22:57:08 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='GPL\x00', 0x1f, 0xd8, &(0x7f0000000180)=""/216, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001600)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c, &(0x7f0000001180)=[{&(0x7f0000000040)="196e7856d14857b126c03c9b4ecd2c270e41c892f3345d87426a2445884dc8c5a4e9a60bc48ffdd0a4023e7a52b70d7d5ae1d0b952a8bd5377dd7f39dbf33bb1c2ae17020a64c90a38187c7bd85720ef57a366b1f6d173b96867e0cb4eb7176e170b8f756e8317909c02da64e515843b356985db43eabb8f86e286c64727838b83569317041778df6fe8916025242139aa470d227164", 0x96}, {&(0x7f0000000100)="67f3c1baf1257d8b21a69191f5c28bf30d79cd41e0177a77f42b84b32b6ee119fa8dfe7c5e7ac2c9be8032e30965514f6eced32ccf947a6b3d72d04bff93d27532aa9b565376e8eec7c5130055597505f9d57c46ac30dda6f1ca68445f4a9a1961678e9484dcaddf95531824f7d699276f94ca87170201f5ace5bdfe4a24b7198050cb0394e38fc0f2f5412f8ff7a1de82a9a267582ed38ddcd8683364488ba65216e689161f42d5e4d924853415b37371ca907533dcc7fda631018b8941b402184ae54ace8267486fdf007bd60655ff1a544bea637ee72acaacbf7c3895a467f788ba4c149a90bc38550d945fe678e8178f2da2915eb3e4d5e900db14d45765e05766cb7565cd4616d913f4c32725d5fa0681cf65da54d2989ab3b2bfdde983204ee730853865598d5abb1e30a651c09a831df0005e65e3ef3fc7e38b6833509fb1cba3dc7b78db6ac489efe13dd135e42892351c3cbe3a1663bc737daaf76d73084371f93021e1a1c57ee1f467aa28c38f1902e71d6ec421e2b9c6e2ca1a2578218c6b48c63c69e95cd0a327d69f5279e61fe1b6a59de301e5bc418c92a9b50d7f1bfe6e56bc2b5642251b2fcbafcd1f977e36f95374e60c006ac49ea38d0945ba22419bf419624c735d299aca0947f64da86d8d39a6add0bda8c620c0ad61c3a9511c8f65bd617d81b93dd71a665dbaa0460ec3f219ca982b90be560dfe7af27c5837dba9db2fbc2d0af033b73b095bb2cb2034dd469894cdf1820bceb69a437d1e116b68b5b9b8ae1fefe82963c4c60a0976b667be2ba1b4de46a1863969c5b2fcfc60e8efc5091461018ed27656c203b1b375e089ae8bba8e28985e313829a6e2845b9ac7e0e0a8f5b236089e05e74049238873a7150c2578a94fd580a5b6c20c787ca9e72d4553c5c22b341a89f34b4d5bffc3327adbb9a7d037f94cd1fd153c72589e9364a814e6129b0198a38a89c5c82e4bfcaef6be878566cae41134ae2b0313a7320a392425619a38cafc9e104139449ce9c6470971a84d51e48a97c1513c501cfa99a212ec37bdc19f2f0a6510a94b62f29939e5b41d8662c0b974a0295d2e06c8fea4bcb1c5d309816f4582f18c14a2a68160beb89331e8b9535341fc9aa29c25b6789549c78961ced1ee8f67818f52927f65782a57858d905b4d81571e104624f781af483d2c196f51f8f2558e5b13ccc4af0aef75d5e63857ae28cf27194227a0879fae5150be342b3eaa75485eaf6c607a945ab58f1f8bbe53ce70ce5bedcd356fc743a94fa1961b29d3b30cd6e18dd66c0d37512b5f85b93bbfef2ad6789e9d3e65a9880e082f31fa8f4a59ae17d9aac8658863bd936f0babcefabff84f2d9e7374a07bec11f3a7a04eb11221816b54ecf2eb072bb55d431d2a7b8a008105d22218ad997feda45e70b6a307e2ed00fb7e5f5478c96777acaf26647fff088e49dc5f00e4e83630e050f3d723b0a3ecd4ff0e8050696013c72a67c48d812d04f3f4bde8525e3b2fb0a1fbae8ad34949f673205b698736c2917a40acf7e64cb410011fb60172eceb4afb93901b102a11bc23126d9e4b2b9461cd512a3038364289f2b9fa232c10ef93097949040460dbbc6d7822b920075878a95cbce0b01468250e998443def3e452c95d4526361a196fe94d0ee52f890a5bcd25d013f4c5a796eacd0ec624a1b547bdec72640b60262a57cc8d41e73f4059d7dc13a6f376f7b952be17be6b5b98564bf5f18333a0653ac4ec1eef516db6a969acc62dbc08aeb1a7b2b5163c453f518e6b857b4d32fbe18ccae8e592cbbea173ad29fba67652a8106572ef79610a013674ee93cafcb6", 0x517}], 0x2}}], 0x1, 0x0) 22:57:08 executing program 2: bpf$BPF_BTF_LOAD(0x6, 0x0, 0x0) 22:57:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000002c0)=""/165, 0x1a, 0xa5, 0x1}, 0x20) 22:57:08 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000380)={0x0, {0x0, 0x0, 0x84e00000}}) 22:57:08 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x6000, 0x0) 22:57:08 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) 22:57:08 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f00000000c0)={@private2}, 0x14) 22:57:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x7, 0x0, 0x0, [{}]}]}}, &(0x7f00000002c0)=""/165, 0x32, 0xa5, 0x1}, 0x20) 22:57:08 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000ec0)={0x67446698, 0x0, 0x0, 0x0, 0x0, "8d44f34cded26433f0756a82e8f8c2649ffefc424c6095eaf59e82ef8da5ba4db125ca1ff4c08e00cdb26b27a7ca01d8efbea37769bc1bae255ec99dae3e57fd17eaf0901e6a53d07c63c59455d42cb45871d4e7cce96d1881c1aa721f0610428a9604a4db7a1d073c9fe989ee1ffa45ba2a8d5399daaea7de679b0e03f9f587c7c61d32cec6f35a4962faddd720a70071d946852270cb2d76f6957329dd3a49fbbab299cdd18378a80bb1fc4705c219479bf0dc9e3110995ad768f4783add13efa511e8c574369ee7bfcf25b28388c14d5a5928fe22b0d2eafb17f2e38800145969aa5628715e55a97337ce54f915c4cadd0a72a638a545a6af6da3ee7aa3db4885cba325d9f8dba570538773c04293a4b856a77a273b43689920715d6a7e3f27db8df342ac20078bd26375ba294c2bcf6ad5a357adc2854565cce55c698a8d13e74833585a693ddccf78dd1162086b460da119c1bc7883285f0f10a2ef83fb48632ec222215c87746c3746ecd71ee1545c0cff7eb71eb8f87041d64bc3cd25a708592a05019e64929ce9246a845832ad093c5afdec8d7bd3c9e6f3050bc545b1d98a14dbda10b9ba889dea60f11ec4eb6cd9294cf323a2436db146424fc58b5bfeecb311034cf9a08bf2335c69977e119137e00c58295f8d12fa9364933acbb36c700e33c008171cc20135c4a9d4637cb01e2b48d164c0cfb8b7e0fc1d13ee46956f771cf11334cc852cbcdf1fd15ef25657b35189335186678aa5afe33536901ccdbc85c8b78aa4d29e82b777feae47d5cf2b1bfa25b7f9ab7e4f8b2faaaf61197e161b367256f3002f20622ffdc95254c4f8fc5857636a046a5bb0758c95b0395980ec26ef69f992e1f809645322f944a57b23b70c5226f65bc4eca724d0061e7b01bf0cb8ec6b6497e8a04d9cbde34b80c2e720afc3c25b3a9862c282701c9e9a5bc550bc09de985d3bc832bf1eb686c057fe48f2917a64fbbdf07134a95af010b4a46afa5f412cf69f663c9480b6e952868ebfab2b603c9af62c51f05f452fc406a6ffb373c187efd1b40b94aca4f9f2937ffeee7e0db2362b12fff2cf1e2f4aecfdcc4a0dcb80b5fee5bf365a8937720da82c8b6d0c347aa4f7bd32c004043f1c2788271b10568d3d2937a58290ea44cbde359aa286bbc5820ab78c5817f22bf79d794fcf2b3079d248a0f4748d6c8b254fc07b180561a31d9a050a454e1df8e9d2f433fdd4bd8cde1cf309314e06e1d4a8276a570219043e6287a37afe8738e82744bf97248a6b16ed39d3f43bdbc1d2ae8292fe52384af4512bdab0a42c7ed91d505e8c923a394bfb6b2ec97ebeb75c173dd4e469eea9002a4b2d0782e549e3785bd067feb1abe7940f52880567ef8e6cc323f3cf8303426334613c880f1458872c243dc84a60047b85849e698189c2f3347a863da77bf5dc7a5045862f0ecd6e8fb7a807ab9c961c31c3de3bf75997df206e8e7a7cc7f74eab4a925976ea8411f5252bf8fe67d60e8f3b44523be44b7551e7b52d0be9f1d0630358ef01f9788ce64cb66588f0892bde1b0808361d73c802391e87e21176f05b8e3a0afde4a81663f4479e321e833d6b64fc9ca6d149730646ba645f633bc151299a4d1bc2669c60b20e2aa19cbbb66036eb4fcdb354e24dfbb942a2d9f64597e8340db9f2dc0920d885fe8158ac234ff52d0468257a3174b4c891fd96e9c18701de03d83fa48207a6cd774ae6b2657e6d274c27606c9a85adf75d5a75978fb9df58a68168af9b25b08e57676ba38f00f1458709d2fb7837efe69902e2c3c7fef5a13c04dd4f12af3e591f9be343279b9807cc47860d156121310d02688d0850da1dcf4bacfd01da80b0ba701c2d33e22b017cacfc7843bd20866893f59428ffee807317428b4a29c4a83d1ddd9dfd650fa852e19478767b655a689bb303891eae393853221a3f120f059f3ce1f63527b618717d0b8cd4a1d0007c19d61540702c6800dbc2f8d19a215710f29c8c7366d4b98592e7a09c370239c9ef24a77342b84edd7ac451cd311c26e9bc752197390c75a198de419d8539dee7a19ef2b22d94444afc52f76f657188861ddbb3dccab950e4e4ace7cbed5fa9e77b89483a09f86baf840f87b05a1cd181c97063d062ad1a34685416322d2302c6a15cbdcf6ab0967105e3ef4cd7c48221d24edd2ff6c7735ff460f58ce794a747c89b0d8e54a31aec152aff68e6c81fe3b8eafc9c5ad8e084bfda19c125cd4f33beb28062951eb411900484a567fae9d0c9977019ad9d5802fdd935bfc5b00150b912ba174dab95d761af03072e236c050531cf344cfde93191ea023baea0898266342fa180b9108e5c021c81facdc9ffe4f0e4a57cb47fa4e527384ab9504f62fae36def76bfc4ba7e0a7487e8ee67c1ba7950868e4bc184fbee8d53074fa409fb33657d257417728540f5a591cdd8100524dc5e172a31ea1c46c5fdb520d6e8e9599d050665076ba74b49477efb894b83373fa971f4483863d8f2d5ac135f745bc0b5fbb997bad426455d370ab322831f4e7f0cc498b4ff96801563009f557fb8bc0f6531d4ca4c9f98e3fc33b40bf22e7a018cfc7cef424c82c58415dd2579584f79b57cb37f62ec6e763e71b325b79f61428053dba5bde38b7dbc944e93ecb28c5f6e0f4eda5ce04cece5fe1fcf9d33fd3956b05477dc5e6ec564295f306f6e9339200f6acd35dd8eecdcbb5e5bf99e946811cc8235bc8bd445d9a281355cf47818e393fd2896e67072610e618d6c4097e0d2ff1e12a64ff781efec43570274bd026f34c88415a7152d9f620cefe1eaf1698c333ee6957d121597759249f2e71b654c8b7f2b0dac1418601f0c31c88475cc04dabfea9a5348e78049b7c5796f2aaa8262bfd2c3fdb4a623f1d3fd1ce97d57ef082e3853b368e2e371e99ac3221101ada108e2b1518eef7ad58926725a6b99da1e81b9aff88664d05bdd9b877b77b50a85682c7451d4331fa0e75feee9bc20db6297e7e7b603a0a362737ac7135d30ad30e94daba0d2d754801670663a90bc553583aecfbcd5d9d379a6669738418b8ef9cb418d075dd6ab2c4843e9596b3094f9efee8c10f75011aa0a9219ac1ef6fd308093c5c00f79add48c51fef46492c681eb0026701c30371110b2477efaaf2e7d95f6735552ffaf1359495d3444f24f6c1ef91500a950db40eb8e55151a93ea4643cd42979a9410643f912de2ccc0e1000a231034e45fd1b06e6f2bacf26543c39e7a69a5c7cfd06eb17880f3c0b039ce2444cdb18a07ae7396dcf84f4ffa7d6420a1be94a80d74b04afaa0e8fe7018d8d3f2fff7168ca49bac710fcbf8709f4026ed61fa41cde3cce5281ebebb2026ffcda18f4d44aadf33005cbaaf9fb8d9721d6b0e2c143bab5784f79915936af545e5e8e32bb536d7f4d59628224af5ed2a00cf4d68a0d10d878598941239ce880be90d8e0fcce2ec8851c19c38d221ac487952dbfa8636c1c5cfc2327bef9f4ad8d53e76513dcb0efc6878048b53d3a1145c48e0725c012e57e0ade644b8505f82f57154e11bb6280f43c8b7f06e6501b93953d7a4ec850c3a9ce52dea7d2c606c7c005817dd7437929a9b85a6fbb053de28a10a81a6466e333edaafc38cc56562d645c96026b6bc14c6b3ed3ef52fe5025339ece3df2a6aba6277c7eab8db2ebb4ab51fd0a9408306fa3ce1bb4d4afb9803e09f140f76abb1cc74f58598fc4b5f2ac040a9e2c2179a925e9849693e83e6d1919e43f4679bb3311c4637068fc008aa701e770ff7ac95f14819ab17410cfd28963a721a300c611a48f094bc24146fe3afc7d3cc702dea230d140cc84353f1375e5f6343ec83d4e740ab5859ad8443306108df9b2998353f96d690ac9dcf342581df4929914c256dceb29547a80924c22b04b54c2f7bd5bd78e628d0474a2bc48378b2b8c6e370532d212320035ef1a8c663cff4fe3016cdb6924ce07b5ce1ff41c068918b49c3e3988fea38c1313fde4e1126b1de577ee58559a973ba43fa58499b1c60d6c9155d23e83130449c03fb68399534bb6a5649b88ce27ea32172888c4dba64baa4c297271fad7b2e4b05bc14148473e0271921f821e8ebdbc0ead994650878b330c813135158faa20da72a9f42294ba2db3290296c953283f3e1a96904c78583a8f78f9230171b2f19dff0278e50febfcbb8d22913e9055c643a5c45aa09a0b03d131342cccf2cee432093c6aba30d221f8330a2f04a10321fa1af3e8e1d1a47811d2dd9ac69faa1e2b51c09ac947f008521bb96f1fc8b35d309f41093a48759b7016d528a20f65852333852934594a54f3532ef66f344cc4bd84384c0ea05b6c3ffd9ff3281eb2b5332207693fd349f87b13be824e3bedad68e88bfc16d28e035372cccc911fad33d396cad2bb6d388e60ddd1513569732fdd556d30c261b40f6073b76a20a0edf0f9d72e0a32a2e9b4c3f5e1dce1b5dcf0d73a7c695bbcae11365f3d0bcadae503d962fa3f48bbf34c7f67c00514788dfa460e116832253b65d3da957142570613f3d96c939ae070889a234704e7e6216c81dbf8f3b9ec7a971982dc8aeace550bb8ffa9dee8ccbb84ad072ab8b350eb0d414b2320aa00ba8d5509f76d9f6d9d13bca11cdb69d14c7dc73654684c3ab069f0b4c577cc7c58c62a069ac2aad219fa4b6b9bce36015b543da0e815e52644a4a899197b5d63117793676de47bfa0c8107b394c635c149eeb0396af8fde1fbb5f79b3ffbfbc8f80c5f580ed7d6c8cc7ff99ba8c740e9da3b5f3af13f5995844fe02bce45fe37cb6f9393afe383359f624a69cbaa201254b57c3bdcec383856ac00edf334935b6775f30d8ee0807dc8f0fecc2b8ed469a2160f9eb4c7a2f68f14a95dfcbbf5562884a241a6432828c24e3a0c81bacb8ddbe0ca6f6363a93c891d3c7cae4839e69accb21ca531ec9adad1c8432d413af7fefc392914eb09987a53a94235fa5673ffc805de3c40486d81b58feb4f45b5642e6db667a0b0c0c7accb2e53316953b20bcbe6c05965ea0f3c4e58f33daa87b87914534c97d952f0a86da01fc63c5841053c8571cda518b41a76bdd503d3bc2f9509aaad9662858f2c069bfbac7697ea395bb18dd42188a8001707c835f943fbd15a2808b71ea09a15fd1f3a94e31fc6754a523463a33ebf2aa7836544f29f388cbeb2c28a0f27c00a4ce682a5ca5a8b7e84b31c3ef50afafd99ce18472317dd53e299a19fcd1c6e1b21d97ab84261627d0598dc6b45e7402a62ab6420a8192dd489627392dbbc9b58afa3a74d542c7f9d3c6481d99404872d72f46a86e0eb13ab6eb293f986e7c99ba21c34bc790de909354b6634dfc5eeac43c6a3818eb649c06f3fc5e350b8d667d7c39153717ae0ca02384be8f307c6db90a49ae6dc59d44aa5ff2dd5314c0b7bbe2a51e6f796f24f82a72fc78297b80c516d49eeaf0913c5b233a03a8105f3b15bc1d0f5bde466bcea13a21b25d022a2d8a7b8d70647e458008215f6205c4901f0dbcd3002759cb1fb50c2cb51f0ca846168aaf8dae47b1ab2fb4a4a58d97353d340ace0a255b0a0202610a70609244112007b48db9b946a3ece1e053ce6f6a0e5350e0442fc0fe9a33a98897685e8ee14cd7242092c3badcc409a0bb4eb6b900a8e79ba2eefe49d682d126716114c0d93096f517d7671351978316e11cc5b333e60f79f1a3c52999e6c317479f4b0ba9a7e47b390e2afff08d3f03dd7c6550345a1b35f76d4eede62b0d6191b798b1491d4455c1f0"}, 0x1001) 22:57:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000002c0)=""/165, 0x26, 0xa5, 0x1}, 0x20) 22:57:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}}, &(0x7f00000002c0)=""/165, 0x32, 0xa5, 0x1}, 0x20) 22:57:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000006f40)=[{{&(0x7f0000000000)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000000d9"], 0x18}}], 0x1, 0x0) 22:57:08 executing program 5: bpf$BPF_BTF_LOAD(0x8, 0x0, 0x0) 22:57:08 executing program 0: memfd_create(&(0x7f0000000000)='/proc/schedstat\x00', 0x2) 22:57:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x2, 0x0, 0x0, [{}]}]}}, &(0x7f00000002c0)=""/165, 0x32, 0xa5, 0x1}, 0x20) 22:57:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x7}}, &(0x7f00000002c0)=""/165, 0x1a, 0xa5, 0x1}, 0x20) 22:57:08 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 22:57:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) 22:57:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x2}]}, {0x0, [0x0]}}, &(0x7f00000002c0)=""/165, 0x27, 0xa5, 0x1}, 0x20) 22:57:08 executing program 4: r0 = socket$inet(0x2, 0x3, 0x8) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 22:57:08 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000040)=0xffff, 0x8) 22:57:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000ec0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x68c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x160, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '}\x1a/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-]\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '\'\'!:/*}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '^)[.*\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ':)}@\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_BITS={0xa8, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '.(!^:}\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ',-%{\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0x134, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, '(-,\xb8(/{!^++,(\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '\'*+\x96+]-\xb1-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x6d, 0x5, "87a7619d457f77345510494cf10cb376dca57992c83a25cb193fe71eb7cad9ed8d0dcbc6e39260c1b88b59ef0a6ba35c361ec04933f2267e1c4b41ffd1a1a221c925ddbd9fc90014f8f7d2217c2ffd6b08fb46b64d23fe1395f3d73f1b17ce2bd797da12093aa902fd"}, @ETHTOOL_A_BITSET_MASK={0xe9, 0x5, "d3776d19429739c036addd7ffd60e0353500dffd0a729e9a0a44eb713b459c97768959be3d15ce6fc70f641ac92e52eceac365af46b410270847a01de29be5b2272abcbdec1053a3d2e74ae150f5d923cb290a0f7544522cd61f14d78fb970213edf6a082c0dd23dc3396aae28d23725b044c9c8a420e741c1cdbc0d7ce5a93be38e46a688caf072be1fce502313931655397eef41c8a00eea3115f37b410386bbc3d112776f2ee9efc5612c0b9b4353a3bd95a4217448ce2f70654d412f9ab3e0badf623592ffe8774c55e5195ccdfb68f270ffca19f1c997cfe83f7f8b409ceb6e32d7a2"}, @ETHTOOL_A_BITSET_VALUE={0xe9, 0x4, "dfc7c871eacc29ce3d2a32f99c76596dd6508070d73a6f679bab755cb4dbd51667b296593659dda598dc79a4feb6618b008be15c106c3d90ed994cbbb0de31f0593c009e8136ca85406ffc309c3529558b1596d0c2ff899e6f30accef7ee59b314d8ccefb6ba2b3efe066e54bc580e31967a98f7a99f42019d1530a5a251feb57faecb1057f89886123ea34bbc3f5f5fda941f0c51b62b4beea1876a8558e86b37d7db89ea2a2a0b417158312c1a13c3b69cd7fa488c2c9f34025bc3987c97961baa1b760174695673949660d63c16447434f070b3014e3e0efcc1152f89e1cffd8b5ce6af"}, @ETHTOOL_A_BITSET_MASK={0xe1, 0x5, "f9adc7619bd7facb8bd22bdae5e8a59a71e6d2f5c7434d0b77571a91de6d7a62214c9c56a46deb7c9563f4094471e1ba2d2446c4de8d3b9d1e02c85d6400b5a4e641b9c4e9b41a808ccfcb16f8c5e5fd88032e2255073ace0b07910291438ed15a60eec544fce53884ed835404f008db504023b6ed2eaad408c447712d7c6453f5d616fbac435dd0fcc278be3d1c313b566e12cbaf98d6a6a9b59f37207490148c43521725556a1536ae558105b2afd7088db1c67ee27100fce05b15a9ce0ba23a8451e9ff0546a7173b5ee443407c0e6a099cda670105580271f260d9"}, @ETHTOOL_A_BITSET_BITS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1b0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xed, 0x4, "2d56e66bb90b1eaaa6d7020d41deb7d456ea0c53723ac517fd9916b2ea59b18b155f82e6850380a4cfa76dbc90eff961028f9e09acc238b4d72ffb5dbefaa4986d9ed3b002b1d5b0559abd420eb52ddb25194ba6c194aec8ae257c1343cb0dc33912716890ee33a774ceb93928b7362ec80f06c218b54ea16662482790a326c5691a3ca46fbdcee1573a6a5c89ac55e39d3a75949ff2633bd393c756f9f327c0051437964febf3d052c105e57f53b6a78c359a771d51b2a1e8d82d94a3489741e1fb9f6c1008e4a1bd64564f5c1dd9b6c071e61641cd3900998a40008335d110a047599f8722057ccb"}, @ETHTOOL_A_BITSET_BITS={0x4c, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%\'\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '#\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x69, 0x4, "6c108e8a5c8f4f4885a4a98d28a6b0eb7681a77c53621f0b4f080b0f5acfb0698bfa6f5cae09951a5690cd2421ab5e72fbcb5c262f5b94868feb6e316263871c0501d4bd84853e7b242172606f63290a40ab97b849385b97f6784ffb628e111cc899e12f81"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x2ec, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x60, 0x3, 0x0, 0x1, [{0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '#@'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_BITS={0x158, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '@/-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '$[\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ')\xd7\x1f\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ']\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!/\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x81, 0x5, "f66d8c966b4fb65e50db616be4fdac68a349ac4033146368c824336677f5367425517351adc2867a0578e6d0e0e2e5dd8b731c147c93386bb27717cf039f761ee19f97fa491f3da3554b1826d3b967785891036231a51afe833037790e4f287b3bfc6a0a81f31996fabf41415682e4d8b77a2d134c1b967989e85f1af6"}, @ETHTOOL_A_BITSET_MASK={0xa1, 0x5, "daa09d6bf6eb54df524ad2be3494aed74fea66a8bba47937dad7ae47175377b15edb3cedfd793b0dda0422a9da23363e3b6dc96ccd0b3175dc22533587662c4fd5130f568b47813846894712478a1a7dec06a447aabd28ffb349f9cb1077846dd62fae07df19be1bb2425b199688758571f1f6541876fe2b2a369851f1e5f721ad3ae1aad41be141609b3972f23089410f9436d6833367798ed926881a"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x154, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x110, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '-]\xdc-,]!*\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '-]!#\\-!\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '$&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3d, 0x4, "83dcb6e5896d289f12970c7e8ed70ebf26531463cf419f38d87033df4bca360ef8ae06c7094b4ac01b723d93e9444f9b9cd9b8b1bfbdc3f67b"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1b4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xac, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '^\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ',^$\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xd6, 0x4, "e155858dd30d3f341c750bad75d20bfe006c53ca48305e6f74cf306d6135be38ea23e19974aaa6d27b53771e8de4dd4a3db2c44ff598c5ad632ac103439aabde406f0e802371e0fbe0ec2e9cc950db5d33d380c26cd77428c0d2c497547b1e22f620fc81da87fd13da8dd479c38f4bd6297d4b10ea3d4a0cd38d3b63413fe28da9ea3b02df996b227bb613c2aad7b71827c4eb12705026f0a753578f2e35d2905d1685c01743c0bdba2e0bcb3e36b8ba1d97bd437c061f3ff4e57607e2373b938f75508cc244aa7cf42e05b7596d1b9350da"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0x11, 0x5, "788eeb27a0567a80d04bed8b03"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x68, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x5c, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '}\x1e,!&%.\'[-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}]}]}]}, 0xec4}}, 0x0) 22:57:08 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6b057bbe2bc48b1c}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x4080}, 0x0) 22:57:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f00000002c0)=""/165, 0x32, 0xa5, 0x1}, 0x20) 22:57:08 executing program 5: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 22:57:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x5}]}]}}, &(0x7f00000002c0)=""/165, 0x32, 0xa5, 0x1}, 0x20) 22:57:08 executing program 0: syz_mount_image$squashfs(&(0x7f00000001c0), &(0x7f0000000000)='./file0\x00', 0x1000010, &(0x7f0000000440)=ANY=[], 0x1, 0x1aa, &(0x7f0000002380)="$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") 22:57:08 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@private2}, 0x14) 22:57:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f00000002c0)=""/165, 0x26, 0xa5, 0x1}, 0x20) 22:57:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000002c0)=""/165, 0x1a, 0xa5, 0x1}, 0x20) 22:57:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f00000002c0)=""/165, 0x32, 0xa5, 0x1}, 0x20) 22:57:08 executing program 4: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000080)={0x0, &(0x7f00000002c0)=""/165, 0x0, 0xa5}, 0x20) 22:57:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) 22:57:08 executing program 0: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x40c2, 0x0) 22:57:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f00000002c0)=""/165, 0x26, 0xa5, 0x1}, 0x20) 22:57:09 executing program 1: syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x801) 22:57:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000002c0)=""/165, 0x1a, 0xa5, 0x1}, 0x20) 22:57:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000006f40)=[{{&(0x7f0000000000)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000003c0)=ANY=[], 0x18}}], 0x1, 0x0) 22:57:09 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0xffffffffffffffff, 0x0) 22:57:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000006f40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x18}}], 0x1, 0x0) 22:57:09 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x29) 22:57:09 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) write$uinput_user_dev(r0, &(0x7f0000000180)={'syz1\x00'}, 0x45c) 22:57:09 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x1, &(0x7f0000000040)=@raw=[@func], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xf8, &(0x7f00000002c0)=""/248, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:09 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x2, &(0x7f0000000380)=@raw=[@map_val], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000700), r0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r0) 22:57:09 executing program 2: bpf$BPF_BTF_LOAD(0x1b, 0x0, 0x0) 22:57:09 executing program 0: socket(0x26, 0x5, 0xfffffff8) 22:57:09 executing program 4: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 22:57:09 executing program 5: bpf$BPF_BTF_LOAD(0x1a, 0x0, 0x0) 22:57:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x2}]}}, &(0x7f00000002c0)=""/165, 0x26, 0xa5, 0x1}, 0x20) 22:57:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x2, &(0x7f0000000380)=@raw=[@map_val], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f00000002c0)=""/165, 0x32, 0xa5}, 0x7ffff) 22:57:09 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x26, 0x5, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r5, 0x894c, 0x0) connect$unix(r5, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000005c0)={0x0, &(0x7f0000000140)}, 0x10) tkill(0x0, 0x9) r6 = socket$netlink(0x10, 0x3, 0x0) writev(r6, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) writev(r6, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001000111868090707a640000f0021ff3f04000000170a001700000000040037001000030001632564aa58b9a64411f6bbf44dc48f57", 0x39}], 0x1) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000480)) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000003180)={{{@in6=@private0, @in6=@initdev}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, 0x0) 22:57:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x4d}}]}, 0x34}}, 0x0) 22:57:09 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/schedstat\x00', 0x0, 0x0) inotify_rm_watch(r0, 0x0) 22:57:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f00000002c0)=""/165, 0x32, 0xa5, 0x1}, 0x20) 22:57:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000ec0)={0xec4, 0x0, 0x0, 0x70bd28, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x68c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x160, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '}\x1a/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-]\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40cf}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '\'\'!:/*}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '^)[.*\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ':)}@\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4a4}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}]}]}, @ETHTOOL_A_BITSET_BITS={0xa8, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '.(!^:}\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ',-%{\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40000}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0x134, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, '(-,\xb8(/{!^++,(\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '\'*+\x96+]-\xb1-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x6d, 0x5, "87a7619d457f77345510494cf10cb376dca57992c83a25cb193fe71eb7cad9ed8d0dcbc6e39260c1b88b59ef0a6ba35c361ec04933f2267e1c4b41ffd1a1a221c925ddbd9fc90014f8f7d2217c2ffd6b08fb46b64d23fe1395f3d73f1b17ce2bd797da12093aa902fd"}, @ETHTOOL_A_BITSET_MASK={0xeb, 0x5, "d3776d19429739c036addd7ffd60e0353500dffd0a729e9a0a44eb713b459c97768959be3d15ce6fc70f641ac92e52eceac365af46b410270847a01de29be5b2272abcbdec1053a3d2e74ae150f5d923cb290a0f7544522cd61f14d78fb970213edf6a082c0dd23dc3396aae28d23725b044c9c8a420e741c1cdbc0d7ce5a93be38e46a688caf072be1fce502313931655397eef41c8a00eea3115f37b410386bbc3d112776f2ee9efc5612c0b9b4353a3bd95a4217448ce2f70654d412f9ab3e0badf623592ffe8774c55e5195ccdfb68f270ffca19f1c997cfe83f7f8b409ceb6e32d7a25c88"}, @ETHTOOL_A_BITSET_VALUE={0xe9, 0x4, "dfc7c871eacc29ce3d2a32f99c76596dd6508070d73a6f679bab755cb4dbd51667b296593659dda598dc79a4feb6618b008be15c106c3d90ed994cbbb0de31f0593c009e8136ca85406ffc309c3529558b1596d0c2ff899e6f30accef7ee59b314d8ccefb6ba2b3efe066e54bc580e31967a98f7a99f42019d1530a5a251feb57faecb1057f89886123ea34bbc3f5f5fda941f0c51b62b4beea1876a8558e86b37d7db89ea2a2a0b417158312c1a13c3b69cd7fa488c2c9f34025bc3987c97961baa1b760174695673949660d63c16447434f070b3014e3e0efcc1152f89e1cffd8b5ce6af"}, @ETHTOOL_A_BITSET_MASK={0xe1, 0x5, "f9adc7619bd7facb8bd22bdae5e8a59a71e6d2f5c7434d0b77571a91de6d7a62214c9c56a46deb7c9563f4094471e1ba2d2446c4de8d3b9d1e02c85d6400b5a4e641b9c4e9b41a808ccfcb16f8c5e5fd88032e2255073ace0b07910291438ed15a60eec544fce53884ed835404f008db504023b6ed2eaad408c447712d7c6453f5d616fbac435dd0fcc278be3d1c313b566e12cbaf98d6a6a9b59f37207490148c43521725556a1536ae558105b2afd7088db1c67ee27100fce05b15a9ce0ba23a8451e9ff0546a7173b5ee443407c0e6a099cda670105580271f260d9"}, @ETHTOOL_A_BITSET_BITS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1b0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xed, 0x4, "2d56e66bb90b1eaaa6d7020d41deb7d456ea0c53723ac517fd9916b2ea59b18b155f82e6850380a4cfa76dbc90eff961028f9e09acc238b4d72ffb5dbefaa4986d9ed3b002b1d5b0559abd420eb52ddb25194ba6c194aec8ae257c1343cb0dc33912716890ee33a774ceb93928b7362ec80f06c218b54ea16662482790a326c5691a3ca46fbdcee1573a6a5c89ac55e39d3a75949ff2633bd393c756f9f327c0051437964febf3d052c105e57f53b6a78c359a771d51b2a1e8d82d94a3489741e1fb9f6c1008e4a1bd64564f5c1dd9b6c071e61641cd3900998a40008335d110a047599f8722057ccb"}, @ETHTOOL_A_BITSET_BITS={0x4c, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%\'\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '#\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x69, 0x4, "6c108e8a5c8f4f4885a4a98d28a6b0eb7681a77c53621f0b4f080b0f5acfb0698bfa6f5cae09951a5690cd2421ab5e72fbcb5c262f5b94868feb6e316263871c0501d4bd84853e7b242172606f63290a40ab97b849385b97f6784ffb628e111cc899e12f81"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x2ec, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x60, 0x3, 0x0, 0x1, [{0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '#@'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_BITS={0x158, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '@/-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '$[\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ')\xd7\x1f\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x51}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ']\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!/\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x83, 0x5, "f66d8c966b4fb65e50db616be4fdac68a349ac4033146368c824336677f5367425517351adc2867a0578e6d0e0e2e5dd8b731c147c93386bb27717cf039f761ee19f97fa491f3da3554b1826d3b967785891036231a51afe833037790e4f287b3bfc6a0a81f31996fabf41415682e4d8b77a2d134c1b967989e85f1af6acc5"}, @ETHTOOL_A_BITSET_MASK={0xa3, 0x5, "daa09d6bf6eb54df524ad2be3494aed74fea66a8bba47937dad7ae47175377b15edb3cedfd793b0dda0422a9da23363e3b6dc96ccd0b3175dc22533587662c4fd5130f568b47813846894712478a1a7dec06a447aabd28ffb349f9cb1077846dd62fae07df19be1bb2425b199688758571f1f6541876fe2b2a369851f1e5f721ad3ae1aad41be141609b3972f23089410f9436d6833367798ed926881a79e5"}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x154, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x110, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '-]\xdc-,]!*\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '-]!#\\-!\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '$&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xad}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3e, 0x4, "83dcb6e5896d289f12970c7e8ed70ebf26531463cf419f38d87033df4bca360ef8ae06c7094b4ac01b723d93e9444f9b9cd9b8b1bfbdc3f67b36"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1b4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xac, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '^\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, '/proc/schedstat\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ',^$\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xd6, 0x4, "e155858dd30d3f341c750bad75d20bfe006c53ca48305e6f74cf306d6135be38ea23e19974aaa6d27b53771e8de4dd4a3db2c44ff598c5ad632ac103439aabde406f0e802371e0fbe0ec2e9cc950db5d33d380c26cd77428c0d2c497547b1e22f620fc81da87fd13da8dd479c38f4bd6297d4b10ea3d4a0cd38d3b63413fe28da9ea3b02df996b227bb613c2aad7b71827c4eb12705026f0a753578f2e35d2905d1685c01743c0bdba2e0bcb3e36b8ba1d97bd437c061f3ff4e57607e2373b938f75508cc244aa7cf42e05b7596d1b9350da"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0x11, 0x5, "788eeb27a0567a80d04bed8b03"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x68, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_BITS={0x5c, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '}\x1e,!&%.\'[-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}]}]}]}, 0xec4}}, 0x0) 22:57:09 executing program 3: bpf$BPF_BTF_LOAD(0xf, 0x0, 0x0) 22:57:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x5}]}]}}, &(0x7f00000002c0)=""/165, 0x32, 0xa5, 0x1}, 0x20) 22:57:09 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/schedstat\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0xc0045878, 0x0) [ 338.522601] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. 22:57:09 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000380)={0x0, {0x0, 0x0, 0x6, 0x0, 0x40}}) 22:57:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) [ 338.784867] device gretap0 entered promiscuous mode 22:57:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000016980)=[{{0x0, 0x0, &(0x7f0000010680)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) 22:57:10 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000006c0)='batadv0\x00', 0x10) [ 339.105109] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 339.113778] 0ªX¹¦Dö»: renamed from gretap0 [ 339.123021] device c0ªX¹¦Dö» left promiscuous mode 22:57:10 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000001d40), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_INFO(r0, 0x401c5820, 0x0) 22:57:10 executing program 5: openat$bsg(0xffffffffffffff9c, 0x0, 0x181000, 0x0) 22:57:10 executing program 2: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 22:57:10 executing program 0: pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000300)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) 22:57:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat$binderfs(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(r0, &(0x7f0000016980)=[{{&(0x7f000000e2c0)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000010680)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, &(0x7f0000016b40)) 22:57:10 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) 22:57:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001a80)={'veth0_vlan\x00', &(0x7f0000000840)=@ethtool_per_queue_op={0x4b, 0xf}}) 22:57:10 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmsg(r0, &(0x7f0000003500)={0x0, 0x0, 0x0}, 0x0) 22:57:10 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:57:10 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x181000, 0x0) 22:57:10 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x1000001, 0x1c2542) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000001c0)=@urb_type_iso={0x0, {0x1, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [{}]}) 22:57:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 22:57:10 executing program 4: syz_open_dev$sndctrl(&(0x7f00000005c0), 0x0, 0x2501) 22:57:10 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) 22:57:10 executing program 2: syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) 22:57:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x10, 0x0, 0x0, 0x6}, 0x48) 22:57:11 executing program 1: unshare(0x0) timer_create(0x9, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x404a410}, 0x0) r1 = socket(0x840000000002, 0x3, 0xff) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0xadc688d28a799772, 0x2, 0x0, 0x0, 0x3, @private2={0xfc, 0xf}, @mcast1={0xff, 0x0}, 0x3f00}}) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) sendmmsg$inet(r1, &(0x7f0000005240)=[{{0x0, 0xfffffdef, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xfffffdef}], 0x4000095, 0x401eb94) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@local, @remote}, 0x4) fcntl$setlease(r3, 0x400, 0x1) read$watch_queue(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) unshare(0x4a040000) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vxcan1\x00', 0x0}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000001c0)=r4) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x5000222}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="c4000000200000002bbd7000fddbdf250a0020087f0000010200000014000200fc00000000000000000000000000000114000100fe800000000000000000000000000020080018004e204e2014000200fc01000000000000000000000000000114000100fc0200000000e85d19c364bc8b6d96cde9b8e087d82a0000000000000000000114000200ff02000000000000000000000000000114000100fe8000000000000000000000000000231400010000000000000000000000000000000000140001000000000000000000000000009f506d3db0552b3e5400"], 0xc4}, 0x1, 0x0, 0x0, 0x4000090}, 0x24040050) 22:57:11 executing program 4: open(0x0, 0x0, 0xea) timer_create(0x9, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={&(0x7f0000000140)="581347847052d9f54db650a41014fd7fc4f51cc2dcd490b7f469443b", &(0x7f00000002c0)="fc336a201ae46f3439ed892394ae4c7697748059dc5bfb051803a87733d1ef859d26b76abdf28f96ba73bd5c73601bbc28e306570550dbe880d5332e43fe3676d71e33727132c85a919f61b9d72c1bf69332b0561b29ce2f25b29c1dc2fd64292f5c6ad19fa17bfae96c8194b76873c621fabcbf2e5a67768ab6d8a7447a2c75cae3b3776d2123586dabbd3819224292ea22ec002138dd0ea42bca3ac6ce614c8d56a1ce58a70c41b807c841e54a7b56e03297df4771e72c14"}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r2 = socket$inet6(0x10, 0x2, 0x0) sendfile(r2, r1, 0x0, 0x8) r3 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mkdirat(r3, &(0x7f00000000c0)='./bus\x00', 0x17b) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000780)=ANY=[@ANYBLOB="3c8005001d0000042abd7000fedbdf250a000000", @ANYRES32=0x0, @ANYBLOB="20000000080007000104000008000700f7ffffff0800040005000000080001000a01010285fa237a4859069b915a3aee786ea3a749e6603467695ffb2660975d52e5a1d7f42a6a98b2966a679bde9d5d5472663c8b5cf4107474a7ef4d858063c6b754c2d46dcaf4390c47c1d092b83cb639c88fe128f607b794c107c0222635c07a499c4b"], 0x3c}, 0x1, 0x0, 0x0, 0x4080}, 0x24000014) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x200, 0x0) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) r6 = socket$inet6(0xa, 0x401000000001, 0x0) open$dir(&(0x7f0000000380)='./bus\x00', 0x8000, 0x80) close(r6) r7 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) sendfile(r7, r6, 0x0, 0xfffffffb) sendfile(r7, r5, 0x0, 0xfffd) sendmsg$TIPC_NL_MON_SET(r5, &(0x7f0000000240)={&(0x7f00000001c0), 0xc, &(0x7f0000000200)={&(0x7f0000000840)={0x218, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0x10c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff8000}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x893f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x3, @remote, 0x1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1f}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x9, @private0}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x3, @local, 0x8}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @l2={'ib', 0x3a, 'rose0\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80}]}, @TIPC_NLA_LINK={0x38, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}]}, @TIPC_NLA_NET={0x48, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3e}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}, @TIPC_NLA_MEDIA={0x8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x4}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8}]}, @TIPC_NLA_SOCK={0x50, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xb54}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2d4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x800}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffff78}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3d4}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10000}, @TIPC_NLA_CON_NODE={0x8}]}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x8080}, 0x40004) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x44810) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) write$FUSE_INIT(r4, &(0x7f00000003c0)={0x50, 0x0, 0x0, {0x7, 0x24, 0x0, 0x2000, 0x200, 0x1, 0x401, 0x80}}, 0x50) 22:57:11 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\x15\xf7^\xf9\x12\x0f\xbd+\xa7\xce\xfa%\x98\xc6\x1e\x1e\xf8\x0213\xce\x89x\xb6\x9b\xfbp\x9f\xd5\x9d\b\xb7\x1b\xcc\x91\xc9\x12\xb01\xa8\x1e\xdb\xea+\xfd\x8d\xe7\xdc\x90\x90\xa8\x1a\xa6%\xc2\x85d?\x15W\xc0\xb9\xfb\x01&\xbb\xce6\xe7\x96\xf2\xf5\n!\xc5\xe2\xef\xce\xff\xec\xac9\x98\xb4<\xc5|\x0e\xae', 0x200) ftruncate(r0, 0x8007999) mmap(&(0x7f000048c000/0x3000)=nil, 0x3000, 0xa603, 0x2012, r0, 0x0) [ 340.092814] usb usb7: usbfs: process 15584 (syz-executor.3) did not claim interface 0 before use 22:57:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x1e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @dev}], 0x1c) 22:57:11 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x15\xf7^\xf9\x12\x0f\xbd+\xa7\xce\xfa%\x98\xc6\x1e\x1e\xf8\x0213\xce\x89x\xb6\x9b\xfbp\x9f\xd5\x9d\b\xb7\x1b\xcc\x91\xc9\x12\xb01\xa8\x1e\xdb\xea+\xfd\x8d\xe7\xdc\x90\x90\xa8\x1a\xa6%\xc2\x85d?\x15W\xc0\xb9\xfb\x01&\xbb\xce6\xe7\x96\xf2\xf5\n!\xc5\xe2\xef\xce\xff\xec\xac9\x98\xb4<\xc5|\x0e\xae', 0x200) ftruncate(r0, 0x8007999) mmap(&(0x7f000048c000/0x3000)=nil, 0x3000, 0xa601, 0x2012, r0, 0x0) 22:57:11 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) write(r0, &(0x7f00000000c0)="0c671746797f7ceedc22ea3ebe4b379ce2a8f51ca319490c156137ca7594cbf42386ef5be66465ee", 0x28) [ 340.215769] IPVS: ftp: loaded support on port[0] = 21 22:57:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000001140)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000e00)=[{0x0, 0x8c}], 0x1, &(0x7f0000001100)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}], 0x20}, 0x0) [ 340.273653] audit: type=1804 audit(1671404231.202:15): pid=15596 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir3293278816/syzkaller.yyC7DA/299/bus" dev="sda1" ino=14673 res=1 22:57:11 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x2) 22:57:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="2c0000000b0601"], 0x2c}}, 0x0) [ 340.392133] audit: type=1804 audit(1671404231.202:16): pid=15596 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir3293278816/syzkaller.yyC7DA/299/bus" dev="sda1" ino=14673 res=1 22:57:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001800)={&(0x7f00000016c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4}}, @ptr={0x7}, @struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}, {}]}, @typedef]}}, &(0x7f0000001740)=""/134, 0x6e, 0x86, 0x1}, 0x20) 22:57:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, &(0x7f0000000080)=""/167, 0x1000000, 0xa7, 0x1}, 0x20) 22:57:11 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = gettid() sendmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x40}, 0x0) 22:57:11 executing program 5: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000ec0)={0x0, 0x0}, 0x8) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) ioctl$FS_IOC_FSSETXATTR(r1, 0x5450, 0x0) [ 340.515362] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 340.538947] audit: type=1804 audit(1671404231.202:17): pid=15596 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir3293278816/syzkaller.yyC7DA/299/bus" dev="sda1" ino=14673 res=1 22:57:11 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in], 0x7) 22:57:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x84, 0x0, 0x0) 22:57:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x88, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 22:57:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x41, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) [ 340.614445] audit: type=1804 audit(1671404231.282:18): pid=15615 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir3293278816/syzkaller.yyC7DA/299/bus" dev="sda1" ino=14673 res=1 22:57:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x5, 0x0, 0x0, 0x0, 0x1000, 0x1}, 0x48) 22:57:11 executing program 2: socketpair(0x10, 0x2, 0x400, &(0x7f0000000040)) 22:57:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x6, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 22:57:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x17, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 22:57:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x2, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 22:57:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0x268}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 22:57:11 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @dev}], 0x2) 22:57:11 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000040)={0x10, 0x1404, 0x101}, 0x10}}, 0x0) 22:57:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)=ANY=[@ANYBLOB="9fee270d6524ebfeaa58e5000000000000180000001800000002070000000000002c091367000000000000000000000000080000000000"], &(0x7f0000000340)=""/201, 0x32, 0xc9, 0x1}, 0x20) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFT_BATCH(r1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000001c0)={'erspan0\x00', &(0x7f0000000880)={'syztnl2\x00', 0x0, 0x40, 0x40, 0x8, 0x4, {{0x34, 0x4, 0x3, 0x26, 0xd0, 0x64, 0x0, 0x1, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x23}, @multicast2, {[@cipso={0x86, 0x12, 0x0, [{0x2, 0x8, "b886c8c4b37b"}, {0x1, 0x4, '#<'}]}, @end, @end, @timestamp={0x44, 0x1c, 0x3b, 0x0, 0x7, [0x0, 0x80000001, 0x6, 0x8, 0x975c, 0x3]}, @timestamp_addr={0x44, 0x4c, 0xfe, 0x1, 0x7, [{@private, 0x9}, {@empty}, {@rand_addr=0x64010100}, {@broadcast, 0x6}, {@empty, 0x7}, {@empty, 0xfffffffa}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, {@loopback, 0x3}, {@remote, 0x8}]}, @lsrr={0x83, 0x1b, 0xef, [@rand_addr=0x64010102, @multicast1, @private=0xa010101, @rand_addr=0x64010102, @multicast1, @multicast1]}, @cipso={0x86, 0x11, 0x3, [{0x5, 0xb, "d9e673fbec68bc179b"}]}, @end, @ssrr={0x89, 0xf, 0x6d, [@remote, @dev={0xac, 0x14, 0x14, 0x37}, @multicast1]}, @ra={0x94, 0x4}]}}}}}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000700)={0x6, 0x0}, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0x7066d3ea, 0x6, 0x9, 0x30, 0x1, 0x3ff, '\x00', r2, r1, 0x4, 0x8, 0x1}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e}, [@exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, @alu={0x7, 0x0, 0x0, 0x8, 0x4, 0x4, 0xfffffffffffffff0}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000580)='GPL\x00', 0x0, 0xa2, &(0x7f00000005c0)=""/162, 0x41000, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x5, 0xb, 0xb13, 0x715}, 0x10, r3, 0x0, 0x0, &(0x7f00000007c0)=[r4]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0xa, 0x2, 0x3, 0x9, 0x0, r0, 0x1, '\x00', r2, r1, 0x5, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0xfffffffc, 0x4, 0x4055, 0x80, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2}, 0x48) r5 = socket(0x15, 0x3, 0x5) sendmsg$NFNL_MSG_ACCT_GET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x74, 0x1, 0x7, 0x3, 0x0, 0x0, {0x2, 0x0, 0x5}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x9}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2be7}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x7}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x40000}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x6}]}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x4}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x8}]}, 0x74}, 0x1, 0x0, 0x0, 0x804}, 0x80) 22:57:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@union={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000cc0)=""/218, 0x2b, 0xda, 0x1}, 0x20) 22:57:11 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) poll(&(0x7f0000000340)=[{r0, 0x804}], 0x1, 0x0) 22:57:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000001440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x1, 0x2}]}]}}, &(0x7f0000000080)=""/167, 0x36, 0xa7, 0x1}, 0x20) 22:57:11 executing program 4: r0 = eventfd2(0x0, 0x0) fremovexattr(r0, &(0x7f0000000100)=ANY=[]) 22:57:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2c, 0x0, 0x0) 22:57:11 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000ec0)={0x0, 0x0}, 0x8) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) ioctl$FS_IOC_FSSETXATTR(r1, 0x80086601, 0x0) 22:57:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1600bd80, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 22:57:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="2c0000000d0601"], 0x2c}}, 0x0) 22:57:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0x10, 0x10, 0x2, [@var]}}, &(0x7f0000000240)=""/243, 0x2a, 0xf3, 0x1}, 0x20) 22:57:12 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @dev}], 0x1c) 22:57:12 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1b, 0x0, 0x15, 0x0, 0x0, 0x1}, 0x48) 22:57:12 executing program 4: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, 0x0) 22:57:12 executing program 2: unshare(0x40000400) recvmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) accept$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x7fff, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x7, 0x102, @loopback}, 0x1c) 22:57:12 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) recvmsg(r0, &(0x7f00000026c0)={0x0, 0x0, 0x0}, 0x8000000) 22:57:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x14, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) [ 341.116600] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 22:57:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x8, [@var]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/243, 0x1000000, 0xf3, 0x1}, 0x20) 22:57:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1600bd7d, 0x0, 0x0) 22:57:12 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) getsockname(r0, 0x0, &(0x7f0000000080)) 22:57:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x5, 0x0, 0x0) [ 341.191028] IPVS: ftp: loaded support on port[0] = 21 22:57:12 executing program 1: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x80) 22:57:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x20c0) 22:57:12 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000ec0)={0x0, 0x0}, 0x8) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x10) 22:57:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x21, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 22:57:12 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 22:57:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)=ANY=[@ANYBLOB="9fee270d6524ebfeaa58e50000000000001800"], 0x0, 0x32}, 0x20) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0xa, 0x2, 0x3, 0x9, 0x0, r0, 0x1, '\x00', 0x0, r1, 0x5, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0xfffffffc, 0x4, 0x4055, 0x80, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2}, 0x48) 22:57:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = getpid() sendmmsg$unix(r0, &(0x7f0000002e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee00}}}], 0x20}}], 0x1, 0x0) 22:57:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 22:57:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x16, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 22:57:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xa, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 22:57:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x9, 0x0, 0x0) 22:57:12 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) recvmsg(r0, &(0x7f00000026c0)={0x0, 0x0, 0x0}, 0x0) 22:57:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0xb, [@var={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, 0x61, 0x5f, 0x61]}}, &(0x7f0000000180)=""/183, 0x33, 0xb7, 0x1}, 0x20) 22:57:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x18, 0x0, 0x0) 22:57:12 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x25, 0x0, 0x0) 22:57:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x14, 0x0, 0x0) 22:57:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 22:57:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x72, 0x0, 0x0) 22:57:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000001440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {0x3}, {}, {0x1}, {0x7, 0x1}]}]}}, &(0x7f0000000080)=""/167, 0x4e, 0xa7, 0x1}, 0x20) 22:57:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/243, 0x1a, 0xf3, 0x1}, 0x20) 22:57:13 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x17, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @dev}], 0x1c) 22:57:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, &(0x7f0000000080)=""/167, 0x3e, 0xa7, 0x1}, 0x20) 22:57:13 executing program 4: socketpair(0x1, 0x2, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000000)={0x8, 'vlan1\x00', {'wlan1\x00'}}) 22:57:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x2, 0x0, 0x4}]}}, &(0x7f0000000340)=""/201, 0x32, 0xc9, 0x1}, 0x20) 22:57:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x8000000, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 22:57:13 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000280)=@abs={0x1}, 0x1e) 22:57:13 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x8, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @dev}], 0x1c) 22:57:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 22:57:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x4, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 22:57:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1}]}}, &(0x7f0000000080)=""/167, 0x26, 0xa7, 0x1}, 0x20) 22:57:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="01", 0x1) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000004640)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x18}], 0x30}], 0x1, 0x0) 22:57:13 executing program 4: socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x0, 0x0) getpid() sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000001700)={0x0, 0x0, 0x0}, 0x0) getuid() sendmsg$nl_netfilter(r0, &(0x7f0000001700)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000016c0)={&(0x7f00000002c0)={0x220, 0x2, 0x3, 0x201, 0x0, 0x0, {0x3, 0x0, 0x4}, [@generic="0b7bcda604f2202ee57d299b5775971dcebc9d2fa7cd8c049b75048b3717da449d81491c5a5ae3b02b2571da4057329c4e6f47838f3f14201ed447e1d82138403c052b68fddae18c4ebd1b78d0", @typed={0x4, 0x8e}, @typed={0x8, 0x0, 0x0, 0x0, @u32}, @nested={0x115, 0x8a, 0x0, 0x1, [@typed={0x14, 0x92, 0x0, 0x0, @ipv6=@private0}, @typed={0x14, 0x26, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @typed={0xae, 0x1f, 0x0, 0x0, @binary="c5706956073f9049e6a2a907dc75a4179a94903ae4c9aad75eb75b7a2b52fb3795ab56bebc023e01a3475f2dd058901386f52196fa57bdca4a685cf6d1731952ad9c46e70e9461cc2360f214356f0117c15cac803ba616c4e5d75448095ed1e491813b8f62ac5a714dbfc1ea342c4ca3a2ab40187c4d82b9c96d5c94a46f7ff0e5e9875e5e5a40ee6f89d6c34f46fd1e9972e3db3eff74cefe688d5239921c19cfaa7f5901ccc5f82605"}, @typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="d0f9fd71fbcfb8d2f5e7035afed200cddec4f2be13b19cb0521eb314a7d4ecafa16f9944c12760657d64c95950", @generic]}, @typed={0x8, 0x7d, 0x0, 0x0, @ipv4=@multicast1}, @generic="78055b6c0cb9bc62f29fa65a874682545c7367760dee78f18bab8572cd6af4d01c9889dca4afd072a43e8a781c3b8bbe5560eea2417fbdc3ad791d710bdc9fc1a88ad8f71ae9cd3ae17d20ff27d4347bcd56ab891a4ac0ddfecdf86b12546ebe1078a86caca65da604b9a0296f5b4be49501bd7a4246504aae260d02ba7c16b53d8662028527692921c1616e9e94568d1e"]}, 0x220}}, 0x8804) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000002c00)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) 22:57:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x1}}]}}, &(0x7f0000000080)=""/209, 0x32, 0xd1, 0x1}, 0x20) 22:57:13 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'veth0_to_team\x00', &(0x7f0000000080)=@ethtool_gstrings={0x1b, 0x6}}) 22:57:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x9, [@var={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, 0x25]}}, &(0x7f0000000180)=""/183, 0x31, 0xb7, 0x1}, 0x20) 22:57:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1a, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 22:57:13 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10, 0x1, 0x2}}], 0x10}, 0x0) 22:57:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={0x0, 0x0, 0x32}, 0x20) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0xa, 0x2, 0x3, 0x9, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, r0, 0x5, 0x3}, 0x48) 22:57:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f00000004c0)) 22:57:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x29, 0x0, 0x0) [ 342.809232] netlink: 524 bytes leftover after parsing attributes in process `syz-executor.4'. 22:57:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000002e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}}], 0x1, 0x0) 22:57:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0xa, 0x2, 0x3, 0x9}, 0x48) 22:57:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@fwd={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x30]}}, &(0x7f0000000240)=""/243, 0x2d, 0xf3, 0x1}, 0x20) 22:57:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto, @union]}}, &(0x7f0000000080)=""/152, 0x32, 0x98, 0x1}, 0x20) 22:57:13 executing program 5: syz_emit_ethernet(0xfffffffffffffd0e, &(0x7f0000000000)={@link_local, @multicast, @val, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "d6e007837708cb00"}}}}, 0x0) 22:57:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x21, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @dev}], 0x1c) 22:57:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="2c00000010"], 0x2c}}, 0x0) 22:57:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x15, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 22:57:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0xb, 0x0, 0x0) 22:57:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2d, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 22:57:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1600bd74, 0x0, 0x0) 22:57:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x40000145) 22:57:14 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x83, 0x0, 0x0) [ 343.040503] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 22:57:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) recvmsg(r0, &(0x7f00000026c0)={0x0, 0x0, 0x0}, 0x0) 22:57:14 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) recvmsg(r0, &(0x7f00000026c0)={0x0, 0x0, 0x0}, 0x2100) 22:57:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, &(0x7f0000000080)=""/167, 0x3e, 0xa7, 0x1}, 0x20) 22:57:14 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x82, 0x0, 0x0) 22:57:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) 22:57:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x8, [@var={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/243, 0x30, 0xf3, 0x1}, 0x20) 22:57:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 22:57:14 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000ec0)={0x0, 0x0}, 0x8) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x20, &(0x7f00000003c0)={&(0x7f0000000200)=""/133, 0x85, 0x0, &(0x7f00000002c0)=""/213, 0xd5}}, 0x10) 22:57:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x6e, 0x0, 0x0) 22:57:14 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x23, 0x0, 0x0) 22:57:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001800)={&(0x7f00000016c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4}}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001740)=""/134, 0x4a, 0x86, 0x1}, 0x20) 22:57:14 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x7c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @dev}], 0x1c) 22:57:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)={0x18, 0x10, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x18}], 0x1}, 0x0) 22:57:14 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x960c}) 22:57:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)={0x18, 0x10, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x5a, 0x0, 0x0, @u32}]}, 0x18}], 0x1}, 0x0) 22:57:14 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) recvmsg(r0, &(0x7f00000026c0)={0x0, 0x0, 0x0}, 0x2000) 22:57:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/169, 0xa9}], 0x1) 22:57:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x3, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x3, 0x1, 0x46}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000180)=""/183, 0x35, 0xb7, 0x1}, 0x20) 22:57:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0x2c, 0x1, 0x1, 0x801, 0x0, 0x0, {0xa}, [@CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @local}}}]}]}, 0x2c}}, 0x0) 22:57:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1b, 0x1b000000, 0x0, 0x0, 0x0, 0x1}, 0x48) 22:57:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x22, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x330, 0x268, 0xb0, 0x330, 0x0, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'lo\x00', 'pimreg\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "74071c7cc2eeb31b6ac9f01d6e7700f91b971dfe654ba00aaf2aa72f36d1"}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'vcan0\x00', 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 22:57:15 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) getuid() r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001700)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000016c0)={&(0x7f00000002c0)={0x1050, 0x2, 0x3, 0x201, 0x0, 0x0, {}, [@generic="0b7bcda604f2202ee57d299b5775971dcebc9d2fa7cd8c049b75048b3717da449d81491c5a5ae3b02b2571da4057329c4e6f47838f3f14201ed447e1d821", @typed={0x4, 0x8e}, @generic="6bd0b54e6a31f72638cff009b22eefac6a3ea8a9a39d8e76ef84646f2cb2430ee7e0b24141034ea84a5f8c2be720dac1ebc98b6a64d003798951bce1a865dc10f9d028241b8565d41eff3bd22d65586ddd0c34063b1913d4eff0d9959ce17be3d4e357416f8c899abc57aa5d6b920549eddee1ea49f209666cc7bc968db0461cfc9fbe1063390317a6cc2d858effd28b91965c241b8f5a7527244fec3b82ffd1172716b4c75f4397a7d63ceb23dc487df604e1a6c693d9f8beb632ada6627776a1fc438043354bcf1fa88bc08f59c4af82123e4322e919c2e5c05b4163348c248f649ae066a84688544372dbb929dc20b4e16d0be843d050392a8542960e8aef07d07426dbb545388f65d48da3a55de13c9a60cb0bc942f911646084c2c9ed6aab62f35290c5295989c99b2f0d437e8b310fea210a843fbcbc4454352fca6918d517a87fb9bc7b1cc2d5c8f088141c083af337c10141c88ce7f91867aab788d6804a16b1d06c8a3358f91ef1e1e3f0b2600f7d7985d6a825f4a82a641f7e887bba89d54513a21dd4dee417fa4ba408e5850fbdf2f9b09d325ba1950e774339661f7ed9744c0fd2b904eeaa29fe1d578e5fee2ea68dfb4dd553c86684fb57e5db4f345b2a56eff7a50c82bb2ef240d518957d8efacaaf4b7db278da7793581bee2c6f3058c45a63b47c0726c1fb75f99807e364f1ebe175ec8c4663050a9ea706bc0c560529b7006e80e1f7124732838f7a3ee74e6a79368f54e9bfb83ecfcacebc7df192675a388a7ca1a475a4e09e344b83842b92cccb55c186a37dbb5b01990402f2ef4bd3c746f3472738282dd5d1e9e1a1b44548c0f080ad632d5fcaa188d8ef41a1f3f968005bd802ca969a63f21529f4ba4e5ee379b7bd694aa325f1d8931250be7dd47ff38580d41285fa40734546f43916161ba6269ac6c06028b402b5ad34d8785e85bc319674c374d0b117735484158d5fe3c1a9dd83460b7a002c71b6309e3216960a2cfd26d21701a0d3b9311ea51c6055636dc81948de395dd2b8548df134cdc6f14adffe697766e4ad8588944ce81ed08bd8cbf46243fa4611bf1d972c512e791cc3c93287e1531c9e0a9eb21c9902afbe24b28e9e74bea9258bbebf2b83b6495537dfaa4f12027e4de0fac1137b801d1e4ad7e208a930052d99e563ead3d8541f9833625da7987cb67a720eda321c240170798abe46b31cdda15d087d698a804f55553b07d2bdacde2238bb4d6a35f27965bc5dc59483040e54087b847f78b86d4353ec768e22b123e77d345b42bd903b38d9b604ddee13158bedc5adf59233dd7cee8b4ed47c30eef5ed6f361941ea6db54afe1f7afca731628a05558218923cbbc8cf6529fb2d613bee30b674db3c8ab2576245519f7d5b5c8e7731473934334884c264ece71ee2e2754786a2d2002293dfee76adb1cc032b5efde05bbbd8d47982f5f27f9b88a5ffedc424279e03cce52a4d2ddec72e6bd266c9080c90a7bc41dfe081de4ad73fa21ab889dacf33fbce12573ea72ef0abbc1153856ede3499257199dd7da2c80c11fdd74ecc49c5e066fc396cfb4e9e39c2d1783791328aa4e3688cd1f0ca42961c89ac72f69f19d539150e79d79d8b685b13cb22a7a3c06f1a0a3201a632b75092d9340d504acd79f4e7d0a8d290bbb526da6c802f0a0384835f12de31b2bffcf72ca20af6b682b38be01beb19760509de378f622f82414646b71594b9deeebd5a574453b466924af92512728a1bd3c0748cadad8af4cec10a8769e7409113c2a150c88d4863df5ace0e44238da1ead390164dc0e5278e32b807a362475ec93f57b0748b403f7d82b2fdc8006d80c7fa5c308bf63bbda930c90cfc642f7f9ae89df10be56862f414845a27bfba3c1d9093300ced57a0c07ddbcd7ccea48bdb7533505d3ca33f690d651ad4ddd7c4b3882aa82a287d456689a998831ac017eca9d874ee113a41f1af567106009099efce55dbb430283ff551b4e464207c55ea6c631d2746a3c4c20b46fd12db32ab605135f6c308e6a56a66ad564477404e46362734b49f9c530b74fe0d1d58924d8f615affa90b957706d809c6e7eea8c55427419985fa9821fba703a37daa17beed43c6d6dbc3cb6cd3d69de69ba0943b3ebb3da8e7ef6a1b30069bc18b46d553a69eb066febe1f7b415b495a5d19a0bd90dfc1ff4c6701d094437cb6261d5fee902bc95d05f6a3d27b384a8162f2fb9ae203e98ce600d177485b882b514d03acdaf7771423521e9d963c9947bf14a6d81eff05dab7aebf58c2545dc943297f718f07d43131b9f77b14e38f5a0d5378606ab376eecd51c781114cb3f7c662e2ee83bf0fa17dfba1e2fe338f37f3e54b68d992e90e658eff5c3bc4640b230b4f6d00a77db6a29525d85ee87ce0da907efbb8714f0d459051ac85d062e6c340c6df8708089f6c46d227f7eedd8adf0e22d4e4acea07729fabaf4c40ed1740be8c342eb03b0dbc2c9e589016b135a423ddcf0f7f1cfae42c0e99e6c7bd6e8e6d3050f06495aa2816f96e9fb366ad9fbcf9954f9eca5271f575a12fcd3b6546768fa5c66e1751627ce94317dafb914ae0fb4daceb820db0ba5d351d755e5cf4ec0dcf5b568f963971f5a03953e2f11392df166f7c483fa16bb6fef8644bdd6b4cb591acae15529b9dd54d8a7b5c002c8a8848b1e7b749bc71f874fdc6e0575a7ad4405bc6e301e5090f70b2db58b05bf5e27dd720b01b86e65d95f6838db6f6ae2168f86cc3f5fbbd2fc0d91691e0dac8972ae334f8dbf246d58fe5c30250bdb2543283e31a7935c2d6b7352f68e6018358b3885f7df6b0a688c3d64d60e38b6fa812a339879f379bdfa00001255138bc1476a091cd635360f16063d713c411d7ce3d204575e002cbd178ff931e02e5cfbc778618994a4ac56a05e29ec18406310a89f7aa9d735d066c7b7938942354ee3ce3cd08089c4bfa9de4ea1a7d783b629fe89172c15ed17c26300bba5bf9fd88284c8b99ff7786a48c25a6d5146e38e8e585b51fe346fec1e6f75a42bfa9f60b0a45706eae62ba9c6d69900631821e8b7918747a44bd405f4474ad474842495615b6434452ca02b78057cc3a07aafe5fa1bc754e35d36ea583f3d290ca4dcb9d874067fe477ba3ba15f11436e0d50a593a2732b7652994e9c2e972741e0fa43612bee6f9d1e8cafc43e703e8262e48e472db729800fbf1528886f7658454c9d6d881a58c48ed2d37f71a65650c485d8729151e1d4870f979385048e0b7ed548fd287af6f52ba7153775749617ae143acae43808eb705911ced61f4bf28a0922906ef35e1b1101309b5b9bc6750d4e2e0226b940815c5c9e9532efb9c50229b1931ae68ae6ca68be0150cf8c929ea672ed919b12043288e7f122cd90d82b32a317e35247f72543b736316c496a7052086b0d1b488bf10dea3df85448c987c6319d92504f688f5779d9461ea0ba43c2f5726700dd3db8c3bf757baabaf2c1a3cdd761038bd8ed63e24a47c581e6d359a802e34ef7d51e21878079f6d70370c6092a2eb0ee901219b8d5ec0b052cc798a79776d85c9fbb7f1da6df6c35b9982232a6149fc22b387e14ee87f0a851c7b02eb3ed0ed688243ab5cf7d130f645e711f4b20c4916f93ab7ce081d144b3175a0a9c2556ac9e9877d470bac87b1477b659b5f37a3fe8567ac1ae0c4af55a3b3103a3caa29bd80e8abf2a9b6bae1b88890f657c2fd626c6925bb4ab7050e6161f96a5652f3dd8f6f715c5914a016cc0eb923a65f314a6b8eedf885f5ca9a9189e535bb75dfc2f3d05ba8efdd4e59bafcf45d6a7edabd240a0b7c88caa0c105d4de02026b97c6555a719ecda01c4604a2c557a3b1090c4a6130c81dfe8fbf1d640321632b301c038c98251cffbe17c76441a4c69fa29de00b7e86e298a69ef35598d9ab166552a74181e0020b08f99516cf9f30bab2d794fd6e72323930ca0597e1c5e7d69831f5222d6542ba0fd4d2e8188a2ca6ce35e325fdc04e0c0710cc4f404b1be4c4af408d2479b87b91325ad6acb267a84f3cb2b384c12e0f95ade09060d776d1d0a4f976ba35a1d72934a96d89e8bce13771abae1fa30d0f1cc72a1510ba0b75e045d365e35d0b9298bdfcb5f1ccf205c2459800c3e8b4a2761af80fbb686726eee850fcaadb5a79b5f33b23b2ec24f05790d206d91161ab449f2d9cdc16c8fe87ef82eef45faa8366f0e4a1ed10b06a19046ce03a87abc66946316cd09e7154d14d34d8e143f4f60b12734896815787aaa2703f00fb3be195661ce7eaf1767a2761aebeae5e0b27243f1b566f71ffaf0dee471fde1542ed16ad35c46df50f3d8e8d64cff5c62cdde85ce5427457d6209426083446d1e29ad97d0a6c6846be1b242017fc9e0560bb7c3f1d2ce2e2362acec5d0dc1b823a68cd5eabe44f2320ed724af3a38ef1b7f26b2f3004bbc22173f4842bdbc5a2b5ab5c46afac59c8b9a94ab9b4560a17743d0662ae3b0ac3c6558cda808a33eb7a20dec9339c5fb4225ccfabcc1547ce953b54bd965daa1a9f0a247350fc178a9f09ce59a64b5eee974daed7797ef983c81b8dfc28be9333d9c660f359a8a93e16b092c752de0b4463a448a873dd3d949b4cdc3654ea8f76fea29e3ddb22d16739bf909d9b587d51f736499d73cce7efd88a3a4f621145546f50374c6cb93b3628ace92913fa5971dd97756248b9beabb65e331b4ffb1c11a7194ad8ef959712c4bb9c06c0e863d882073c97b3a05963d0a0b2a0e24b112ee560b9042b9682819d075a7094b5058df99c7c750651bc1d8e426162747b837fddd2c406476215c02be7bd71c611caa299b9a4eaa65941085dc4802f2ec736856f88de2ddeb11759237c4ed2b2ef8726a88a04cc67a504eb670c5238a0df4fc65c7199815f51d676de2be9354df63521ec70ae1dea0a32b862c83d78c630341ad0cebe598699210692e4e2b71139789fa9ba0c33583c05b5d1ae6d8e7d44aafe4926e9e1a936c6f1371166d4451052f69dec8aef3a85fd2be0eeb2ccc04e45a1424ec71ca44cdd499b1c2967ec3f270e53f73fb93a6118e5b98e9ccdca010b0adcf69be2428340697220a46487209a8d6578667eb1d1d88c08d0cd0f4e576aba5f2daaadd7b39b95446607cf88cd3d87a90dc267c3d9f48ea8c24675c70327053d068ac494e467fe0aa4ef9727e27093bd6b6029d63d28419e1443a2b33b69a0c32de0ac1eec2a23a236428b9c970ef4a194a8f62a7db67715a0bb6bfe94d1bd507750d5a883283e54356afe1def026fb4cebb8d25ee428e68495a193909b95694e0f4daf9aface763be0fed241ff9edc41a8772af90b09644984691f31bfc3ef435948cbe8b2880d5af78a12bdcf8cd5b19d2b6f7f0055b2d8bcffd32ef2bf201c15fdbeb51109c34af4858171f3cdceef126419a9ecfa564291852257f7201d4b4ea9961e4a02f954c56efacd6456eae259f0ebf8017dcb64e56f94f1697982f04b642a18238124b996d6868cba962f1a9cb1d79bea373207eb66ae0ce22add7e0592f21fe0f1c3a91ec596f2075049cb268d37d52901e5d3ebf3f9343f317ac074450be6d4fedfd3b1a048b1613eca7ffc5934c784ffbc454d725d7adc6f4555a98d38cacfe547e6f1050200421cb5acdec562764a1b681b697df79a16fe04278d503ef3baf6e7526ba212a03ab521038ca9a333ab709abe4ed3eb45ba56976a3486624c6ead412936af8807b42a5c9f902fc31c277908d28e818807aa355", @nested={0x4}, @typed={0x8, 0x7d, 0x0, 0x0, @ipv4=@multicast1}, @generic]}, 0x1050}}, 0x8804) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000016c0)={0x0}}, 0x0) getuid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) getpid() sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002480)={0x0, 0x0, &(0x7f00000023c0)=[{0x0}], 0x1, 0x0, 0x0, 0x80}, 0x24000010) [ 344.052707] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 344.074048] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 22:57:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0x18, 0x1, 0x1, 0x801, 0x0, 0x0, {0xa}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}}, 0x0) 22:57:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000240)=""/243, 0x2c, 0xf3, 0x1}, 0x20) 22:57:15 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x13, 0x8, 0xeae, 0x3}, 0x19) 22:57:15 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x3, 0x0, 0x0) [ 344.167145] netlink: 4156 bytes leftover after parsing attributes in process `syz-executor.4'. 22:57:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000080)=""/167, 0x1000000, 0xa7, 0x1}, 0x20) 22:57:15 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000ec0)={0x0, 0x0}, 0x8) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) ioctl$FS_IOC_FSSETXATTR(r1, 0x801c581f, 0x0) 22:57:15 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}, 0x1c) 22:57:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0xfffffffd}]}}, &(0x7f0000000180)=""/183, 0x26, 0xb7, 0x1}, 0x20) 22:57:15 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x7d, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @dev}], 0x1c) 22:57:15 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000ec0)={0x0, 0x0}, 0x8) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180)=r0, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x20, &(0x7f00000003c0)={&(0x7f0000000200)=""/133, 0x85, 0x0, 0x0}}, 0x10) 22:57:15 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x11, 0x0, 0x0) 22:57:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)=[{0x0, 0x36c}], 0x1}, 0x0) 22:57:15 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x2b9803, 0x0) 22:57:15 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/net\x00') fstat(r0, &(0x7f0000000140)) 22:57:15 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0xc0, 0x0) 22:57:15 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 22:57:15 executing program 5: mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 22:57:15 executing program 4: timer_create(0x0, 0x0, &(0x7f0000001180)) 22:57:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000004c0)={&(0x7f0000000000)=@proc, 0xc, 0x0}, 0x0) 22:57:15 executing program 3: mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x900090, 0x0) 22:57:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 22:57:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@rights={{0x10}}], 0x10}, 0x0) 22:57:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000100)) 22:57:15 executing program 4: mknod(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x900090, 0x0) 22:57:15 executing program 5: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') 22:57:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x3, 0x0, &(0x7f00000000c0)) 22:57:15 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x88140, 0x0) 22:57:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000014c0)='./file0\x00', 0xac0, 0x0) 22:57:15 executing program 2: r0 = eventfd(0x155) read$eventfd(r0, &(0x7f0000000000), 0x8) 22:57:15 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0xb49) 22:57:15 executing program 4: r0 = epoll_create1(0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000340)) 22:57:15 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x4c0, 0x0) statx(r0, &(0x7f0000000040)='\x00', 0x1000, 0x0, &(0x7f0000002380)) 22:57:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') statx(r0, &(0x7f0000002340)='\x00', 0x1000, 0x0, &(0x7f0000002380)) 22:57:15 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff}) fchownat(r0, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x1000) 22:57:15 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x100000, 0x0) 22:57:15 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x19, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:15 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:15 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:15 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:15 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x19, 0x4, 0x4, 0xeca3}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) 22:57:15 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x5, &(0x7f0000000000)=@framed={{}, [@initr0={0x18, 0x5, 0x0, 0x0, 0x10000000}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 22:57:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x9, 0x4, 0x401, 0xecb}, 0x48) 22:57:15 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="18130000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00!'], &(0x7f0000000380)='GPL\x00', 0x4, 0xb8, &(0x7f00000003c0)=""/184, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:15 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xa}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:15 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x340dc, &(0x7f0000000040)=@raw=[@func, @alu, @alu, @kfunc], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:15 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x5, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:15 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x19, 0x4, 0x4, 0xeca3}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000140)=""/4096}, 0x20) 22:57:15 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x63, 0x0, 0x0, 0x0, 0x8}}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:15 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x8, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x19, 0x4, 0x4, 0xeca3}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001200)={r0, 0x0, 0x0, 0x4}, 0x20) 22:57:15 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0xd, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x0, 0x0, 0x2}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0xe, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x5, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x61}}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xf}, {}]}]}}, &(0x7f0000000600)=""/229, 0x36, 0xe5, 0x1}, 0x20) 22:57:16 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000040)=ANY=[@ANYRES16=r0], &(0x7f0000000380)='GPL\x00', 0x4, 0xbd, &(0x7f00000002c0)=""/189, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xb}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={@cgroup=r0}, 0x10) 22:57:16 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x71, 0x0, 0x0, 0x0, 0x8}}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000005c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x4, &(0x7f0000000040)=@raw=[@func, @alu={0x7}, @alu={0x0, 0x0, 0x5}, @kfunc], &(0x7f0000000080)='syzkaller\x00', 0x2, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000600)=""/229, 0x27, 0xe5, 0x1}, 0x20) 22:57:16 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x17, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x5, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x5, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x19, 0x4, 0x4, 0xeca3}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x58, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={r1}, 0xc) 22:57:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x8, 0x1, &(0x7f0000000040)=@raw=[@func], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x2, 0x4, 0x4, 0xeca3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) 22:57:16 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x5}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0xcd, &(0x7f00000000c0)=""/205, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:16 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x2a000, 0x0) 22:57:16 executing program 3: perf_event_open$cgroup(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:16 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'pim6reg0\x00', 0x1fdcc924e3b92dda}) 22:57:16 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000a00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000a80)=""/203, 0x28, 0xcb, 0x1}, 0x20) 22:57:16 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @dev}], 0x1c) 22:57:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'pim6reg0\x00', 0x1fdcc924e3b92dda}) ioctl$TUNSETFILTEREBPF(r0, 0x8927, &(0x7f0000000240)) 22:57:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000540)=@framed, &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000680), 0x8, 0x10, 0x0}, 0x80) 22:57:16 executing program 2: r0 = gettid() r1 = syz_clone(0x20000000, &(0x7f0000000080)="0b4e4d0b561bb339a405bd2145a6d7096682f018857986232d07a703c3d65a4c54d03594c0f5a40c2f2ae931c5776d53564c84729e1f96f5462c779c3836829930ea050b7aacc0b8560114056c511e85e9a7b15386636a684e5cba72789d38a399ed5a68cd70e212a135d081ebb37e79d298568e255f33f3f89c90efc5047bd7406312a34f9b33fbdd210943d1032b2c39e6ee30ea1d757544f5", 0x9a, &(0x7f0000000300), &(0x7f0000000180), &(0x7f00000001c0)="896bbc400d0fa4bdf7a2b976b7ded780a31156b99571f3274175a240c90f7c4bd57375f9fe35ca0cd095637f7e39743576d1b42a385b33821928c73298ef9eddb299d123b82ca4eb96ad2c4e9c57344a9c66ed100aed979f0e2d521031ae9d1ceec9c2fca1b8f6755877aa322a60b523965a3f70b0fba1") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r2 = syz_clone(0xc2001400, &(0x7f0000000140), 0x0, &(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)="ab8a0bdabfd710a4f391795dad10e6ed26cdf4e3185ee94fa3417acd11c623f9c59eca03d271b1145164c22243a7442c38dbe73c37af75e8a7e978ce60cc0f277b3994afdf27de6b378b2fb39e2bdab793e4f296c1e883acbcdccdc76d27d67fb73d46") perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0xe5, 0x40, 0x0, 0x7, 0x0, 0x1, 0x10800, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x6, 0x4}, 0xa140, 0x238b, 0x5, 0x6, 0x8001, 0x0, 0x6, 0x0, 0x2cde, 0x0, 0xfffffffffffffffb}, r1, 0x3, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000004c0)=r2, 0x12) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000000)=""/31) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETSNDBUF(r3, 0x400454d4, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_lsm={0x1d, 0x2, &(0x7f00000005c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x3}], &(0x7f0000000600)='syzkaller\x00', 0x34a, 0x99, &(0x7f0000000640)=""/153, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x8, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000780)=[r3, 0x1, 0xffffffffffffffff]}, 0x80) 22:57:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d40)={&(0x7f0000000bc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000c80)=""/166, 0x2e, 0xa6, 0x1}, 0x20) 22:57:16 executing program 4: r0 = gettid() r1 = syz_clone(0x20000000, &(0x7f0000000080), 0x0, &(0x7f0000000300), &(0x7f0000000180), &(0x7f00000001c0)="896bbc400d0fa4bdf7a2b976b7ded780a31156b99571f3274175a240c90f7c4bd57375f9fe35ca0cd095637f7e39743576d1b42a385b33821928c73298ef9eddb299d123b82ca4eb96ad2c4e9c57344a9c66ed100aed979f0e2d521031ae9d1ceec9c2fca1b8f6755877aa322a60b523965a3f70b0fba1") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r1, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000280)='N-.\\\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r2 = syz_clone(0xc2001400, &(0x7f0000000140), 0x0, &(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)="ab8a0bdabfd710a4f391795dad10e6ed26cdf4e3185ee94fa3417acd11c623f9c59eca03d271b1145164c22243a7442c38dbe73c37af75e8a7e978ce60cc0f277b3994afdf27de6b378b2fb39e2bdab793e4f296c1e883acbcdccdc76d27d67fb73d46d4108ca55138d4b3684016ce747a06c4a8dc074d7be9237450fb2b9840f6ba7b71") r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000140)='rxrpc_rx_lose\x00'}, 0x10) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0xe5, 0x40, 0x0, 0x7, 0x0, 0x1, 0x10800, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x6, 0x4}, 0xa140, 0x238b, 0x5, 0x6, 0x8001, 0x0, 0x6, 0x0, 0x2cde, 0x0, 0xfffffffffffffffb}, r1, 0x3, r3, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000004c0)=r2, 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYRESDEC=0x0, @ANYRES16=r0], &(0x7f00000008c0)=""/180, 0xea, 0xb4, 0x1}, 0x20) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000000)=""/31) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r4, 0x400454d4, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_lsm={0x1d, 0x2, &(0x7f00000005c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x3}], &(0x7f0000000600)='syzkaller\x00', 0x34a, 0x99, &(0x7f0000000640)=""/153, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x8, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000780)=[r4, 0x1, 0xffffffffffffffff]}, 0x80) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000840)=r2, 0x12) 22:57:16 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 22:57:16 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 22:57:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000540)=@framed, &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 5: perf_event_open$cgroup(&(0x7f00000009c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:16 executing program 1: perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 345.622065] IPVS: ftp: loaded support on port[0] = 21 [ 345.624394] IPVS: ftp: loaded support on port[0] = 21 22:57:16 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x5, &(0x7f0000000540)=@framed={{}, [@initr0]}, &(0x7f00000005c0)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:16 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={@cgroup, 0xffffffffffffffff, 0x23}, 0x14) 22:57:16 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_clone(0xc2001400, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0xe5, 0x40, 0x0, 0x7, 0x0, 0x0, 0x10800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x6}, 0x0, 0x238b, 0x0, 0x6, 0x8001, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 22:57:16 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:16 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:16 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 22:57:16 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000540)=@framed, &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0), 0x10}, 0x80) 22:57:16 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000740), 0x210480, 0x0) 22:57:17 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/time_for_children\x00') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d80)='./cgroup.net/syz1\x00', 0x200002, 0x0) 22:57:17 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) 22:57:17 executing program 3: bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/time_for_children\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000540)=@framed, &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x5}, 0x10}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d80)='./cgroup.net/syz1\x00', 0x200002, 0x0) 22:57:17 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:17 executing program 4: perf_event_open$cgroup(&(0x7f00000005c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 346.148212] IPVS: ftp: loaded support on port[0] = 21 22:57:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x9, 0x3, &(0x7f0000000ac0)=@framed, &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 22:57:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002000)) 22:57:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d40)={&(0x7f0000000bc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x9}]}}, &(0x7f0000000c80)=""/166, 0x26, 0xa6, 0x1}, 0x20) 22:57:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$TUNGETFILTER(r0, 0x800454cf, 0x0) 22:57:17 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x200, 0x0) 22:57:17 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000540)=@framed, &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x68, &(0x7f0000000600)=""/104, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:17 executing program 5: perf_event_open$cgroup(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:17 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x48) 22:57:17 executing program 0: socketpair(0x11, 0x80802, 0x0, &(0x7f0000000140)) 22:57:17 executing program 5: r0 = gettid() r1 = syz_clone(0x20000000, &(0x7f0000000080), 0x0, &(0x7f0000000300), &(0x7f0000000180), &(0x7f00000001c0)="896bbc400d0fa4bdf7a2b976b7ded780a31156b99571f3274175a240c90f7c4bd57375f9fe35ca0cd095637f7e39743576d1b42a385b33821928c73298ef9eddb299d123b82ca4eb96ad2c4e9c57344a9c66ed100aed979f0e2d521031ae9d1ceec9c2fca1b8f6755877aa322a60b523965a3f70b0fba1") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000280)='N-.\\\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r2 = syz_clone(0xc2001400, &(0x7f0000000140), 0x0, &(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)="ab8a0bdabfd710a4f391795dad10e6ed26cdf4e3185ee94fa3417acd11c623f9c59eca03d271b1145164c22243a7442c38dbe73c37af75e8a7e978ce60cc0f277b3994afdf27de6b378b2fb39e2bdab793e4f296c1e883acbcdccdc76d27d67fb73d46d4108ca55138d4b3684016ce747a06c4a8dc074d7be9237450fb2b9840f6") r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000140)='rxrpc_rx_lose\x00'}, 0x10) perf_event_open(0x0, r1, 0x3, r3, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000000)=""/31) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_lsm={0x1d, 0x2, &(0x7f00000005c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x3}], &(0x7f0000000600)='syzkaller\x00', 0x34a, 0x99, &(0x7f0000000640)=""/153, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x8, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000780)=[r4, 0x1]}, 0x80) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000840)=r2, 0x12) 22:57:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) 22:57:17 executing program 4: gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = syz_clone(0xc2001400, &(0x7f0000000140), 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000400)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYRESDEC=0x0], 0x0, 0xea}, 0x20) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000840)=r0, 0x12) 22:57:17 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 22:57:17 executing program 1: perf_event_open$cgroup(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d40)={&(0x7f0000000bc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x5, [@volatile={0x0, 0x0, 0x0, 0x9, 0x4}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4}, {}, {}]}, @union]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000c80)=""/166, 0x59, 0xa6, 0x1}, 0x20) 22:57:17 executing program 0: perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 346.723182] IPVS: ftp: loaded support on port[0] = 21 [ 346.723280] IPVS: ftp: loaded support on port[0] = 21 22:57:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:57:17 executing program 1: perf_event_open$cgroup(&(0x7f0000002c00)={0x1, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:17 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x24040, 0x0) 22:57:17 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1b, 0x5, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d40)={&(0x7f0000000bc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @union]}}, &(0x7f0000000c80)=""/166, 0x4a, 0xa6, 0x1}, 0x20) 22:57:18 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 22:57:18 executing program 0: bpf$BPF_PROG_ATTACH(0x5, &(0x7f00000000c0), 0x14) 22:57:18 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x3, &(0x7f0000000680)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 22:57:18 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x3, 0x3f, 0x7f, 0x140, 0xffffffffffffffff, 0x6f, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 22:57:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x2, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000000200)=""/197, 0x28, 0xc5, 0x1}, 0x20) 22:57:18 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)=',', 0x1}, {&(0x7f00000001c0)="c7", 0x1}, {&(0x7f0000000280)="15", 0x1}], 0x3, &(0x7f0000000780)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @loopback}}}, @ip_tos_u8={{0x11}}], 0x38}, 0x0) 22:57:18 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={@cgroup, 0xffffffffffffffff, 0x5}, 0x14) 22:57:18 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) 22:57:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x8, 0x3, &(0x7f0000001600)=@framed, &(0x7f0000001640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:18 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x17, 0x0, 0x9, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 22:57:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 22:57:19 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1c, 0x0, 0x0, 0x7fffffff, 0x1}, 0x48) 22:57:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x404a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:57:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001e80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}], 0x20}, 0x41) 22:57:19 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={@cgroup, 0xffffffffffffffff, 0x16}, 0x14) 22:57:19 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0xd, 0x0, 0x0, 0x0}, 0x20) 22:57:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x17, 0x0, 0x9, 0x7, 0x1022}, 0x48) 22:57:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 22:57:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:57:19 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="f5", 0x1}], 0x1}, 0x0) 22:57:19 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000015c0)={0xffffffffffffffff, 0x0, 0x24}, 0xc) 22:57:19 executing program 0: bpf$LINK_DETACH(0x22, &(0x7f00000008c0), 0x4) 22:57:19 executing program 5: bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={@cgroup, 0xffffffffffffffff, 0x1c}, 0x14) 22:57:19 executing program 1: socketpair(0x2, 0xa, 0x3, &(0x7f0000000040)) 22:57:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x17, 0x3, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:19 executing program 3: perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:57:19 executing program 4: bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000017c0)={@cgroup, 0xffffffffffffffff, 0x1f}, 0x14) 22:57:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='cgroup.stat\x00', 0x0, 0x0) 22:57:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00'}) 22:57:19 executing program 3: bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={@cgroup, 0xffffffffffffffff, 0x7d0}, 0x14) 22:57:19 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x16, 0x2, 0x0, 0x400}, 0x48) 22:57:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'veth1_to_hsr\x00'}) 22:57:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x8}, 0x48) 22:57:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001400)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f0000000400)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 22:57:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x7, &(0x7f0000000000)=@framed={{}, [@call, @call, @btf_id]}, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:19 executing program 1: bpf$BPF_PROG_ATTACH(0x2, &(0x7f00000000c0), 0x14) 22:57:19 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)=',', 0x1}, {0x0}], 0x2, &(0x7f0000000780)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @loopback}}}], 0x20}, 0x0) 22:57:19 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:19 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x111040, 0x0) 22:57:19 executing program 2: perf_event_open$cgroup(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3e}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:19 executing program 4: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000800)='ns/mnt\x00') 22:57:19 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003b80)="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", 0x1000}, {&(0x7f00000000c0)="f5", 0x1}], 0x2, &(0x7f00000039c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @dev}}}], 0x20}, 0x0) 22:57:19 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:19 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet(r0, 0x0, 0x0) 22:57:19 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x3, &(0x7f0000000680)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000480)={r0, 0x0, 0x0}, 0x10) 22:57:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'vcan0\x00'}) 22:57:19 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x3, &(0x7f0000000680)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000240)=[0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x2, 0x0}}, 0x10) 22:57:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000001a40)={0x13, 0x3, &(0x7f0000001540)=@framed, &(0x7f0000001580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 22:57:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x0, 0x1201, 0x1}, 0x48) 22:57:19 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:57:19 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={@cgroup, 0xffffffffffffffff, 0xa}, 0x14) 22:57:19 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x3, &(0x7f0000000680)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000200)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 22:57:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x1, 0x1, 0x0, 0x10000}, 0x48) 22:57:19 executing program 3: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x1b}, 0x10) 22:57:19 executing program 2: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x1d, 0x0, 0x0, 0x0}, 0x20) 22:57:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000001980)={0xa, 0x3, &(0x7f00000001c0)=@framed, &(0x7f00000013c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:19 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x3, &(0x7f0000000680)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0x0, 0x0}, 0x10) 22:57:19 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d80)='./cgroup.net/syz1\x00', 0x200002, 0x0) 22:57:19 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f00000012c0), 0x101041, 0x0) 22:57:19 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 22:57:19 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x1000000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:19 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0/file0\x00'}, 0x10) 22:57:19 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0/file0\x00'}, 0x10) 22:57:19 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000001500)='ns/time\x00') 22:57:19 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0x7, &(0x7f0000000140)=@framed={{}, [@cb_func, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000000000)='GPL\x00', 0x6, 0xb5, &(0x7f0000000400)=""/181, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x17, 0x81, 0x0, 0x7}, 0x48) 22:57:19 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/180, 0xb4}, 0x40000060) 22:57:19 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x3, &(0x7f0000000680)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 22:57:19 executing program 2: perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:57:20 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000002680)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 22:57:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x0, 0x0, 0xfffff800, 0x0, 0x1}, 0x48) 22:57:20 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000140)=',', 0x1}, {0x0}, {&(0x7f0000000280)="15", 0x1}], 0x3, &(0x7f0000000780)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @loopback}}}], 0x20}, 0x0) 22:57:20 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x3, &(0x7f0000000680)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f00000002c0)=@raw=[@alu], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1b2f8, r0}, 0x80) 22:57:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1b, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:20 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x13, 0x0, 0x0, 0x0}, 0x20) 22:57:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:20 executing program 4: perf_event_open$cgroup(&(0x7f0000002c00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:20 executing program 3: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0xe, 0x0, 0x0, 0x0}, 0x20) 22:57:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x20}) 22:57:20 executing program 2: perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:20 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:20 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x9, 0x4, &(0x7f0000000400)=@framed={{}, [@ldst={0x5, 0x0, 0x1}]}, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:20 executing program 0: bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={@cgroup, 0xffffffffffffffff, 0x25}, 0x14) 22:57:20 executing program 5: syz_clone(0x12400, 0x0, 0x0, 0x0, 0x0, 0x0) 22:57:20 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000005240)={0xffffffffffffffff}, 0xc) perf_event_open$cgroup(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002c40)='memory.numa_stat\x00', 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002c80)={&(0x7f0000001a40)="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", &(0x7f0000002a40)=""/214, &(0x7f0000002b40)="949b49a531d7b76e7df6f165696fbad61c491c68342f23981169b9846a163a52f9ec16ec4908216b69c71dfbb1fd6e1afb4e8a8912e1e6e34971320791df8398a64dfa75dba37b4ca3263a244f9e0a7fab531fe266ed88b886999b327064885a45c5b631fbb1af15283e304fecc71cf000678d76282766241a83ecb7885c147d62bb24320935deb2861b047bc636ea40ddf0bb7e870c43c2f3481286", &(0x7f0000002c00)="7355e2db6701f1d0a3fdb7c49329f843075fbd55ad100285cb792f2926e0f8b5069126daaaae75348ce92f7d5b9462", 0x6d6, r0}, 0x38) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) 22:57:20 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @loopback}}}, @ip_tos_u8={{0x11}}], 0x38}, 0x0) 22:57:20 executing program 3: bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={@cgroup, 0xffffffffffffffff, 0x2b}, 0x14) 22:57:21 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x4, 0x4, &(0x7f0000000400)=@framed={{}, [@ldst={0x0, 0x0, 0x1, 0x2}]}, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:21 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x9, 0x3, &(0x7f0000000400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a00}}, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:21 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x4, 0x3, &(0x7f0000000400)=@framed, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x57}, @exit], &(0x7f0000000000)='GPL\x00', 0x3, 0xef, &(0x7f0000001340)=""/239, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:21 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x1b, 0x3, &(0x7f0000000400)=@framed, &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 22:57:21 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x59}, @exit], &(0x7f0000000000)='GPL\x00', 0x3, 0xef, &(0x7f0000001340)=""/239, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x1f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x0, 0xfffffffffffffeef, 0x0}, 0x30) perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x5, 0x82000, 0x12, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x8, 0x7}, 0x90120, 0x2e1c1496, 0x400, 0x1, 0xd1b2, 0x9, 0x3f, 0x0, 0xfffffff7, 0x0, 0xb7c2}, r1, 0xd, r0, 0xa) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x40, 0x1f, 0xfc, 0x1, 0x0, 0x401, 0x100, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x1000, 0x3f}, 0x8c10, 0xee8, 0x7, 0x0, 0x7, 0x5, 0x6, 0x0, 0xf03, 0x0, 0x4}, r1, 0x5, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r3, 0x0) socketpair(0x28, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000c86f88)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r3, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x2, 0x4, 0x400, 0x400, 0xffffffffffffffff, 0xff, '\x00', 0x0, r4, 0x0, 0x2, 0x1, 0xa}, 0x48) syz_clone(0x40000000, &(0x7f00000003c0), 0x1000000, 0x0, 0x0, 0x0) 22:57:21 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x2}, @exit], &(0x7f0000000000)='GPL\x00', 0x3, 0xef, &(0x7f0000001340)=""/239, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x76}, @exit], &(0x7f0000000000)='GPL\x00', 0x3, 0xef, &(0x7f0000001340)=""/239, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:21 executing program 4: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@cgroup, r0, 0xd}, 0x14) 22:57:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001180)=@base={0xf, 0x0, 0x0, 0x10000}, 0x48) 22:57:21 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)}, 0x401) 22:57:21 executing program 5: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) 22:57:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)}, 0x2062) 22:57:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x2062) 22:57:21 executing program 4: perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x0, 0x0, 0x1f}, 0x48) [ 350.414726] IPVS: ftp: loaded support on port[0] = 21 22:57:21 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x70d800, 0x0) 22:57:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="8500000013000000350000000000ba0085000000a000000095000000000000004cf12aa58bd56806f81f06a9cfffffffffffffffff1835d8050864d2a51f447f454698165b61a3cf5fc6dd8442230e7901000000aa1f703517513523c901638f09494997cbe593f90a847687a3ef1f83dd6c1023158a1081000000dce415554bc34e6bde80000000000000110887c697acd9647e6969c9e34f0a9c13ecee6156c599c7b297879c8267ac4490d4a60186e03c51f135affb9cf13d21fe31869683e72090b4444cb0f8cb5acc73aae89ab3a8d820a1cc98ee6eb51e5f3011fa82e44fd0b149dd520acfa155253f1d72378de6c8ea45599c8ff4e19578cc37a1d041cf903bacedd3c050b7cf5c85ed372e9a9477305a84b0ad43de0f4eaccf9d6f753d4e92d8b040d19002e4464f77af0c4d196ee373d554b0dbce7e8cc5055a3d230bb2a96a4d8b4e803044f481c5563e7a372570d4280f6e07a2e2318842c0f4ffa2b5a76be9b850dad35bcdca25f6d2437effb5b2b19a88fd2def22921c185202ea3f885fa2f80d36f122836f9f1972e66b6c1c3679e47a6556fabae7b7aba641a7e4d0c753221332d96810af58269dd6fc4c55fdbcef74d9433c7006c1879e85b5f5289b5d82268a3beac4bc33d1aaf54f9481e28abb674b26fc36d67587f9ade5c202d66f191dbf2f3495a8337c17ed8e51228e8e2da93db0cf391caed010c824921d65b1a64dcfa8f7298c97bdaacbfc41534a460ae843402b46ba10a75c98b4702980a610f3bfd05b8101029ca8dbd18b21bc5bb8ed345d720f77f886524780b41a11b55bd5730728a7e5df818b8e652f6ae89c6eb3846691a08082e25a3d99756a8e96e04226e5c652e99dab7d418705e2a20df59341fdd7c0dcaeaf60a271434603ca23591e23bdccd71dd4b6768ac5fc6de66cfd913512d384256ec4426238174ec3140be06da9b0757c69f8768a4b0dd37624a2f081d84fdc1fdcd85908586ee164c119d1b01229edc7f51ee6e32db80b5c2f665069af9598783a2528abae3b7ad76b3d6866215c602d7f8ba3ca15aedfb420acaab61c243d4c44fe7b748a4da58ed6f4a1843531"], &(0x7f0000000140)='GPL\x00', 0x0, 0x27, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x39, 0xf, &(0x7f0000001980)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 22:57:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200200, 0x0) close(r0) 22:57:21 executing program 0: perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:21 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x7, &(0x7f0000000280)=@framed={{}, [@func, @map_fd={0x18, 0x0, 0x1, 0x0, 0x1}, @call]}, &(0x7f0000000300)='syzkaller\x00', 0x3, 0xb6, &(0x7f0000000340)=""/182, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:21 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x3, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x7, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3c}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:21 executing program 5: ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) r0 = syz_clone(0x40000000, &(0x7f0000000100)="bf39f1f3c675190720ef4e73ae68ac6e3210d876b6f95eb31193aa9a", 0x1c, &(0x7f0000000140), 0x0, &(0x7f00000001c0)="ba1c5c0f1a19fe0b5788a79ce82eaab176b2e9e54b2f626c8f2151a9f42e68c3d179088a91a077bcd051a889ffe3dc980900b7f004b99b37421acbcd31fb9aeb983ffe42495cb5281193a2b58f61e1cf3a9d87a13345ecabb212f98a69ec") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='net_prio.prioidx\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000600)) perf_event_open(&(0x7f0000000080)={0x7, 0x80, 0xc4, 0x5, 0x4, 0x0, 0x0, 0x1, 0xc8040, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x8c82, 0xcbbd, 0x80a, 0x5, 0x40, 0x0, 0x3ff, 0x0, 0x200, 0x0, 0x9}, r0, 0xa, r1, 0x8) 22:57:21 executing program 4: r0 = syz_clone(0x40000000, &(0x7f0000000100)="bf39f1f3c675190720ef4e73ae68ac6e3210d876b6f95eb31193aa9a", 0x1c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='net_prio.prioidx\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000600)=r1) perf_event_open(&(0x7f0000000080)={0x7, 0x80, 0xc4, 0x5, 0x4, 0x0, 0x0, 0x1, 0xc8040, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xcbbd, 0x0, 0x5, 0x40, 0x80000001, 0x3ff, 0x0, 0x0, 0x0, 0x9}, r0, 0xa, r1, 0x8) 22:57:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3}, 0x10, 0xffffffffffffffff}, 0x80) r0 = socket$kcm(0xa, 0x922000000003, 0x11) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x890b, &(0x7f0000000080)) 22:57:22 executing program 2: r0 = syz_clone(0x40000000, &(0x7f0000000100)="bf39f1f3c675190720ef4e73ae68ac6e3210d876b6f95eb31193aa9a", 0x1c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='net_prio.prioidx\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000600)) perf_event_open(&(0x7f0000000080)={0x7, 0x80, 0xc4, 0x5, 0x4, 0x0, 0x0, 0x1, 0xc8040, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x8c82, 0xcbbd, 0x80a, 0x5, 0x40, 0x80000001, 0x3ff, 0x0, 0x200, 0x0, 0x9}, r0, 0xa, r1, 0x8) 22:57:22 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff}, 0xc) mkdir(&(0x7f00000000c0)='./file1\x00', 0x83) 22:57:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x1a}, 0x48) 22:57:22 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@jmp], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 22:57:22 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x0, 0x0, 0x9}, 0x48) 22:57:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x3, &(0x7f0000000340)=@framed, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x1, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0xffffffffffffffff]}, 0x80) [ 351.155655] IPVS: ftp: loaded support on port[0] = 21 [ 351.165634] IPVS: ftp: loaded support on port[0] = 21 [ 351.210362] IPVS: ftp: loaded support on port[0] = 21 22:57:22 executing program 0: perf_event_open$cgroup(&(0x7f0000000a00)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61281, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x0, 0x0, 0x0, 0x0, 0x1444, 0xffffffffffffffff, 0x8001}, 0x48) 22:57:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000900)={&(0x7f00000002c0), 0x10, 0x0, 0x0, &(0x7f00000008c0)=[@ip_tos_u8={{0x11}}], 0x18}, 0x4008051) 22:57:22 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x3, &(0x7f0000000340)=@framed, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 22:57:22 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000680)) 22:57:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000600)={&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 22:57:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xf, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x48) 22:57:22 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 22:57:22 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001240)={&(0x7f0000001200)='./file0/file0\x00'}, 0x10) 22:57:22 executing program 5: gettid() syz_clone(0x8000000, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000880)={'a', ' *:* ', 'm\x00'}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c40)={0xffffffffffffffff, 0xe0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000980)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000d80)=r1, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000e80), 0x4) 22:57:22 executing program 4: bpf$BPF_PROG_DETACH(0x13, &(0x7f0000000e80)={@map}, 0x10) 22:57:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1d}, 0x48) 22:57:22 executing program 3: perf_event_open$cgroup(&(0x7f0000000880)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:22 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0xb5) 22:57:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$inet(r0, 0x0, 0x0) 22:57:22 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000b80)={0x0, 0x0, 0x0}, 0x100) 22:57:22 executing program 4: bpf$BPF_PROG_QUERY(0x10, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) 22:57:22 executing program 0: bpf$BPF_PROG_DETACH(0x14, &(0x7f0000000e80)={@map, 0xffffffffffffffff, 0x1a}, 0x10) 22:57:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) close(r0) 22:57:22 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xd}, 0x48) 22:57:22 executing program 1: perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:57:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:57:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000520000005200000003000001"], &(0x7f0000000080)=""/246, 0x6f, 0xf6, 0x1}, 0x20) 22:57:22 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x3, &(0x7f0000000340)=@framed, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440), 0x10}, 0x80) 22:57:22 executing program 1: bpf$BPF_PROG_DETACH(0x6, &(0x7f0000000e80)={@map, 0xffffffffffffffff, 0x1a}, 0x10) 22:57:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40900, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:57:23 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x2}], &(0x7f0000000080)='syzkaller\x00', 0x2, 0xce, &(0x7f00000000c0)=""/206, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:23 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:23 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x5, &(0x7f0000000280)=@framed={{}, [@alu={0x4}, @jmp]}, &(0x7f00000002c0)='GPL\x00', 0x3, 0x8b, &(0x7f0000000300)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:23 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x4, &(0x7f0000000280)=@framed={{}, [@jmp]}, &(0x7f00000002c0)='GPL\x00', 0x3, 0x8b, &(0x7f0000000300)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:23 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 22:57:23 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x32a40, 0x0) 22:57:23 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x1ff) 22:57:23 executing program 1: syz_clone(0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000800), 0x8) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f00000000c0)}, 0x20) 22:57:23 executing program 2: perf_event_open$cgroup(&(0x7f0000000880)={0x0, 0xfffffffffffffd28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:23 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x100000) 22:57:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000140)="80", 0x1}], 0x1}, 0x0) 22:57:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)='s', 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000a00)={0x0, 0x0, 0x0}, 0x40010162) 22:57:23 executing program 3: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000a00)={0x0, 0x0, 0x0}, 0x0) 22:57:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000a00)={0x0, 0x0, 0x0}, 0x40010162) 22:57:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000600)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x2101) 22:57:23 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000a00)={0x0, 0x0, 0x0}, 0x0) 22:57:23 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) 22:57:23 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f0000001d80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0x10) 22:57:23 executing program 1: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:23 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x12, 0x5f7a, 0x0, 0x5f6c, 0x0, 0x1}, 0x48) 22:57:23 executing program 5: socketpair(0x2, 0x2, 0x39, &(0x7f00000000c0)) 22:57:24 executing program 0: r0 = shmget(0x1, 0x1000, 0x40, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x1000) shmctl$IPC_RMID(r0, 0x0) r1 = socket(0x1c, 0x1, 0x0) listen(r1, 0x0) listen(r1, 0xfff) 22:57:24 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000140)={@random="1188c3104e1c", @remote, @val, {@ipv4}}, 0x0) 22:57:24 executing program 1: r0 = socket(0x1c, 0x5, 0x0) setreuid(0x0, 0x0) close(r0) 22:57:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0xe, 0x0, &(0x7f0000000040)) 22:57:24 executing program 3: getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 22:57:24 executing program 0: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0xfffffffffffffffd, 0x0) 22:57:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f00000036c0)=ANY=[], 0xf8}, 0x0) 22:57:24 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x40082) 22:57:24 executing program 1: mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f00000000c0)=""/198) 22:57:24 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000000)=ANY=[], &(0x7f00000002c0)=0x8) 22:57:24 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000400), &(0x7f0000000440)=0x8) 22:57:24 executing program 5: r0 = socket(0x1c, 0x1, 0x0) listen(r0, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000)=0x7fff, 0x4) 22:57:24 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000240), &(0x7f0000000300)=0xb0) 22:57:24 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000080)={0x0, @in, 0x0, 0x0, 0x80, 0x0, 0x4}, 0x98) 22:57:24 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x8007, &(0x7f0000000280)={0x0, 0x0, 0xc, "1c1515dd22dc4949f171de0c"}, 0x14) 22:57:24 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000280)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) writev(r0, &(0x7f0000000180)=[{&(0x7f00000005c0)="eca3", 0x2}, {&(0x7f0000001bc0)="6160c7", 0x3}, {&(0x7f00000002c0)="5a6ebcfdcc3e688b606a0ea5254de5247239b9d99ca5af5f4e9b59497332a9d9df71a3297fffed480f873bfe756431c196cdf5bfa981d53f1fa30d8069add335e2cf8c0800d9960ab999bcc6b1fcdd2a59613b0d2c1d208e351cf3ffcf83d76c6d1efed3e457cd7e2a36e49052f145e0cdc85533a5e07d36d1b465a793da853c2897850d6627789caf3b0d2b8980126058fbe28a7fe5f48f998192b4ceaae24c538f10a24c3214e36125e0a5cb19ab9fc0041c416b799285794ea340fa7e9be1dce6db0ef1e8f7583d7aabcc6c2e2419a1ebd3088d", 0xd5}, {&(0x7f0000000cc0)="16", 0x1}, {&(0x7f0000001240)="1b21", 0x2}, {&(0x7f0000000080)="79510941b044a52e3923b2aab9dbcd76919676eaa8f1b192b12fbd1e2587e1ca16c62836928cec748fef14e0670d3814f28d33e6d82de312f3d749d16e4b1d", 0x3f}], 0x6) 22:57:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) lchown(&(0x7f0000001880)='./file1/file0\x00', 0x0, 0x0) chown(&(0x7f0000001900)='./file0\x00', 0x0, 0x0) 22:57:24 executing program 0: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x1000) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x1000) 22:57:24 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000080), 0x90) 22:57:24 executing program 4: r0 = socket(0x1c, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x2000, &(0x7f0000000400), &(0x7f0000001b40)=0x4) 22:57:24 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) r4 = dup(r0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) 22:57:24 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000180), &(0x7f0000000240)=0xb0) 22:57:25 executing program 1: r0 = socket(0x1c, 0x1, 0x0) listen(r0, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000040), 0x10) 22:57:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x24, &(0x7f0000000040), &(0x7f0000000000)=0x98) 22:57:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000180)=""/153, 0x2e, 0x99, 0x1}, 0x20) 22:57:25 executing program 2: syz_emit_ethernet(0x9f, &(0x7f0000000a00)={@empty, @local, @val, {@generic={0x0, "90812b7a8b4582c2a72bf67e56bd464a2a19bb913c799d63beb1ec4e777a2e226aa13b61c31069ecd6f5099aae919171ad34932c8688e6b885545985db335b52d52d6c8e35e8a3aa19ecc46663ee7b2c9118c0b0136397af4eb9bb8b09aa57f7faf71b646045be7871e4a0a4ff222abc98bf052da432383cd06a9c0442c9fbc477f695627ff48e27de8271c809f6c27b5f"}}}, 0x0) 22:57:25 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x14, &(0x7f0000000040)={0x2, [0x0, 0x0]}, &(0x7f00000000c0)=0x8) 22:57:25 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)=0x10) 22:57:25 executing program 1: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:57:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000e80), &(0x7f0000000ec0)=0x10) 22:57:25 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000500)={0x1, [0x0]}, 0x6) 22:57:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000180)={0x10, 0x2}, 0x10) r3 = dup2(r2, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB="11", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000e80)={r4}, &(0x7f0000000000)=0x10) 22:57:25 executing program 1: r0 = socket(0x1c, 0x1, 0x0) listen(r0, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000)=0x4, 0x4) 22:57:25 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x8007, &(0x7f0000000280), 0x8) 22:57:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_linger(r0, 0xffff, 0x80, 0x0, &(0x7f0000000600)) 22:57:25 executing program 5: r0 = socket(0x1c, 0x1, 0x0) sendto$unix(r0, 0x0, 0x0, 0x20081, &(0x7f0000000040)=@file={0xa}, 0xa) 22:57:25 executing program 4: symlink(&(0x7f0000000180)='.\x00', &(0x7f0000000380)='./file0\x00') chdir(&(0x7f0000000080)='./file0/../file0\x00') openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:57:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x1, &(0x7f0000000000)={r3}, &(0x7f0000000ec0)=0x10) 22:57:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000100), &(0x7f00000001c0)=0x90) 22:57:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xf001}, 0x14) 22:57:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000000), &(0x7f00000000c0)=0x90) 22:57:25 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000a40), 0x200, 0x0) 22:57:25 executing program 4: r0 = socket(0x1c, 0x1, 0x0) listen(r0, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1004, &(0x7f0000000100)=0x3fd, 0x4) 22:57:25 executing program 1: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x50, &(0x7f00000003c0)={0x0, {{0x1c, 0x1c, 0x3}}}, 0x88) 22:57:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000180)={0x10, 0x2}, 0x10) r3 = dup2(r2, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000)={r4}, 0x10) 22:57:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x22, &(0x7f0000000180), &(0x7f00000001c0)=0xc) 22:57:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f0000000480)={0x80}, 0x1) 22:57:25 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f00000024c0)={0x0, 0x0, 0x0}, 0x2) 22:57:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfc}, 0x14) 22:57:25 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4}, 0x14) 22:57:25 executing program 5: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x1000) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x1000) r1 = shmget$private(0x0, 0x2000, 0x28, &(0x7f0000ffd000/0x2000)=nil) shmat(r1, &(0x7f0000ffc000/0x2000)=nil, 0x1000) 22:57:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000180)={0x10, 0x2}, 0x10) r3 = dup2(r2, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000e80)={r4}, &(0x7f0000000000)=0x10) 22:57:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180), 0x88) 22:57:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000180)={0x10, 0x2}, 0x10) r3 = dup2(r2, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB='9', @ANYRES32=0x0], &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000)={r4}, 0x10) 22:57:25 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000240), &(0x7f0000001280)=0x8) 22:57:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000280)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) writev(r0, &(0x7f0000000180)=[{&(0x7f00000005c0)="eca3", 0x2}, {&(0x7f0000001bc0)="6160c72e350caab54e183d4ef0955c8d9468de961a9857287993d3e2feb0e8388f74b69be0b54cd1875e73b60b0b3e14e9412edb53f33095f28b998e1bb2b9bd56a8c95e5a453c8cc7a724864c6be25daee966d460837e1c603bdb91544dcee5eb520874e970be09302e9a0aa278cfe33fe368f182b2c922170d6c0eae742d52fb74cf0d5726bc49fe16b89d42f3db59db4aa1bc40b3b748a98788ac2c530993692461eb6d98af79af7829", 0xab}, {&(0x7f00000002c0)="5a6ebcfdcc3e688b606a0ea5254de5247239b9d99ca5af5f4e9b59497332a9d9df71a3297fffed480f873bfe756431c196cdf5bfa981d53f1fa30d8069add335e2cf8c0800d9960ab999bcc6b1fcdd2a59613b0d2c1d208e351cf3ffcf83d76c6d1efed3e457cd7e2a36e49052f145e0cdc85533a5e07d36d1b465a793da853c2897850d6627789caf3b0d2b8980126058fbe28a7fe5f48f998192b4ceaae24c538f10a24c3214e36125e0a5cb19ab9fc0041c416b799285794ea340fa7e9be1dce6db0ef1e8f7583d7aabcc6c2e2419a1ebd3088d", 0xd5}, {&(0x7f0000000cc0)="16", 0x1}, {&(0x7f0000001240)="1b21", 0x2}, {&(0x7f0000000080)="79510941b044a52e3923b2aab9dbcd76919676eaa8f1b192b12fbd1e2587e1ca16c62836928cec748fef14e0670d3814f28d33e6d82de312f3d749d16e4b1d", 0x3f}], 0x6) 22:57:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0xfffffd1c, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)=0x8) 22:57:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000e80), &(0x7f0000000ec0)=0x10) 22:57:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000000)={0x0, 0x7fff}, 0x8) 22:57:25 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x14, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 22:57:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x5, &(0x7f0000000000), 0x4) 22:57:25 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) accept$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f00000002c0)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x100) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0xb) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 22:57:25 executing program 1: open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) link(&(0x7f0000000280)='./file1\x00', &(0x7f0000000800)='./file0\x00') 22:57:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000000)=ANY=[@ANYBLOB="01"], &(0x7f00000002c0)=0x8) 22:57:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000080), &(0x7f0000000380)=0xb) 22:57:25 executing program 5: r0 = socket(0x1c, 0x1, 0x0) listen(r0, 0x0) accept4$unix(r0, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x8, 0x0) shutdown(r0, 0x0) 22:57:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002500)={0x0, 0x0, &(0x7f0000002480)=[{&(0x7f0000000340)="fad323b7e1db55a10f236e15cad26c01ace8b948c00fc5db67bb5000600d8efa4ad07463782f19e91c034ed3675bcbfc925655baf405d71961a1aec9983eb6da99a62744c11d3f8f577f1c52c8c9889cfe480071f0d85b1d9dd37e1b1892df7ed3c712ef48f2a06cd7dbe3ce9a5312aa0f7a22", 0x73}, {&(0x7f00000003c0)="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", 0x78e}], 0x2}, 0x0) 22:57:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{}, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x99}) pipe2(0x0, 0x0) recvmmsg(r0, &(0x7f0000000080), 0x10, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 22:57:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 22:57:25 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @local, @val, {@ipv6}}, 0x0) 22:57:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockname$unix(r0, 0x0, 0x0) 22:57:26 executing program 0: accept(0xffffffffffffffff, 0x0, &(0x7f0000001380)) semctl$GETALL(0x0, 0x0, 0x6, &(0x7f00000015c0)=""/51) 22:57:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000040)="3038cd829261cc7a01743927405f7573a2b3669140c05e58814b56a86866fb71ce6c5e24873c858d82c2dbef33df182b328b56bc", 0x34}, {&(0x7f0000000180)="a90ffc701c303b9903d5688a5657b3477f4e09b500bfce258aaeabb3e22bb78de0aad26dd56a285ee8744a8e", 0x2c}, {&(0x7f00000001c0)="368a95e9538f6e4e7e2a78edddb5a583c6e9e9f9300f850e859e60cfb5506e71cd0108157fddcedc14b041a9ac41d42f38d10f96373bec6fb5a491131eb2dbe245ea4457d379d5bd0c006061bca1c476e644d93e52ddc290feb9e6bcdcfee3a71cb51d4f244666ae82812dedba2271d108aeb37cb023478c2e9529a12ae8afca51485a6eac2a6f574fc9fd223eb425d0371b58223f97fa19afc9c3566c66013747bbfdb589383972ede745c6edc65e5ca5cd1877286f1e3e092ab2e91ef929180c81b7b43718c4992b53b079d639584fcca1d83c422884ffd204132efeaac4b7d881f2078de649796a9cfe5d14249582", 0xf0}, {&(0x7f00000002c0)="e11178015a5ecf4ed9908ccb408cf24e17b5428d8b5a773758af103e59c655d962", 0x21}], 0x4) 22:57:26 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000c80)) 22:57:26 executing program 1: pipe(&(0x7f0000002bc0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) readv(r2, &(0x7f0000002480)=[{&(0x7f0000000040)=""/43, 0x2b}], 0x1) 22:57:26 executing program 3: pipe(&(0x7f0000002bc0)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r0, 0x4}, {r1}], 0x2, 0x0) dup2(r1, r0) 22:57:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000140)="8f1c0627c481cef379a9bc75d7b63611930ad051ee5a66f01d5a9e0c33d7a956e165852050a1a47bb1c72b65711e607d45bce8bd93082d4a8a443eb9f40e1473cd908c6819667c78134fabe957e4b75748960a96a6234e602273811f37aed34917e25da7370e5a89a957dd63a79a889ad9219950f6dc7678a77b5e812493646d482d7bb2104c37c18ce06e8510a0907a3d", 0x91, 0xe, 0x0, 0x0) 22:57:26 executing program 4: accept$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs, 0x0) 22:57:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) pipe(&(0x7f0000002bc0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) getsockopt$sock_int(r2, 0xffff, 0x1, 0x0, 0x0) 22:57:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000880), &(0x7f00000008c0)=0xc) 22:57:26 executing program 5: r0 = socket(0x1, 0x5, 0x0) setsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 22:57:26 executing program 3: syz_emit_ethernet(0x6f, &(0x7f0000000040)={@local, @random="c621ccfe91cd", @val, {@ipv4}}, 0x0) 22:57:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) poll(&(0x7f0000001880)=[{r0, 0x40}, {r1}, {r1}], 0x3, 0x7fffffff) dup2(r2, r1) 22:57:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002500)={0x0, 0x0, &(0x7f0000002480)=[{0x0}], 0x1}, 0x0) 22:57:26 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) poll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x0) 22:57:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002500)={&(0x7f0000000300)=@abs={0x0, 0x0, 0x1}, 0x8, &(0x7f0000002480)=[{&(0x7f0000000340)="fad323b7e1db55a10f236e15cad26c01ace8b948c00fc5db67bb5000600d8efa4ad07463782f19e91c034ed3675bcbfc925655baf405d71961a1aec9983eb6da99a62744c11d3f8f577f1c52c8c9889cfe480071f0d85b1d9dd37e1b1892df7ed3c712ef48f2a06cd7dbe3ce9a5312aa0f7a22", 0x73}, {&(0x7f00000003c0)="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", 0xf8e}, {0x0}], 0x3}, 0x0) 22:57:26 executing program 3: pipe(&(0x7f0000002bc0)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000180)=[{r1, 0x1}], 0x1, 0x0) dup2(r1, r0) 22:57:26 executing program 2: symlink(&(0x7f0000000180)='\x00', &(0x7f0000000100)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 22:57:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000000c40), 0x10, 0x0, &(0x7f0000000c80)) 22:57:26 executing program 4: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 22:57:26 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0x6, &(0x7f00000015c0)=""/51) 22:57:26 executing program 2: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 22:57:26 executing program 1: shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff8000/0x3000)=nil, 0x0) 22:57:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002500)={0x0, 0x0, &(0x7f0000002480)=[{&(0x7f0000000340)="fad323b7e1db55a10f236e15cad26c01ace8b948c00fc5db67bb5000600d8efa4ad07463782f19e91c034ed3675bcbfc925655baf405d71961a1aec9983eb6da99a62744c11d3f8f577f1c52c8c9889cfe480071f0d85b1d9dd37e1b1892df7ed3c712ef48f2a06cd7dbe3ce9a5312aa0f7a22", 0x73}, {&(0x7f00000003c0)="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", 0x7ce}], 0x2}, 0x0) 22:57:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/20, 0x14}], 0x1}, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) recvmmsg(r0, &(0x7f0000000080), 0x10, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{0x0}, {0x0}, {&(0x7f0000000280)=""/225, 0xe1}], 0x3}, 0x0) dup2(r2, r1) 22:57:27 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) poll(&(0x7f0000000140)=[{r2}, {r0}, {r1}], 0x3, 0x0) poll(&(0x7f0000000080)=[{r2, 0x40}], 0x1, 0x0) 22:57:27 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000000c40), 0x10, 0x0, 0x0) 22:57:27 executing program 4: pipe(&(0x7f0000002bc0)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000140)=[{r1}, {r1}], 0x2, 0x0) dup2(r1, r0) 22:57:27 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) flock(r0, 0xf) 22:57:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) pipe(&(0x7f0000002bc0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r2) dup2(r2, r1) 22:57:27 executing program 3: syz_emit_ethernet(0x22, &(0x7f0000000140)={@local, @empty, @val, {@ipv4}}, 0x0) 22:57:27 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) writev(r0, &(0x7f0000000640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) 22:57:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000100), 0x90) 22:57:27 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/battery', 0x10080, 0x0) 22:57:27 executing program 2: pipe2(&(0x7f0000001600), 0x0) syz_extract_tcp_res$synack(&(0x7f0000000340), 0x1, 0x0) 22:57:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000080)=[{&(0x7f0000000040)="18", 0x1}], 0x1, 0x0, 0x0, 0x2}, 0x0) 22:57:27 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001140)={&(0x7f0000000ac0)=@abs={0x0, 0x0, 0x3}, 0x8, 0x0}, 0x0) 22:57:27 executing program 2: mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffff9c, 0x0) 22:57:27 executing program 5: pipe2(&(0x7f0000000000), 0x4) 22:57:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(r0, 0x1) 22:57:27 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r1 = dup(r0) preadv(r1, &(0x7f0000001400)=[{&(0x7f00000013c0)=""/28, 0x1c}], 0x1, 0x0, 0x0) 22:57:27 executing program 2: mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x9010, 0xffffffffffffff9c, 0x0) 22:57:27 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 22:57:27 executing program 1: syz_emit_ethernet(0x103e, 0x0, 0x0) 22:57:27 executing program 5: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x0) getdents(r0, 0x0, 0x0) 22:57:27 executing program 3: ioctl$TIOCSBRK(0xffffffffffffff9c, 0x2000747b) pipe(&(0x7f0000000140)) 22:57:28 executing program 4: utimensat(0xffffffffffffff9c, 0x0, &(0x7f0000000240)={{}, {0x0, 0x3b9aca00}}, 0x0) 22:57:28 executing program 2: setuid(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) 22:57:28 executing program 3: semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000340)=""/102) 22:57:28 executing program 1: r0 = getpgrp(0x0) getpgid(r0) 22:57:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f0000000040)) 22:57:28 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) readv(r0, &(0x7f0000000380)=[{0x0}], 0x1) 22:57:28 executing program 4: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x2}, 0x8, &(0x7f0000001a40)=[{0x0}, {&(0x7f0000000840)="36aeef417b835658a3ca55406eb357290d0ea8cc92ab7ab05cdb9379001469b6d75cb716c9dae33d4afb52caabdb231bc91c0ec1a90790757b28a60d92971cc968176e62341e1d0b06a868bd8e6a6bf64bc40614c489ccd4a5320d03de9bc8d71fe34209ca247c54c722cc3fd03370d1745e3bdc3f01019ebb11a80de2cf759b44c2d60fd7c95a57eddd89dec245dc3ea07cf51d42172fa919c81d788bb5624638e90951285e953829f04c2a3b76de35ea67053f2cc87113de464f10ea6bb812cea0adec2943250d736e8ed4b1ca7debd1d4dd8c65ff37cc936d30c460aa85dc255d3fe052b2818bab231bcf2cd4e0d76da77aedd3e2c077d38138072af2bad37031546b03e921d25c1f0c39658e095e2d191781aa7bd3c6f63a465830961aadd655243b744e0ae6f6cefd1581f8bb5dcd6ec1ac07fb043234cc0309d91bef4445f85e97ec757f17b0158cfb6dadee6fea5ef1b5e6da704cd28a1c7932cd10482e2d162d7e1f80400d6a6b53e64bf1ecfe59457d54fcc7340091330e14f65c1707ab31352f061574a110e30e133c5890aae5faa3707d6f7184ef4e917f484bcd79ed741ab485470fc819f7be62e729dbf1a91283b598c5378a87567fd37940c01c9f29494857757b366ed02a5be0c03bc3562aca263315ab73c491fe20697f8e25d5d386a9e11aa93c872233e55f740813b6e48c9cf9edbd6a5de09c4432b51ba4f08a52c627efb2f264f7e6b06747cacd75518392500b8d15b5e82253bae8c664e394dabbf183dde2ce54e268feebdf66bee867dd6b18ad594cbb5b685ff74c2d0946479eef422f46aeeaac3d0a9aeb1e0c3afd68e4b324fbdc36a9682a41251edaa06d383d33131628cb8b2d89f71e57d7faa8d9f8d0dd1ba0e46c675001c949b66f0f58383a122f535bdfe937112533166cda3cbf7c919d471e75a53005c1a719482fc18d897519ecaddcfbea3e9691800238a4815aed42d61dd5592abe49bf34b3dca732ed8d5957c627b3434ab51e577c694a4af5308ddf7cb2fad17c05fd99660194818a0388fca35344fca8200a1bf2169dd98b347159ffaee847a5acf21c080ceb313217adb6881c122267a083a92fb61a383bcdf84174e1526879156a7a617bc6b75e7ffca38999ecd0a5b99a426ff9d9f3be174b1292b48ceedb103da59e3a1a5ef6c3d0741ce830493665f3a8f7192a5e6716b07fb5149ef8de0a1d73773de68ab70f4408169c3872886e3e355b4be90c04294e5d81fb214736cd747b126ff7e3dec6ac19b5656423aecf370a62760a5c6a6ede325c35fad97b561d91ae594fbcd72ca729438c23939ff02099ce2e0932da5c003666dfaa0c336dc4a8ad805825c16758ad2903204a16bca204b207d96f66ee1e8d65da1d0f5b5260508dab6f60be964170ee90ee536127eaf83cd67f03f20ef2d78d229c90ca210d7e36a69be5e8534e6917619512239756059fbda5b069bc9e03365b9553e2843facf3780d8fb3723cc86ccfc213a43c6c944488aedc62d1448ea2a9036c5ecb8f6ec818daf49cfa9e6d45781301f6eec621323a34081c6121b111601be664db557dfabe411910597aa865667be6c3ab806ef6098df218ccc42c2a69562038ed51d20f173d6de9e6f7a23fe9fa0d279d8b5de3efda0f91381368741dc55b6fdbd97e5200664c8cb11cc8de9a4095c59a63578e163d03e0d208ded3acb664b9bdcac007066b3d45f184cbc29368a12b8b44bf5187792903dd073c19915422135f7312130a3f13819541796c4f122f348e69cd2ac96bebf25bde5fe693c0f41409403327fe6408790cfb9fb3890ddb275ba210b7da27f5d22b2a6b3e708c535ce2cb09e247ef933dc213652bea9fe00801dcbb163dc302c04152b87b66a13e19a1d5d296d80a38dfebcee7e2e7a6ab8d68e7818565f265280e539e1c2ec0b9ade90bce2e1d6c661fc918a9cd24838386e784853415f67ce6099bee89b8cef5fc2d26e2e9bdc1eb7114704dc61739fcdad32fc1cce90afb8434f88a56ccd7d51d64432a97fd4ed1d361ac3050a466fcc06383d1977c5ece623d30d2dd7c921ea0e20eda9575a0f51224da1e7b0c1e3fd3f7f2260cf0137066944f05c6e4db9f6f9f06572e496a58f0aff6bda27db502f24b6ad5891e67aa815fc89eae67298d86522018267a864217998521ec0a2760e535a30e6131303f647943617f5e964148eb0450900f00e95c2ad8536f5fbba210fee77d10bbb656815b50793f48f9fa3369516966859e819901b240486aba0366049912a915dcfc47d2c25c097e7770cd9be71d27204bdbb976776a00b141e35103eeaa8bd3cdd523becd4e0563776507c59477fe41a5aaee23d208bd4ccb723168c26b6a979a24bdb5a312f7c98398c86942f8daa6dda7f522a23d026acecec4e3857564cc056a32f413be906b8acbd716e17e90d9966f27dce59638586355ca205004e42368b8c2d7510588d12c572c25ca023e495dfc565d368fefc0f1033dfbfdea470958fc9003176bdb67d924ddccc9bdd6ef6af35b9e28a638eefcee28e9aaaf2f647d6615207759cda36fe01daff5aa15cd6e7630e94505f5e700c1cc8daa56d7093903c66467f2e5c382cf028310fb8850cf37ecc3d5bcc851782e899d367c33d27190dd776199d3095ece0ca637c1100d1e5508437276e517599ecc6fab9ef84f161d06e3e1b6db8d049dc61c0dd0f27b670b983623f839a4438067e480aab5c14465eb40db4d6e5f8be414073b594474d079108b9c85f99e741101afeac75ecc0c05b649c1bf6cc2237bb7cfb2b492d13225344a9de1e213ef10b35c9c159386557d78c3ca6e4e064d5f83f0023ac2a50fd9cd3225171cc2ce062b5ce696eb4844e1314ee88d5bc7960e678025", 0x801}, {0x0}], 0x12af}, 0x0) 22:57:28 executing program 2: writev(0xffffffffffffffff, &(0x7f0000003340)=[{0x0}], 0x1) 22:57:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 22:57:28 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x1}, 0x8) 22:57:28 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) close(r0) ioctl$VT_ACTIVATE(r0, 0x20007605, 0x0) 22:57:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000340)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)='}', 0x1}], 0x4}, 0x0) 22:57:28 executing program 4: utimensat(0xffffffffffffff9c, 0x0, &(0x7f0000000240)={{0x0, 0x3b9aca00}}, 0x0) 22:57:28 executing program 3: shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) shmdt(0x0) 22:57:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) 22:57:28 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, 0x0, 0x0) 22:57:28 executing program 1: r0 = open$dir(&(0x7f0000000dc0)='./file0\x00', 0x200, 0x0) fcntl$getown(r0, 0x5) 22:57:28 executing program 0: mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) 22:57:28 executing program 3: r0 = shmget(0x1, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_LOCK(r0, 0x3) 22:57:28 executing program 4: sendmsg$unix(0xffffffffffffff9c, &(0x7f0000000280)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000180)=[{&(0x7f0000000080)="a35150ad9285b8399501ec59975748766f43e35b66c6e1ff402abd9d9d", 0x1d}, {&(0x7f00000000c0)="e2712055c87b689b36f4365616375528a13f63131bfbd9783dc08b3308e1d26dc59a6cd43d55da07c48bbb16cf33f7111f3964353cfb1c3a6c9fa38a5ad213a7f98f9b6625ada00e42caa375d35513e9af6806f6a6c46ec92be73223609f479489c0533e1c4145c0e7f346ea4538ff324e", 0x14}, {&(0x7f0000000140)="fbf1a3cc", 0x4}], 0x10000000000002d1, &(0x7f0000000240)=[@rights], 0x38}, 0x0) 22:57:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setflags(r0, 0x2, 0x0) 22:57:28 executing program 1: connect$inet(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:57:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpgrp(0x0) fcntl$setown(r0, 0x6, r1) 22:57:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) listen(r0, 0x0) 22:57:28 executing program 3: pipe2(&(0x7f0000001600)={0xffffffffffffffff}, 0x0) ioctl$FIONREAD(r0, 0x4004667f, &(0x7f0000000000)) 22:57:28 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @random="e8d66a36fa89", @val, {@ipv4}}, 0x0) 22:57:28 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=' ', 0x1}], 0x1, &(0x7f0000000300)=ANY=[], 0x38}, 0x0) 22:57:28 executing program 1: open$dir(&(0x7f0000000dc0)='./file0aaaaaaaaa\x00', 0x200, 0x0) chown(&(0x7f0000000a00)='./file0aaaaaaaaa\x00', 0xffffffffffffffff, 0xffffffffffffffff) 22:57:28 executing program 0: shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={{0x0, 0xffffffffffffffff}}) 22:57:28 executing program 5: r0 = msgget(0x2, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000040)=""/129) 22:57:28 executing program 2: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200), 0xc) 22:57:28 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x0, 0x0, 0x0) 22:57:28 executing program 1: sendmsg$unix(0xffffffffffffff9c, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 22:57:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) fchown(r0, 0x0, 0x0) 22:57:28 executing program 0: open$dir(0x0, 0x0, 0x0) socket(0x1f, 0x3, 0x0) 22:57:28 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x2241, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) 22:57:28 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000001640)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x10, r0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) getsockname$inet(r1, &(0x7f00000011c0), &(0x7f0000001200)=0xc) 22:57:28 executing program 1: open$dir(&(0x7f0000000540)='./file0\x00', 0x8511, 0x0) 22:57:28 executing program 5: open$dir(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) link(0x0, 0x0) 22:57:28 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000002b00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0) 22:57:28 executing program 0: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/58) 22:57:28 executing program 5: socket$inet6(0x18, 0x1, 0x0) 22:57:28 executing program 3: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/152) mlock(&(0x7f0000ffa000/0x1000)=nil, 0x1000) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 22:57:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0xc) 22:57:28 executing program 2: r0 = socket(0x1f, 0x3, 0x0) bind$inet6(r0, &(0x7f0000000880)={0x18, 0x2}, 0xc) 22:57:28 executing program 4: open$dir(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) link(&(0x7f0000000800)='./file0\x00', 0x0) 22:57:28 executing program 5: msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0xfffffffffffffffe) 22:57:28 executing program 0: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f00003ff000/0xc00000)=nil, 0xc00000, 0x0) 22:57:28 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000440)="f0711c2cd0f8ee4fd2f033f8b3257bdf93b174b0c8e70ea30f9a6cda47780ae8a6c72ec06b5a81f4f2b158a75dc168c5c2cf1da503d0ac79c4f2fd3e6179b361c54fe9acb55da440653ad9a40d29be51dc487ab2500853fb57d678d74d1c79e6a5c1b91fa1adff73073e57e70f54dc126c14a65d261ca80af36d753f1bd275d536ce847a08d20bad25e1f233efaea0a8fca7b1ddf6142973d2ad68dc0ab64f04d6a9bd050e9d9b40da192a1bc12d60a67526104a40040759b61b677e42b39680dcb3f3bcea8936a60704b0a14e21b5572ec103a46c5661a434cbc60cdb3be71f66ebf6c380deebc97b431e7fbc61d7701dd84267cf57bf5474", 0xf9}, {&(0x7f0000000540)="71e14bbed72cb9231b22c30886ecb212cbc4381bef609931f05c6ffa82857d337c9952540d4dc3b0d5c1bb21a9da804d2be27b7f25916753b001932f5f4b99879bdfb3745ea36365", 0x48}, {&(0x7f0000000040)="498096566d15d0ffcbc0a41e9911195b2b4bf658927cd65b1957de126ed139e26145acfe6814", 0x26}, {&(0x7f00000005c0)="1f1778cd65e49fb8561c0275c071b149eac1cc7f19c6f5d778ad263e8a9374d9967b2076af973df361eed17767b5c10e4b0ff29a1d6bfb2e579a225f2a8d831f1e4d3e832dcb605fe47a5fc995683bdd677c5f357b0fcf0c780614fb7e", 0x5d}, {&(0x7f0000000b80)="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", 0x995}], 0x5) 22:57:28 executing program 1: socket$inet6(0x2, 0x2, 0x0) 22:57:28 executing program 2: mlock(&(0x7f0000ffa000/0x1000)=nil, 0x1000) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 22:57:28 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) writev(r0, &(0x7f0000001500)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) 22:57:28 executing program 5: r0 = socket$inet6(0x18, 0x2, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:57:28 executing program 0: madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) mprotect(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0) 22:57:28 executing program 3: mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000000b80)=""/4096) 22:57:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000080)="c7", 0x1}], 0x1}, 0x0) writev(r0, &(0x7f0000000ac0)=[{0x0}], 0x1) 22:57:28 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) fcntl$setown(r0, 0x6, 0xffffffffffffffff) 22:57:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000440)="f0711c2cd0f8ee4fd2f033f8b3257bdf93b174b0c8e70ea30f9a6cda47780ae8a6c72ec06b5a81f4f2b158a75dc168c5c2cf1da503d0ac79c4f2fd3e6179b361c54fe9acb55da440653ad9a40d29be51dc487ab2500853fb57d678d74d1c79e6a5c1b91fa1adff73073e57e70f54dc126c14a65d261ca80af36d753f1bd275d536ce847a08d20bad25e1f233efaea0a8fca7b1ddf6142973d2ad68dc0ab64f04d6a9bd050e9d9b40da192a1bc12d60a67526104a40040759b61b677e42b39680dcb3f3bcea8936a60704b0a14e21b5572ec103a46c5661a434cbc60cdb3be71f66ebf6c380deebc97b431e7fbc61d7701dd84267cf57bf5474", 0xf9}, {&(0x7f0000000540)="71e14bbed72cb9231b22c30886ecb212cbc4381bef609931f05c6ffa82857d337c9952540d4dc3b0d5c1bb21a9da804d2be27b7f25916753b001932f5f4b99879bdfb3745ea36365", 0x48}, {&(0x7f0000000040)="498096566d15d0ffcbc0a41e9911195b2b4bf658927cd65b1957de126ed139e26145acfe6814", 0x26}, {&(0x7f0000000b80)="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", 0x69a}], 0x4) 22:57:28 executing program 0: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/58) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 22:57:28 executing program 5: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/58) munmap(&(0x7f0000ff8000/0x7000)=nil, 0x7000) 22:57:29 executing program 3: mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x7) 22:57:29 executing program 2: r0 = socket$inet6(0x2, 0x2, 0x0) setsockopt(r0, 0x0, 0x0, 0x0, 0x0) 22:57:29 executing program 4: socket$inet6(0x18, 0x10000003, 0x0) 22:57:29 executing program 1: r0 = socket$inet6(0x2, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KDENABIO(r1, 0x20004b3c) 22:57:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8981, 0x0) 22:57:29 executing program 4: shmctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/21) 22:57:29 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, 0x0, &(0x7f0000000200)) 22:57:29 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, &(0x7f00000010c0)) 22:57:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv4_newroute={0x28, 0x18, 0x7, 0x0, 0x0, {}, [@RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWTUNNEL_IP_FLAGS={0x6}}]}, 0x28}}, 0x0) 22:57:29 executing program 1: bpf$MAP_CREATE(0x8, &(0x7f0000000480)=@bloom_filter, 0x48) 22:57:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8990, &(0x7f0000000a80)={'wlan0\x00'}) 22:57:29 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, 0x0, &(0x7f0000000200)) 22:57:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5460, 0x0) 22:57:29 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f00000034c0), 0x0, 0x0) 22:57:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000007c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=""/74, 0x4a}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x2, &(0x7f0000007e40)) syz_genetlink_get_family_id$tipc(&(0x7f0000000200), r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 22:57:29 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0x2a, 0x0, 0x0) 22:57:29 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, 0x0, &(0x7f0000000200)) 22:57:29 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0x31, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, @vifc_lcl_addr=@loopback, @loopback}, 0x10) 22:57:29 executing program 5: readv(0xffffffffffffffff, &(0x7f0000001440)=[{0x0}], 0x1) 22:57:29 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x101000, 0x0) 22:57:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8947, &(0x7f0000000a80)={'wlan0\x00'}) 22:57:29 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, 0x0, &(0x7f0000000200)) 22:57:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8911, &(0x7f0000000a80)={'wlan0\x00'}) 22:57:29 executing program 0: bpf$MAP_CREATE(0x6, &(0x7f0000000480)=@bloom_filter, 0x48) 22:57:29 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$MRT_DEL_MFC(r0, 0x0, 0xcd, 0x0, 0x0) 22:57:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001e00c1e7"], 0x14}}, 0x0) 22:57:29 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$tun(r0, &(0x7f0000000000)={@val, @val, @eth={@link_local, @empty, @val, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "e35668f9c91aaee5"}}}}}, 0x34) 22:57:29 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000480)=@bloom_filter, 0x48) 22:57:29 executing program 3: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000200)=""/152) 22:57:29 executing program 0: bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002a80)=0xffffffffffffffff, 0x4) 22:57:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8946, &(0x7f0000000a80)={'wlan0\x00'}) 22:57:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newroute={0x1c, 0x10, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x6c}}, 0x1c}}, 0x0) 22:57:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8903, &(0x7f0000000a80)={'wlan0\x00'}) 22:57:29 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0x21, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, @vifc_lcl_addr=@loopback, @loopback}, 0x10) 22:57:29 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000780)={0x1f, 0x4, @none, 0x0, 0x1}, 0xe) 22:57:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8932, &(0x7f0000000a80)={'wlan0\x00'}) 22:57:29 executing program 0: bpf$MAP_CREATE(0x14, &(0x7f0000000480)=@bloom_filter, 0x48) [ 358.625006] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 22:57:29 executing program 1: accept4$bt_l2cap(0xffffffffffffffff, 0x0, 0x0, 0x40000) 22:57:29 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$SIOCGETVIFCNT(r0, 0x89e0, &(0x7f0000000440)) 22:57:29 executing program 5: syslog(0x2, &(0x7f0000000000)=""/185, 0xb9) 22:57:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) pread64(r0, 0x0, 0x0, 0x0) 22:57:29 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000780)={0x1f, 0x0, @none, 0xd1af, 0x1}, 0xe) 22:57:29 executing program 2: setsockopt$MRT_DEL_MFC_PROXY(0xffffffffffffffff, 0x0, 0xd3, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, 0x0) ioctl$SIOCGETVIFCNT(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f00000000c0)={0x1f, @none}, 0x8) 22:57:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5411, &(0x7f0000000a80)={'wlan0\x00'}) 22:57:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8918, 0x0) 22:57:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8916, 0x0) 22:57:29 executing program 1: socketpair(0x26, 0x5, 0x5, &(0x7f0000000000)) 22:57:29 executing program 3: futex(&(0x7f0000000140), 0x0, 0x1, &(0x7f0000000180)={0x0, 0x3938700}, 0x0, 0x0) 22:57:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8943, &(0x7f0000000a80)={'wlan0\x00'}) 22:57:29 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r0) 22:57:29 executing program 1: add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 22:57:30 executing program 5: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000000), 0x4) setsockopt$MRT_PIM(r0, 0x0, 0xcf, &(0x7f00000000c0), 0x4) 22:57:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x891d, &(0x7f0000000a80)={'wlan0\x00'}) 22:57:30 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0x16, 0x0, 0x0) 22:57:30 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0x14, 0x0, 0x0) 22:57:30 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r0, 0x0, 0x21, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_addr=@loopback, @loopback}, 0x10) 22:57:30 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000780)={0x1f, 0x4, @none, 0xd1af}, 0xe) 22:57:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_IIF={0x8}, @RTA_DST={0x8}]}, 0x2c}}, 0x0) 22:57:30 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) fcntl$getflags(r0, 0x40a) 22:57:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8929, &(0x7f0000000a80)={'wlan0\x00'}) 22:57:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newroute={0x1c, 0x10}, 0x33fe0}}, 0x0) 22:57:30 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x103000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 22:57:30 executing program 5: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x0) 22:57:30 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$vhost_msg(r0, 0x0, 0x0) 22:57:30 executing program 0: clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x0, r0+10000000}, &(0x7f0000000480)={&(0x7f0000000440)={[0x8]}, 0x8}) 22:57:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x9, 0x3, 0x328, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x290, 0xffffffff, 0xffffffff, 0x290, 0xffffffff, 0x3, 0x0, {[{{@ip={@loopback, @dev, 0x0, 0x0, 'veth0_to_bond\x00', 'macvlan0\x00'}, 0x0, 0x178, 0x198, 0x0, {}, [@common=@inet=@recent1={{0x108}, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x388) 22:57:30 executing program 2: keyctl$update(0x1b, 0x0, 0x0, 0x0) [ 359.811296] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 22:57:30 executing program 4: socketpair(0x11, 0x3, 0x3, &(0x7f0000000640)) 22:57:30 executing program 2: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x3}, 0x0, &(0x7f0000000100), 0x0) 22:57:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, &(0x7f0000000940)) 22:57:30 executing program 4: add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "2abb8d40648cded352ebd0e41d2185d5ea36e2713006115f3f3cf6b09b6340dc7cc3497e2f1bf52d502f18b5dee4f449f33e100588e7ff0dbbb5b1a79d4863bd"}, 0x48, 0xfffffffffffffffb) 22:57:30 executing program 3: syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x640940) 22:57:30 executing program 1: bpf$MAP_CREATE(0x5, &(0x7f0000000440), 0x48) 22:57:30 executing program 2: syz_open_dev$vcsu(&(0x7f0000000100), 0x1, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) 22:57:31 executing program 5: timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x0) 22:57:31 executing program 3: setgroups(0x5, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0]) 22:57:31 executing program 0: keyctl$update(0x1d, 0x0, 0x0, 0x0) 22:57:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x14}, 0x48) 22:57:31 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$team(&(0x7f0000000000), r0) 22:57:31 executing program 1: getgroups(0x3, &(0x7f0000000000)=[0xee01, 0x0, 0xffffffffffffffff]) setgroups(0x1, &(0x7f0000000100)=[r0]) 22:57:31 executing program 3: delete_module(&(0x7f0000000000)='\\/)}%\x00', 0x0) 22:57:31 executing program 5: keyctl$update(0xd, 0x0, 0x0, 0x0) 22:57:31 executing program 5: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100)={0x0, "89a1127af557d48ab17fcfa067f1a20125c426eacdc2c268b68371777c69320d095a948978f8e69b03cfb5cf1df1fbe6881f4b4cd879bd68a679563d4d6259f4"}, 0x48, 0xfffffffffffffffc) 22:57:31 executing program 2: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x3}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) 22:57:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x17, 0x1000, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) 22:57:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x9, 0x3, 0x1f8, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x290, 0xffffffff, 0xffffffff, 0x290, 0xffffffff, 0x3, 0x0, {[{{@ip={@loopback, @dev, 0x0, 0x0, 'veth0_to_bond\x00', 'macvlan0\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffd}}}}, 0x258) 22:57:31 executing program 1: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xa, 0x8, 0x2, 0x3, 0x40, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) pipe2$watch_queue(&(0x7f00000000c0), 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0}, 0x38) 22:57:31 executing program 4: keyctl$update(0x16, 0x0, &(0x7f0000001000), 0x0) 22:57:31 executing program 5: keyctl$update(0x14, 0x0, &(0x7f0000001000)="1c63593426f29b88d6", 0x9) 22:57:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1, 0x5, 0x80000001, 0x10009}, 0x48) 22:57:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x4, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:31 executing program 3: mmap$KVM_VCPU(&(0x7f0000ffc000/0x4000)=nil, 0x930, 0x0, 0x30, 0xffffffffffffffff, 0x0) 22:57:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x16, 0x0, 0x400, 0x200, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 22:57:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='ip_vti0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYBLOB='x']}) 22:57:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x18, 0x5, &(0x7f0000000140)=@framed={{}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0x4}]}, &(0x7f00000001c0)='GPL\x00', 0x5, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 360.886093] Bluetooth: hci5: command 0x0405 tx timeout 22:57:31 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000040)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @private1}}) 22:57:31 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 22:57:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x29, 0x0, &(0x7f0000000080)) 22:57:31 executing program 4: syz_open_dev$vcsu(&(0x7f0000003240), 0x0, 0x1a1980) 22:57:31 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 22:57:31 executing program 3: pipe2$9p(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 22:57:32 executing program 5: keyctl$setperm(0x5, 0x0, 0xc776baed944fa753) 22:57:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000002c40)=@bloom_filter={0x1e, 0x0, 0x4, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 22:57:32 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x33, 0x61, 0x62, 0x62, 0x62, 0x39, 0x34, 0x65, 0x61, 0x62, 0x30, 0x61, 0x36]}, &(0x7f0000000180)={0x0, "4c861f9aac4ad45338c1508ace1d94727e71dfe510443e36cf929c4631a31dc64b0fdd1075e8a2ec667e6a7c3210630cd33a27513a67184b73b2d289f951fbb3"}, 0x48, 0xfffffffffffffffe) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r0) 22:57:32 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002980)=@bpf_lsm={0x1d, 0x1, &(0x7f00000026c0)=@raw=[@kfunc], &(0x7f0000002740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 22:57:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000480)=0x3, 0x4) 22:57:32 executing program 3: keyctl$update(0xa, 0x0, &(0x7f0000001000), 0x0) 22:57:32 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000800), 0x10) 22:57:32 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002680)={0xffffffffffffffff, 0x0, 0x28}, 0xc) 22:57:32 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000005c0)={&(0x7f0000000000), 0xc, &(0x7f0000000580)={0x0, 0x3e0}}, 0x0) 22:57:32 executing program 2: select(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x5}, &(0x7f0000000100)={0x0, 0xea60}) 22:57:32 executing program 1: openat$vcsu(0xffffffffffffff9c, 0x0, 0x400400, 0x0) 22:57:32 executing program 3: keyctl$update(0xa, 0x0, &(0x7f0000001000)="1c63593426f29b88d6d5e13c01276d1ad61db832ac492a627d05eb669fa99c19", 0x20) 22:57:32 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x3e0}, 0x1, 0x0, 0x803e0000}, 0x0) 22:57:32 executing program 4: socketpair(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 22:57:32 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x16, 0xfffffffe, 0x0, 0x200}, 0x48) 22:57:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/88, &(0x7f0000000080)=0x58) 22:57:32 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000640)) 22:57:32 executing program 5: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x7}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x4]}, 0x8}) 22:57:32 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x12, 0x101, 0x0, 0x1, 0x0, 0x1}, 0x48) 22:57:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x9, 0x3, 0x230, 0x0, 0xffffffff, 0xffffffff, 0x100, 0xffffffff, 0x1c0, 0xffffffff, 0xffffffff, 0x1c0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffe}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x290) 22:57:32 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002d80)={0x6, 0x1, &(0x7f0000002ac0)=@raw=[@jmp], &(0x7f0000002b00)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:32 executing program 3: r0 = getpgid(0x0) tkill(r0, 0x1c) 22:57:32 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0}, 0x38) 22:57:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000002c40)=@bloom_filter={0x1e, 0x0, 0x4, 0x8000}, 0x48) 22:57:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000a40)={&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000a80)=0x40) 22:57:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}], &(0x7f0000000040)='syzkaller\x00', 0x1, 0xe5, &(0x7f0000000080)=""/229, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:32 executing program 0: keyctl$update(0x2, 0x0, &(0x7f0000001000)="1c63593426f29b88d6d5e13c01276d1ad61db832ac492a627d05eb669fa99c19df18977469e581d9b37ed4ec9b04e01999ea42f8b7d46a75e1969d5fd97d1a08e71b3249618ad6aed5abc5952ee86217cd888a7cf1fac80d3e287b68045d79404e796677d57cfd82b7eb255658c3a5ab384da2093e01ad532db54c232e23605c002ce810f9a8b92dbb328d978fd5b7bc659b74b60cf328e7bf4d7eaf222d98e259afbc927500e1914124f78ccac0713fe75e24e238170323d07879914a4fc7d04a2ecd6109f664b0262a7470a20907f3cbc8d3dcc01c81ae5feda6ec0899958cc3b226838d6b7dc968f407b9c4c955f1389c612b80c615d95bcec6096f5a90bfe05e7de177d051846da827053fc39890a9445eda9cb3e9d14fa134b38f696d65c7ffc1b912acfc92e4889174e1424fb6bec5fd1ad116f7aa0e9aa1ee38b588204ac9d23ff7a3c16fe3da1b8af348ec0e2256fd207b96959d0acde06bf1687c2f20c6b9b4cd83da99cfed670a5db055fee01512939985804444ddcf6bea6a10ad84f3f804fe5e00b7d555c3c722b47907f8cafba21e2f908fa7059945e2e13eecb194918989c567ff2923763792eaa4900c2162723fb87f9bd3239867aa34a0347a65a4536e7c3f74bfb708854b7129dcac8b9224b0fdffd1aeb35358a0d75b15cd83e1a08b2d761e1567508956797256af62d8be8f420f54fb4640aa91df797d87de4da5753bb4acea14afe7b8f03a2f0fd40f877a75bb7b5643ee5ef5a8058ab0b3e6bc2329703154d7912a8f46f519a98373af5c2b5e31aa5aa779a51481f2386af6019619b27d7693dd835422d5543bcc4914dc3791426b499fc337c28309717c8a2313161f6b73eb09e2935e83534dd8f865fef8e5589eba5407b4f9ca3517778a7b791b13a7dcf06c095f9983aa98c7ecb0d968d4e14e73b49c453cbc61222a145d2cf4de663b6d9bc72d44f80c743b10828451d2a527a48c7a940b2af309739937ee3d3b3787f979f12b4fe0d8811c6fe2541bcf6d290bdb36a8abcd2908959c8ccc6a2aba033c4be32d5794c0b1423aed94b415366b941772b7ee5ccc066cf54dbf71d45178f3d30a6b021f61dbacc086bd795e842463a6fa3680c1855edd36187ddf25e1a5cab39067fc9cd0528390a6d9a4d8cf1ffac49ac425d2b8cbd007011bdaf4c725b1136c43fa05b98e9a9577c8acf20d4c3c9c4cdee5e2b5b3b8adc1e52dbcfeeb934fde86d0522c4dd05626d7fce86f0da89e994c00c44a530e920b11fb8bc9e0302f364a03af88fa15925c9170c56dce64070220f8ebce736a07e3539bd7b7bc69fda7e4324adfb71f4b8ff4c192e8331cd88d30aa7418d22df0de055eeaa2938fafea2be90a0b081b0733bd6e8180145665635b3bfd65cc7a206d4054d3a5c2ecd3fdeb21b2c6f40437babc5df9d2c09c812dc46c44455542ccc3b2fbb33e59e1cba95c5b7e69ee69de34063e0ca874115a7d3f0b3799c67fff2f02fded1e3b2de9f16b5f5d6d11f101e6167db0d495f9225468c3126a5434241cd350c2ee376f841a14377b811aa48e97432a2eef0d665ca44cbc778d98dc400bb27d58dd21fc24553c1915f18ac23f2736a0a81241d9f144878b5b03df348d7950482e3c479ed32edf411a6ecec6beef36702d352488a9d44acbf6e8f2f117287543ee3b01abe85c25f54c269abd7fe31be4de43015b2d3569683bbc5c41435ea6132d05d43dff6cecb3fdc1f1ca93efd6ebb7895ce79663e4f51e21839397804e1da24499ddc1d42edfe5952cb82af9d51535211876891839a883d5f0086163ae9ac3353f5b64af71bd78b88165c4501585a0dbe2e65c5fb5874f88dc87a0cd72427593a1ed0285cd1fe4b9b53562534ad26a172a1764919c39896503ad7dce504137b410e0dd50acfc84c3ad8e21b9d0e9862d824fe23b09700382ee0ff14d08177ca7e2e071c7a76b1d53395962fe8411017d40c8f65ad6fe9f73cfc0dbbd065c824eddf56a5941245cae8770da661e29184d360b399853b1f9e53ed6c7d9c92a3753e737f5ecce4f8485838868dfd568503a789ef8c74207abffdf477e6411d8e3c9d6503ab406bc94888cb3681b5b8e823aae72d64b6db1fe50d083d6a4eb61b598b98c1de067937d193615ef28f0148a71a9a1e0e1cc1aad5900349c7d94adccf28b161e6e4a84883af53c9755254183f65218e89559e5d64be67144caafff27346a92d08749bf9257a4e3bb5e3cf3c28ae906515dc1ca84b133d6a3a3a81d772c04fd144fb34fff7d6a3a68392b4a13f751920da2bdf042d9067952d4b48427e00f4df93f9788d9f1ebcc44f88c14c0f0b83d5db0d3de05e4d3398865fb722f3dab2ab961b9336bb065d1a7f23ab7311748004ad31c538eb1e2ac8caeb7e11750bdbb264dcfcf321489cd6d0b04f71a44b944db41a946dc1d61c3941b5c2d4572369df334e057f935c21f6fb505baeb25a3c795c23f62c074bd192cb8638acac9d981a1b58c871fcd168e730c141896d920626068ab5d7c700a4e3e646cde508b1c92fe05d6194047167f17b86173f0ce4db94c88d68640e47b389b3d68524758335184d54856a7c71579611ab56689841b01f6b47c67e116eb3b63097bdf385c68abdb803da660b1695dd078b8de3f8fa38d154ef83625ef86cb9e17d4ef805253b5417f5f35a9c33fcbca6759555f0ac76badaec6e610b6798c9ab63b02a761debbc22bd0b897bb1a368dd237658959540fbc569a42996e5ee29ff833726b41f82551f6d0a0173b4004655c983e0f9a9f9ff630bdd35121247b1b7523809efd242a0b82adc79a1676c3c1192c5eab863a2cf7ca327fcbc8f59ddd76128709c81b0e21d6e69c1048e497804be17bd801d5121af466866d5ea3de683c374c6b7e10154f2fb830e3fff9732e13cdbd18c9291459400c8118208f95e42990453cc61e886d52456b0ecc97e354f7cceb8df5cb0a9cf28647a7784beb1e4c7b6aff421039e15d48fa81182bda64541e0650e1fe488ca89aea0061e505da652585d0caa6c1fc60d280711a2c1e20c35858e5d26a3c4a9b6535808f3583957967818aca9d98f2f66e593eb59934ead6aafd8c9168301884f55469ca91bdd935f0ae918d56695e70a599c003a9c61ccb43466abcd406c70ee712791db592d91ae1bf1e1ee798de8eb997c43ced6874a78ae370573b82dbdf61b2ab6e4fff28bc8b5b9b56b0f48db1fd9e3030999d8f182d439f51c865e13d29744df3f47146382cf9cb95bcfc60e9c4999bf72b10e96c34529024c2eb57f876944e44c28e8e8b4112304f661d49399806b7da3fff4be9e37b6adf8db34aadb405dfcce6c49cb78196b567776cc02979a514bd07bef8336412431fa571a18dbbc56b8b66693fd0336e926d73fc4d63c1da3217e1fdbd3cd815531e83f249d3e61264ec52c75c89169fb01924ef11a2400a335f44d9793dd6128493f20dfc9609979d4ae0f005a5cb934d6e5e4f6f29f0fd3e65b5e25af43c44b0562a5605d32762369113303e351a6cb756a7ca8946ce47ddf0bbc398be721685274490d6b8e97ff9327040cae5899547a574c94d3ec8881fafaa32454f12feadab98f86dc5a4ddd15f2114b4f0656c4a28f4970d8e133995c28a99859777195cb1de41b08df75acede763b936b35b32d1dbd15babf7347860cecd250b54fce6e04bf10abc40784a7bae9ec986a7b5de87cb964ceac781c765d71ec4485eeae893049c54dc46467107e3359988a79916026b0e603b89c6ffb307fd0905335f4a059be9ec464ff947c0c8d4c37bb81cc3d5ae5dafbc2acc5264e8114dc71a6f1458e3ef5dffcd0a7be2875a4957b24c1e197da9985488228e319b5df3216dfadf09569df689b0354525c6b06c4583dc9ec4a402bb7ebd902c75b16e4fbe4f617cd89d718e5b564ef0a3649a09602fabcb1ea5cc5200c3c7ef961b3fb0a677e7b8bb5ffb37fe772b35ecaad37c3ae7f2b82a30002c3ff837d12c20eb3a10b59c4dcf0c1b49ab7552f04d808f555599e3e2843c3575f6520d175af9e95597b041442e6b58152a828e7ee10f05d2a8b382badd0b66b7efbc3304032168543495f090ee61be994684a0835a4a1103e0cebcfecb3a597b84236aa9f3c77ffef5587d97b25c04cdd2fc885db2f8210f4533f8ced16ee0ce287f28d1fbd1fbd9b9dd9cb06d5609cb53bc1f8af09caebf46a25f19efa941ec1c5c16d5e3fbe2a0b0ce7e4eb5a3def578c067b5b482cf8ffd887813aac5bd46bce04432585cafd7337558a2cae25724298e8973e9f716a027ed640eab49c3c05387dc07921d5f9babaf10c50a3f7595b2aa3dac8d951b9a1d6facbeaea056fdc6fe5b01814ad082c00f22f81adfa05d5eb61b90f26f24ce8bc78101b83bb4bfb69fe3320c09ca1b3c76f23666cd49a1048e41a03e6f0697be3104bb9b7b003bf1b314897994235ad3c89e6d746c8243023d895906246cb75a9b5a931037d2977a8a1dfcbbf3d26a8b5264780caf55525b09d048915780a6a2509b4f7383a7b0b50764f92c801d2c64421ae91ac2799d0ea0c994809aab82817fac248bf392f492d58375520f60e71e219ae22e7bfe2e3252dd1eb929957b5849e480b9b4141a7f3fb01abdb18bd4c35cc28dbf84b1f386a63814fb2d101b9f50492e512882035ee5e0ee5c0b44ddba9701cce29a97b38d5df3be8eec56a75df7cd3a42b3c7da2de5287f37db984cf8083eb6054c96d0ae0c4370d841a716169cade79c2d8b1f1aeed2915260bed30dfd3459af29ca00160590969696033a4ae84210ec231f5a64dc6dd7bb7e1fbd0f95f9c01b96a2fea32ce8f1245d006e42c680b8ad7488c24b4a0eb589e16e7d6ce6d929af3b817e0ccd7a6b8d4b4938046f34f8b442254ba458112b428abd2856f394b9aacba8d243338656083262c5dfe70cf7e4817a595941b4dcb5f8eee01872009a863a8ce9793368ddcf731341b5cb20562c77f782419d0cc0d629289ac3c5e196dcbe71f707079d7312eec0d108cc2b93ec9042ea72bf8833f6e6f6c9e93c00a6745ae3e5bf6e70d18afaba9b8009a0e1663476b41f9433e7ba718d0775cc3672de11a9409a859aed02076b85c5701bd98bb28353c0f24e9bdd7828ea9b6f4f68d9f351a4ad9452cc887900d6c071fbef9362ea1d87e21d22a3f631bee96bad4c4061c8d1f49278fb7cc7182d1cbc44a860728479ed0e3e7a4bf4dfc07d65ce9b884dc1d77866eb0124beaffa34fdf8816553eb381df00f8665575685bf06a59bb60de339c9f5f85f9a49126b595baf3024aaf7aa8557bd0fea2b9d368e6e54715476c48c86d2aabaf122a0397b731520d258d20763873014c191dd9e942a332d0571da428c11e5ae2866cfcaeb6f15652a847f36fe7c00ca03200b252313b53666563d519b3c5418cea269883995508c9a174f76cb32e3c2e0fbd1c8bd1afbcf6d5452a916eca2ed015ffcd5515a4ce036e23c28705aa058ae8ddc3ee297fdcb6e3db61a0a090749b8ed93c83ad48d90815bf6a09a9e82bec7dd56cb6dc23eee7a3b16777b7ba0ac1f0aad8fa6a695fff0184be6b71d01b0d7051400354b7259e507533286308f06cbf31af65d1b5d6ab9036cecc64af83d61d391bdf7794797bb2f54014dbe86961c7881916df11791cec558480637cda3dda9f611f1532bcac6c799aac76e58e15cfa99d00d0f26f1e5dd391fd6958834ac6f901d10449cb45c53d6eed4ede2cd501ad9e20dd912f76f2acd8e9aad4d2828d58f16ce8018b030c356b27a84c208fc65f", 0x1001) 22:57:32 executing program 3: bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={@cgroup, 0xffffffffffffffff, 0x1f}, 0x14) 22:57:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4}}, @restrict={0x10}]}}, &(0x7f0000000380)=""/208, 0x56, 0xd0, 0x1}, 0x20) 22:57:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x17, 0x0, 0x5, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 22:57:33 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x10) 22:57:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xa, 0x8, 0x2, 0x3, 0x40, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 22:57:33 executing program 2: add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "00e17e4445c9c10d1489aee6865ff7c9807291fda661dc2af1b12600642341b56ae3de98995c468838e087b508f0ec1d1d939e94546f004977b268f4a16dbe86"}, 0x48, 0xfffffffffffffffd) 22:57:33 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 22:57:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xfffffffffffffe15, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0]}, @SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x60}}, 0x0) 22:57:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x41, 0x0, &(0x7f0000000a00)) 22:57:33 executing program 2: socketpair(0x10, 0x2, 0xb9, &(0x7f0000000000)) 22:57:33 executing program 3: keyctl$update(0xc, 0x0, &(0x7f0000001000)="1c", 0x1) 22:57:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x18, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000001c0)='GPL\x00', 0x5, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001200), 0x8, 0x10, 0x0}, 0x80) 22:57:33 executing program 0: io_setup(0xafc5, &(0x7f0000000540)=0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) io_submit(r0, 0x0, 0x0) 22:57:33 executing program 5: getgroups(0x2, &(0x7f00000000c0)=[0x0, 0x0]) setgroups(0x2, &(0x7f0000000100)=[0x0, r0]) 22:57:33 executing program 1: pipe2$9p(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETATTR(r0, &(0x7f0000000080)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0xffffffffffffffff, 0xee00}}, 0xa0) write$P9_RSTATFS(r0, &(0x7f0000000000)={0x43}, 0x43) 22:57:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x4}]}}, &(0x7f00000001c0)=""/212, 0x26, 0xd4, 0x1}, 0x20) 22:57:33 executing program 3: socketpair(0x2c, 0x3, 0xfff, &(0x7f0000000100)) 22:57:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 22:57:33 executing program 5: add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x0, "2abb8d40648cded352ebd0e41d2185d5ea36e2713006115f3f3cf6b09b6340dc7cc3497e2f1bf52d502f18b5dee4f449f33e100588e7ff0dbbb5b1a79d4863bd"}, 0x48, 0xfffffffffffffffb) keyctl$revoke(0x3, r0) 22:57:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=@delqdisc={0x50, 0x25, 0x1, 0x0, 0x0, {}, [@qdisc_kind_options=@q_cbs={{0x8}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18}}}, @TCA_EGRESS_BLOCK={0x8}]}, 0x50}}, 0x0) 22:57:33 executing program 2: select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0xbbc0}, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xea60}) 22:57:33 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'geneve1\x00'}) sched_rr_get_interval(0x0, &(0x7f00000002c0)) 22:57:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000580)='trusted\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000440), &(0x7f0000000480)={'fscrypt:', @desc4}, &(0x7f00000004c0)={0x0, "94fefcf5b4f442f669d04f845fd6789cbe8ea0af16a5ca1d34835cc15fcf29ec85005e01fe5dbbae555cde1d1a9a7ae6e0a3d2bc7acba7ac849b5d67d73a9865"}, 0x48, r0) 22:57:33 executing program 3: socketpair(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000780)=ANY=[], 0x3e0}, 0x300}, 0x0) 22:57:33 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x765303, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, 0x0) 22:57:33 executing program 4: syz_emit_ethernet(0x4e, &(0x7f00000013c0)={@broadcast, @random="57999f1cad27", @void, {@mpls_uc={0x8847, {[], @ipv6=@icmpv6={0x0, 0x6, "8f4f6d", 0x18, 0x3a, 0x0, @private1, @private0, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @private0}}}}}}}, 0x0) 22:57:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xa, 0x8, 0x2, 0x3, 0x40}, 0x48) 22:57:33 executing program 2: add_key$keyring(&(0x7f0000000340), 0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000580)='trusted\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xffffffffffffffff) 22:57:33 executing program 1: syz_emit_ethernet(0xc8, &(0x7f0000000040)=ANY=[@ANYBLOB="000000000000aaaaaaaaaa3c8100210043"], 0x0) 22:57:33 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0xfffffdef}, 0x2}, 0x0) 22:57:33 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x0, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:33 executing program 3: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x9}, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x4]}, 0x8}) 22:57:33 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffd000/0x3000)=nil, 0x930, 0x0, 0x10, r0, 0x0) 22:57:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xa00}, 0x48) 22:57:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x9, 0x3, 0x1f8, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x290, 0xffffffff, 0xffffffff, 0x290, 0xffffffff, 0x3, 0x0, {[{{@ip={@loopback, @dev, 0x0, 0x0, 'veth0_to_bond\x00', 'macvlan0\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x258) 22:57:33 executing program 1: socketpair(0x1, 0x3, 0x0, &(0x7f0000000640)) 22:57:33 executing program 5: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0xc02, 0x0) 22:57:33 executing program 0: pipe2$9p(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTAT(r0, &(0x7f0000000340)={0x3d, 0x7d, 0x0, {0x0, 0x36, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, '', 0x1, '{', 0x1, '.'}}, 0x3d) 22:57:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter, 0xaf) 22:57:33 executing program 2: clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x0, r0+10000000}, 0x0) 22:57:33 executing program 4: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x7}, 0x0, &(0x7f0000000100)={0x0, 0x3938700}, 0x0) 22:57:33 executing program 1: keyctl$update(0x9, 0x0, 0x0, 0x0) 22:57:33 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, 0x0) 22:57:33 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={0xffffffffffffffff, 0x0, 0x18}, 0xc) 22:57:33 executing program 3: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000340)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "527e241f43fcad2fe091fe5ccadfadc8f1f22bb291c6cce49ce6b41ed74400"}, 0x48, r1) 22:57:33 executing program 5: r0 = getpgid(0x0) tkill(r0, 0x101c) 22:57:33 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x3e0}, 0x1, 0x0, 0x2d}, 0x0) 22:57:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x12, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 22:57:33 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x5, &(0x7f0000000040)=[{0x1, 0x0, 0x0, 0x2}, {0x1}, {}, {0x6}, {0x6}]}) 22:57:33 executing program 4: io_setup(0xafc5, &(0x7f0000000540)) 22:57:34 executing program 5: syz_emit_ethernet(0xc8, &(0x7f0000000040)=ANY=[@ANYBLOB="000000000000aaaaaaaaaa3c810021004305"], 0x0) [ 363.174843] audit: type=1326 audit(1671404254.103:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17819 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f2b31cce0d9 code=0x0 22:57:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f0000000540)={&(0x7f0000000b80)=@newchain={0x4c, 0x64, 0x1, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}, @TCA_CHAIN={0x8}, @filter_kind_options=@f_route={{0xa}, {0x4}}, @TCA_RATE={0x6}]}, 0x4c}}, 0x0) 22:57:34 executing program 1: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) 22:57:34 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) 22:57:34 executing program 5: pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x1}, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) 22:57:34 executing program 3: keyctl$update(0xe, 0x0, 0x0, 0x0) 22:57:34 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$vhost_msg(r0, &(0x7f0000000280)={0x1, {0x0, 0x0, 0x0}}, 0x48) 22:57:34 executing program 1: select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0xbbc0}, 0x0, 0x0) 22:57:34 executing program 5: sched_rr_get_interval(0x0, &(0x7f00000002c0)) 22:57:34 executing program 3: keyctl$update(0x14, 0x0, &(0x7f0000001000)="1c63593426f29b88d6d5e13c01276d1ad61db832ac492a627d05eb669fa99c19df18977469e581d9b37ed4ec9b04e01999ea42f8b7d46a75e1969d5fd97d1a08e71b3249618ad6aed5abc5952ee86217cd888a7cf1fac80d3e287b68045d79404e796677d57cfd82b7eb255658c3a5ab", 0x70) 22:57:34 executing program 0: sendto$unix(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0, 0x0) 22:57:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{r1, 0x4}], 0x1, 0x0) dup2(r1, r0) 22:57:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001c80)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x401, &(0x7f0000000200)=@abs={0x0, 0x0, 0x1}, 0x8) 22:57:34 executing program 5: pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x1}, &(0x7f0000000200)={0x5}, &(0x7f0000000240), &(0x7f00000002c0)={&(0x7f0000000280)={[0x2]}, 0x8}) 22:57:34 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x20200, 0x0) setuid(0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 22:57:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x200, 0x0) fcntl$lock(r0, 0x9, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x100000000}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000c40), 0x0, 0x0) dup2(r1, r0) 22:57:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x138}, 0x0) 22:57:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x200, 0x0) fcntl$lock(r0, 0x9, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x100000000}) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x10018, 0x0) fcntl$lock(r1, 0x9, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x100000000}) 22:57:34 executing program 3: pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) write(r0, 0x0, 0x0) 22:57:34 executing program 5: semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000000500)=[0x0]) 22:57:34 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semop(0x0, &(0x7f0000000240)=[{0x1, 0x6, 0x1000}, {0x3, 0x2041}, {0x0, 0x3, 0x7d92c75f90bb31fb}, {0x3, 0x3, 0x1000}, {0x3, 0x68, 0x1000}, {0x3, 0x2, 0x1000}, {0x1, 0xfffffffffffffff8, 0x1000}, {0x2, 0x8, 0x1000}], 0x8) semop(r0, &(0x7f0000000240), 0x6) semctl$IPC_RMID(r0, 0x0, 0x0) 22:57:35 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) 22:57:35 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1002, 0x0, 0x0) 22:57:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x200, 0x0) fcntl$lock(r0, 0x9, &(0x7f0000000080)={0x0, 0x2, 0x7fffffffffffffff, 0x100000000}) 22:57:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fchown(r0, 0xffffffffffffffff, 0x0) 22:57:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x200, 0x0) 22:57:35 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x100, 0x0, 0x0) 22:57:35 executing program 1: utimensat(0xffffffffffffff9c, 0x0, &(0x7f0000000040)={{}, {0x0, 0x100000001}}, 0x0) 22:57:35 executing program 3: recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000a40)=@abs={0x0, 0x0, 0x1}, 0x8) 22:57:35 executing program 4: semctl$SETVAL(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)) 22:57:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x200, 0x0) close(r0) connect$unix(r0, 0x0, 0x0) 22:57:35 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000540), 0x86b8, 0x0) 22:57:35 executing program 5: pipe2(&(0x7f0000003740)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getpeername$inet(r0, 0x0, 0x0) 22:57:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) fcntl$lock(r0, 0x7, 0x0) 22:57:35 executing program 3: open$dir(&(0x7f0000000000)='.\x00', 0x20200, 0x0) 22:57:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001c80)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, 0x0) 22:57:35 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001a80)={&(0x7f0000001700)=@abs={0x0, 0x0, 0x2}, 0x8, &(0x7f0000001780)=[{0x0}], 0x1, &(0x7f00000019c0)=[@cred], 0x20}, 0x1) 22:57:35 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x20200, 0x0) open$dir(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) 22:57:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 22:57:35 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000540)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000340)=[{&(0x7f0000000040)="d6a5ceb7234080d11d9cf365ba814042627d05b4af4d3ee21876c4da9b10b9aaa23534d11ea2f28534019b578705d0741209fe4594ffc1041dbd11ae595e0f4aefd2371bf0eb", 0x46}, {&(0x7f00000000c0)="0440528a1ede997439328db20c9a591ec1443377fa00d417a1651db175bbe32088c3dc8276a797c679a4e25a6650139323c2087fb7aad4ba07bf79a006ed70fc9cf44e0487d6e3a4a6f9c9d8e7b258d7c10a8d1ecf3e5f237a01e7be7c", 0x5d}, {&(0x7f0000000140)="e310d1db2b690a51feb4c8118506a2420c74b8a66f6ebce9dd9a9e9e5c93aac1338d240661e7ef651d242e8b2a34526e2ae9b22d41200f5e774756c798a79d0fc06221c3d0841221bb80d1f3e92f301feb784adb0cd8e3d8e73990ce9abbeb641e88008cbaacc5710063b47ddb730fd14c99e1ed48e4e7087d4f0564ae1b91f034debca6c6284d690e2f087bf778064df38c56dea9c19c44b4521d619c97abaadfbc1ec2", 0xa4}, {&(0x7f0000000200)="2ec2a2a4bd0b310bc609d0d8ff896c4a46771c34d9aeac9949eaa878f15b19626ad7677b87e31a", 0x27}, {&(0x7f0000000d00)="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", 0x63b}], 0x5, &(0x7f00000004c0)=[@rights, @cred], 0x58}, 0x0) 22:57:35 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt(r0, 0x0, 0x0, 0x0, 0x0) 22:57:35 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000), &(0x7f0000000040)=0x10) 22:57:35 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x80, 0x0, 0x0) 22:57:35 executing program 4: open(&(0x7f0000000400)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) 22:57:35 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1007, 0x0, 0x0) 22:57:35 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x20200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 22:57:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x200, 0x0) fcntl$lock(r0, 0x9, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000100000000, 0xffffffffffffffff}) 22:57:35 executing program 2: syz_emit_ethernet(0x4a, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd6046e10d00140600fe8000000000000000000000000000aafe80000000000000000000000000004456705f5d", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5c02d02d7afe40"], 0x0) 22:57:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x200, 0x0) poll(&(0x7f0000000040)=[{r0, 0x4}, {r0, 0x40}], 0x2, 0x0) r1 = socket$inet6(0x18, 0x3, 0x0) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x0) 22:57:35 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000200)=0xff56) 22:57:35 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x8, 0x0, 0x0) 22:57:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) poll(&(0x7f00000000c0)=[{r2, 0x4}], 0x1, 0x0) 22:57:35 executing program 0: semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)=""/171) 22:57:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000280)="c6a26c7358e0958e9a11b8460dd53618fd9d0f9999105f7572b0a410878a4a24b3168960c6d67c5d0a7e37b3fe8ad1d20278e80081f3d96a8b6c9e71f51695e4112e2aee670fd837bb1e93160f8e28c26d5c573e3ece1ad5285d2a5003d107798e23f8509b7dd55ab24b2ef458a53ae3511952c47b56b3e99cdff2461b1e2c35125aa1e5793de4806c63f79d9803582843", 0x91) 22:57:35 executing program 3: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000700)) 22:57:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x200, 0x0) fcntl$lock(r0, 0x9, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x100000000}) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x10018, 0x0) fcntl$lock(r1, 0x9, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x100000000}) 22:57:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000c00)='attr\x00') flistxattr(r0, 0x0, 0x0) 22:57:35 executing program 1: mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)) 22:57:35 executing program 0: openat$nvram(0xffffff9c, &(0x7f0000000000), 0x501, 0x0) 22:57:35 executing program 3: r0 = syz_open_dev$rtc(&(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) ioctl$RTC_IRQP_SET(r0, 0x4004700c, 0x1cac) 22:57:35 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x0, @multicast2}}) 22:57:35 executing program 2: syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:57:35 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x1, &(0x7f00000002c0)=@raw=[@kfunc], &(0x7f0000000340)='GPL\x00', 0x2, 0xa3, &(0x7f0000000380)=""/163, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:35 executing program 1: r0 = socket(0xa, 0x3, 0x5) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x541b, &(0x7f0000000000)={'wlan1\x00'}) 22:57:35 executing program 0: openat$nvram(0xffffff9c, &(0x7f0000001540), 0x216000, 0x0) 22:57:35 executing program 4: keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000), &(0x7f0000000040)={'enc=', 'oaep', ' hash=', {'sha224\x00'}}, 0x0, 0x0) 22:57:35 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@ipv6_newroute={0x1c}, 0x1c}}, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x3, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000080)=""/253) 22:57:35 executing program 3: keyctl$revoke(0x3, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) 22:57:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x4) 22:57:35 executing program 1: r0 = openat$vcs(0xffffff9c, &(0x7f00000002c0), 0x0, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, 0x0, 0x0) 22:57:35 executing program 0: bpf$MAP_CREATE(0x12, &(0x7f00000015c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 22:57:35 executing program 4: bpf$LINK_GET_NEXT_ID(0xf, &(0x7f0000000040)={0xffff12f3}, 0x8) 22:57:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xfb, 0x120f, &(0x7f0000001280)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000007c0)=ANY=[], 0x6db6e559) ftruncate(r0, 0x700) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r0, 0x0) 22:57:35 executing program 3: r0 = socket(0x2, 0x3, 0x2) shutdown(r0, 0x54ac805014d6d910) 22:57:35 executing program 1: mq_getsetattr(0xffffffffffffffff, &(0x7f0000000440)={0x9}, 0x0) 22:57:35 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000380), 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2201, 0x0) 22:57:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x0, 0x1004, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x48) 22:57:36 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) getsockname$inet6(r0, 0x0, 0x0) 22:57:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 22:57:36 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000380), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0x0, 0x1, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000140)='L', 0x0, 0x0, 0x0, 0x0, 0x0}) 22:57:36 executing program 2: r0 = socket(0x2, 0xa, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) 22:57:36 executing program 4: bpf$MAP_CREATE(0xf, &(0x7f00000015c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 22:57:36 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000380), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0x0, 0x6, 0x80, @buffer={0x0, 0xd7, &(0x7f0000000040)=""/215}, &(0x7f0000000140)="4cc73f59dd8f", &(0x7f00000001c0)=""/17, 0x0, 0x0, 0x0, 0x0}) 22:57:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000c00)='attr\x00') inotify_add_watch(r0, 0x0, 0x110) [ 365.264580] FAT-fs (loop5): mounting with "discard" option, but the device does not support discard 22:57:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000380), 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2205, 0x0) 22:57:36 executing program 0: request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='/dev/vcs\x00', 0xfffffffffffffff8) 22:57:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8918, &(0x7f00000000c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @multicast1}}) 22:57:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'tunl0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @loopback, {[@ra={0x94, 0x4}]}}}}}) 22:57:36 executing program 2: timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000280)={{0x77359400}, {0x77359400}}, 0x0) 22:57:36 executing program 3: bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000004580), 0x10) 22:57:36 executing program 4: r0 = socket(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x80108906, 0x0) 22:57:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x3, 0x4) 22:57:36 executing program 2: r0 = socket(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'macsec0\x00'}) 22:57:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private2}}}, 0x104) 22:57:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001980)=@delchain={0xd04, 0x65, 0x1, 0x0, 0x0, {}, [@filter_kind_options=@f_rsvp6={{0xa}, {0x498, 0x2, [@TCA_RSVP_POLICE={0x444, 0x5, [@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3ab}, 0x0, 0x393, 0xbc57}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x773, 0x9, 0x8001, 0x3ff, 0x1f, 0x4, 0x81, 0x401, 0x9, 0x8, 0x6, 0x4, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, 0xa9, 0xb8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f2, 0x7f, 0x0, 0x9, 0xfffffcd1, 0x4, 0xa6a, 0x8000, 0x20000, 0x8, 0x8, 0x7, 0x200, 0x4, 0x1, 0xafd, 0x8, 0x401, 0xd8f5, 0x2, 0x3, 0x618, 0x2, 0x0, 0x19d1, 0xf0af, 0x1, 0x3, 0x0, 0xe87, 0x2, 0x80000001, 0xffffffff, 0x10000, 0x800, 0x1, 0x339, 0x800, 0x3, 0x9, 0xfffffffd, 0x7fffffff, 0xe6b, 0x81, 0x800, 0x1ff, 0x20, 0x8, 0x40, 0xfb, 0x8, 0x9, 0x3, 0x4, 0x0, 0x5, 0x5, 0x9, 0xffffffff, 0x25f7018d, 0x4, 0x1, 0x6, 0x8000, 0x0, 0x40, 0xb10, 0x6, 0x7, 0x5e0a, 0xfff, 0x2, 0x8f1f, 0x9, 0x49, 0x3, 0x7fffffff, 0x6, 0x4, 0x29cc, 0x1, 0x4, 0x1, 0x3, 0x9, 0xbae, 0x31, 0x101, 0x2ea6, 0x2, 0x2, 0x3, 0x10001, 0x13, 0xc0e, 0x10001, 0x2, 0x40, 0x7fffffff, 0x6, 0x8, 0x100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6, 0x4, 0x1000, 0x5, 0x7f, 0x3, 0x7fffffff, 0x0, 0x9, 0x7, 0x7, 0x9, 0x1830]}]}, @TCA_RSVP_DST={0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @TCA_RSVP_DST={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, @TCA_RSVP_POLICE={0xc, 0x5, [@TCA_POLICE_AVRATE={0x8}]}, @TCA_RSVP_SRC={0x14, 0x3, @dev}, @TCA_RSVP_CLASSID={0x8}]}}, @TCA_RATE={0x6}, @filter_kind_options=@f_u32={{0x8}, {0x82c, 0x2, [@TCA_U32_LINK={0x8}, @TCA_U32_SEL={0x4d4, 0x5, {0x9, 0xff, 0x2, 0x6, 0x1000, 0x5, 0x0, 0x40, [{}, {}, {}, {}, {}, {0x1, 0x3, 0xef9, 0x4}, {0xce, 0x0, 0xffff, 0x800}, {0x5, 0x80, 0x6, 0x3f}, {0x0, 0x1, 0x9, 0x200}, {0x2, 0x1, 0xfff, 0x4ce50000}, {0x7, 0x40, 0x80, 0x2}, {0x0, 0x0, 0x80, 0x6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x80000000, 0x7, 0x4}, {0x81, 0x8000, 0x5, 0xd35d}, {0xcd, 0x0, 0x1ff, 0xcd}, {0x1, 0x28, 0x1ff, 0x3}, {0xfffffffa, 0x3, 0x3, 0x8}, {0x9, 0xc192, 0x3, 0xeab7c3f7}, {0x8cd1, 0x200, 0x9, 0x8}, {0x8, 0xfffffff8, 0x3, 0xff}, {0x0, 0x0, 0x80000001, 0xfffffffa}, {}, {}, {}, {}, {}, {0xfffffe06, 0x5, 0x3, 0x5}, {0x80000001}, {}, {}, {0x9, 0x8, 0x0, 0x4}, {0x0, 0x4, 0x28000000, 0xb46}, {0xfff, 0x3ca39414, 0x8, 0x5f48}, {0x5, 0x2, 0x0, 0x9}, {0x7f, 0x81, 0x6, 0x6}, {0x5, 0x5, 0xf4}, {0x2, 0x80000000, 0xfffffb07, 0x85}, {0xe1a, 0x7fff, 0xaa98, 0x7}, {0x0, 0x400, 0x3ff, 0x8}, {0x8000, 0x442, 0x1, 0x401}, {0x8, 0x0, 0xfffffffc, 0x2}, {0x4, 0x8d5, 0x691, 0x8}, {0x4, 0x5, 0x8, 0xfffff000}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x5}, {0xa781, 0x1f, 0x7, 0x40}, {0x8000, 0x3, 0x0, 0x20}, {0x3bfd, 0xfe6, 0x40, 0x9}, {0x796b, 0x10001, 0x4, 0x5}, {0x48, 0x8, 0xffff, 0x4}, {0x1000, 0x4, 0x9}, {0xffffff7f, 0x7da9, 0x5, 0xb5}, {0x2}, {0x42, 0x696b, 0x31d, 0x8e3}, {0x2, 0x2, 0x6, 0xfff}, {0x1, 0x7fff, 0x1, 0x3ff}, {0x0, 0x6, 0x7fff, 0x7}, {0x7f, 0x7, 0x6, 0x8}]}}, @TCA_U32_POLICE={0x18, 0x6, [@TCA_POLICE_AVRATE={0x8}, @TCA_POLICE_RATE64={0xc, 0x8, 0x1}]}, @TCA_U32_ACT={0x10c, 0x7, [@m_skbmod={0x108, 0x1d, 0x0, 0x0, {{0xb}, {0x54, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x20}, @TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}, @TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0xf801}, @TCA_SKBMOD_SMAC={0xa, 0x4, @broadcast}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x6}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x6}, @TCA_SKBMOD_SMAC={0xa, 0x4, @random="23159c24223a"}]}, {0x89, 0x6, "3dac886d62c487108f7ee5116c171de9bdfb8a28a346f37e4361af5d8fd6da944294c6191607fc0465563270075b7798dcbb1beedf70bd08dc3dadb3360c29729810bb34165fc615c178f036d2e5c2d1d228fecceca6efade001f4a67e5b7c3592e7b0648fdb15422fa5afebfe5927f16d210bdcd2692c5a98d16b460d786cdaf460156502"}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}]}, @TCA_U32_INDEV={0x14, 0x8, 'tunl0\x00'}, @TCA_U32_SEL={0x214, 0x5, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x100, 0xcd7f, 0x100}, {0xfea, 0x8001, 0x4, 0x3}, {0x800, 0x7, 0x0, 0x8}, {0x10001, 0x7, 0x50e3ec69, 0x40}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x7ff, 0x4, 0xf97}, {0x7, 0x9, 0x8001, 0xfffffff9}, {0xba18, 0xfffffffc, 0x101, 0x1}, {0xa03, 0x6, 0x1000, 0xfffffff7}, {0x22, 0x8, 0x0, 0x400}, {0x7ff, 0x6, 0xffffee8c, 0x9}, {0x4, 0xa4eb, 0x3f, 0xffff}, {0x4, 0x31, 0x9e5b, 0xde86}, {0x401, 0x0, 0x9, 0x5}, {}, {}, {}, {}, {}, {}, {0x193000, 0x80, 0x6, 0x6}, {0x80000000, 0x9, 0x7f, 0x1}, {0x8, 0x3, 0xfffffff7, 0x3f}, {0xe0b, 0x4, 0xa4, 0x3ff}]}}]}}]}, 0xd04}}, 0x20000000) 22:57:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'sit0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @local}}}}) 22:57:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000f00)={&(0x7f0000000e80)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_VLANID={0x6}]}, 0x24}}, 0x0) 22:57:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x17, 0x0, 0x0, 0x3}, 0x48) 22:57:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), 0x4) 22:57:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000c00)='attr\x00') accept4$inet6(r0, 0x0, 0x0, 0x0) 22:57:36 executing program 0: bpf$MAP_CREATE(0x9, &(0x7f00000015c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 22:57:36 executing program 4: r0 = socket(0x2, 0x3, 0x2) syz_genetlink_get_family_id$nl80211(&(0x7f0000000b80), r0) 22:57:36 executing program 3: r0 = socket(0x2, 0x3, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/2, &(0x7f0000000040)=0x2) 22:57:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000a80)={0x1, 0x0, [{}]}) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:57:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x9, 0x0, 0x0, 0x7fff}, 0x48) 22:57:36 executing program 5: add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) 22:57:36 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000ac0)='ns/ipc\x00') 22:57:36 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000380), 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2284, 0x0) 22:57:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast, @remote}}}}) 22:57:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000c00)='attr\x00') fcntl$notify(r0, 0x402, 0x80000010) 22:57:36 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) 22:57:36 executing program 0: mq_open(&(0x7f0000000000)='--\x00', 0x0, 0x0, 0x0) 22:57:36 executing program 1: request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0xfffffffffffffffb) 22:57:36 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000980)='./file0\x00', 0x81, &(0x7f0000000180)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@session={'session', 0x3d, 0x10000000036}}, {@nocompress, 0x0}, {@check_strict}, {@session={'session', 0x3d, 0x200027}}, {@unhide}], [{@dont_appraise}, {@permit_directio}]}, 0x5, 0x962, &(0x7f00000009c0)="$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") 22:57:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x14, 0x1, &(0x7f0000000000)=@raw=[@kfunc], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:36 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000380), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x1267, &(0x7f0000000000)) 22:57:36 executing program 5: bpf$LINK_GET_NEXT_ID(0x13, &(0x7f0000000040)={0xffff12f3}, 0x8) 22:57:36 executing program 1: syz_open_procfs(0x0, &(0x7f0000000280)='net/arp\x00') 22:57:36 executing program 0: r0 = socket(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8970, 0x0) 22:57:36 executing program 3: r0 = syz_open_dev$rtc(&(0x7f0000000040), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000000c0)={0x3c, 0x0, 0x0, 0x3, 0x0, 0x7f}) syz_open_dev$rtc(&(0x7f0000000000), 0x1e, 0x40000) ioctl$RTC_IRQP_SET(r0, 0x4004700c, 0x1cac) 22:57:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$netlink(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000040)={0x10}, 0x10}, {&(0x7f00000001c0)={0x10}, 0x10}], 0x2}, 0x0) 22:57:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x298, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x37c, 0xffffffff, 0xffffffff, 0x37c, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @private}, @ipv4={'\x00', '\xff\xff', @empty}, [], [0x0, 0x0, 0xff], 'veth0_to_hsr\x00', 'gretap0\x00', {}, {}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xa4, 0x10c}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x8b, 0x8d90, 0x20, 'snmp_trap\x00', 'syz1\x00', {0x10001}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0, [], [], 'batadv0\x00', 'bond_slave_1\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2f4) 22:57:37 executing program 1: socket(0x2, 0xa, 0x4) 22:57:37 executing program 0: bpf$MAP_CREATE(0x13, &(0x7f00000015c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 22:57:37 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, 0x0) 22:57:37 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) mlock(&(0x7f00007b9000/0x4000)=nil, 0x4000) mlock(&(0x7f0000301000/0x2000)=nil, 0x100000) openat(0xffffffffffffff9c, &(0x7f00000020c0)='./file0/file0\x00', 0x0, 0x0) 22:57:37 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0xffff435e, 0x4800) 22:57:37 executing program 1: r0 = openat$nvram(0xffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$FITHAW(r0, 0xc0045878) 22:57:37 executing program 2: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x685) 22:57:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x21, 0x0, 0x0) 22:57:37 executing program 3: r0 = socket(0xa, 0x3, 0x5) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000003c0)={'sit0\x00', &(0x7f0000000300)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast2}}}}) 22:57:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth0_to_team\x00', &(0x7f0000000000)=@ethtool_rxnfc={0x30, 0x0, 0x0, {0x0, @tcp_ip4_spec={@dev}, {0x0, @local}, @ether_spec={@empty, @link_local}}}}) 22:57:37 executing program 4: r0 = socket(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8927, &(0x7f0000000000)={'macsec0\x00'}) 22:57:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000c00)='attr\x00') timerfd_settime(r0, 0x0, &(0x7f00000000c0), 0x0) 22:57:37 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000380), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2272, &(0x7f0000000000)) 22:57:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xb}, 0x48) 22:57:37 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@ipv6_newroute={0x1c}, 0x1c}}, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x3, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x40284504, &(0x7f0000000080)=""/253) 22:57:37 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x298, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x37c, 0xffffffff, 0xffffffff, 0x37c, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @private}, @ipv4={'\x00', '\xff\xff', @empty}, [], [], 'veth0_to_hsr\x00', 'gretap0\x00'}, 0x0, 0xa4, 0x10c}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0, [], [], 'batadv0\x00', 'bond_slave_1\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2f4) 22:57:37 executing program 5: bpf$LINK_GET_NEXT_ID(0x15, &(0x7f0000000040)={0xffff12f3}, 0x8) 22:57:37 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000380), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0xc0481273, &(0x7f0000000000)) 22:57:37 executing program 4: sendmsg$NL802154_CMD_SET_CCA_MODE(0xffffffffffffffff, 0x0, 0x0) 22:57:37 executing program 0: io_setup(0x9754, 0x0) io_setup(0x6f02, &(0x7f00000002c0)) 22:57:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000005480)={0x0, 0x0, &(0x7f0000005100)=[{&(0x7f0000004e00)={0x10}, 0x10}], 0x1, &(0x7f0000005380)=[@cred={{0x18, 0x1, 0x2, {r1}}}], 0x18}, 0x0) 22:57:37 executing program 2: bpf$MAP_CREATE(0x16, &(0x7f00000015c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 22:57:37 executing program 5: mount$9p_fd(0x0, &(0x7f0000004300)='./file0\x00', &(0x7f0000004340), 0x0, &(0x7f0000004400)) 22:57:37 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='attr/prev\x00') 22:57:37 executing program 4: r0 = socket(0x2, 0x80003, 0x2) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000340)={0x0, 'team_slave_1\x00', {0x3}}) 22:57:37 executing program 5: r0 = socket(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8971, 0x0) 22:57:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x0, 0x0, 0x0, 0x0, 0x1904, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) 22:57:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001600)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c, &(0x7f0000001180)=[{&(0x7f0000000040)="196e7856d14857b126c03c9b4ecd2c270e41c892f3345d87426a2445884dc8c5a4e9a60bc48ffdd0a4023e7a52b70d7d5ae1d0b952a8bd5377dd7f39dbf33bb1c2ae17020a64c90a38187c7bd85720ef57a366b1f6d173b96867e0cb4eb7176e170b8f756e8317909c02da64e515843b356985db43eabb8f", 0x78}, {&(0x7f0000000100)="67f3c1baf1257d8b21a69191f5c28bf30d79cd41e0177a77f42b84b32b6ee119fa8dfe7c5e7ac2c9be8032e30965514f6eced32ccf947a6b3d72d04bff93d27532aa9b565376e8eec7c5130055597505f9d57c46ac30dda6f1ca68445f4a9a1961678e9484dcaddf95531824f7d699276f94ca87170201f5ace5bdfe4a24b7198050cb0394e38fc0f2f5412f8ff7a1de82a9a267582ed38ddcd8683364488ba65216e689161f42d5e4d924853415b37371ca907533dcc7fda631018b8941b402184ae54ace8267486fdf007bd60655ff1a544bea637ee72acaacbf7c3895a467f788ba4c149a90bc38550d945fe678e8178f2da2915eb3e4d5e900db14d45765e05766cb7565cd4616d913f4c32725d5fa0681cf65da54d2989ab3b2bfdde983204ee730853865598d5abb1e30a651c09a831df0005e65e3ef3fc7e38b6833509fb1cba3dc7b78db6ac489efe13dd135e42892351c3cbe3a1663bc737daaf76d73084371f93021e1a1c57ee1f467aa28c38f1902e71d6ec421e2b9c6e2ca1a2578218c6b48c63c69e95cd0a327d69f5279e61fe1b6a59de301e5bc418c92a9b50d7f1bfe6e56bc2b5642251b2fcbafcd1f977e36f95374e60c006ac49ea38d0945ba22419bf419624c735d299aca0947f64da86d8d39a6add0bda8c620c0ad61c3a9511c8f65bd617d81b93dd71a665dbaa0460ec3f219ca982b90be560dfe7af27c5837dba9db2fbc2d0af033b73b095bb2cb2034dd469894cdf1820bceb69a437d1e116b68b5b9b8ae1fefe82963c4c60a0976b667be2ba1b4de46a1863969c5b2fcfc60e8efc5091461018ed27656c203b1b375e089ae8bba8e28985e313829a6e2845b9ac7e0e0a8f5b236089e05e74049238873a7150c2578a94fd580a5b6c20c787ca9e72d4553c5c22b341a89f34b4d5bffc3327adbb9a7d037f94cd1fd153c72589e9364a814e6129b0198a38a89c5c82e4bfcaef6be878566cae41134ae2b0313a7320a392425619a38cafc9e104139449ce9c6470971a84d51e48a97c1513c501cfa99a212ec37bdc19f2f0a6510a94b62f29939e5b41d8662c0b974a0295d2e06c8fea4bcb1c5d309816f4582f18c14a2a68160beb89331e8b9535341fc9aa29c25b6789549c78961ced1ee8f67818f52927f65782a57858d905b4d81571e104624f781af483d2c196f51f8f2558e5b13ccc4af0aef75d5e63857ae28cf27194227a0879fae5150be342b3eaa75485eaf6c607a945ab58f1f8bbe53ce70ce5bedcd356fc743a94fa1961b29d3b30cd6e18dd66c0d37512b5f85b93bbfef2ad6789e9d3e65a9880e082f31fa8f4a59ae17d9aac8658863bd936f0babcefabff84f2d9e7374a07bec11f3a7a04eb11221816b54ecf2eb072bb55d431d2a7b8a008105d22218ad997feda45e70b6a307e2ed00fb7e5f5478c96777acaf26647fff088e49dc5f00e4e83630e050f3d723b0a3ecd4ff0e8050696013c72a67c48d812d04f3f4bde8525e3b2fb0a1fbae8ad34949f673205b698736c2917a40acf7e64cb410011fb60172eceb4afb93901b102a11bc23126d9e4b2b9461cd512a3038364289f2b9fa232c10ef93097949040460dbbc6d7822b920075878a95cbce0b01468250e998443def3e452c95d4526361a196fe94d0ee52f890a5bcd25d013f4c5a796eacd0ec624a1b547bdec72640b60262a57cc8d41e73f4059d7dc13a6f376f7b952be17be6b5b98564bf5f18333a0653ac4ec1eef516db6a969acc62dbc08aeb1a7b2b5163c453f518e6b857b4d32fbe18ccae8e592cbbea173ad29fba67652a8106572ef79610a013674ee93cafcb6850863e467afcd47648e7cf6eacae3ad25f924701b88345db2d76ba009", 0x534}], 0x2}}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001200)="8b", 0x1}], 0x1}}], 0x2, 0x8000) 22:57:37 executing program 1: r0 = socket(0xa, 0x3, 0x5) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5411, &(0x7f0000000000)={'wlan1\x00'}) 22:57:37 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) readv(r0, &(0x7f0000001240)=[{&(0x7f0000000180)=""/15, 0xf}], 0x1) 22:57:37 executing program 2: pipe2$9p(0x0, 0xdfaf80780ec0b458) 22:57:37 executing program 5: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TCSETS(r0, 0x5414, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, "718a8e2ed93ea5b0c413ca9970d7e2dd26bbbd"}) 22:57:37 executing program 4: r0 = socket(0x2, 0x3, 0x2) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) shutdown(r0, 0x0) 22:57:37 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000380), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2275, &(0x7f0000000000)) 22:57:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @private0}}, {{0xa, 0x0, 0x0, @private1}}}, 0x104) 22:57:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={&(0x7f0000000e80)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x50000}, @BATADV_ATTR_VLANID={0x6}]}, 0x24}}, 0x0) 22:57:37 executing program 2: r0 = socket(0xa, 0x3, 0x5) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x89a0, &(0x7f0000000000)={'wlan1\x00'}) 22:57:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x17, 0xca, 0x0, 0x3}, 0x48) 22:57:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8923, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000480)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @private, {[@generic={0x0, 0x2}]}}}}}) 22:57:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000002080)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000002040)={&(0x7f0000001940)={0x14}, 0x14}}, 0x0) 22:57:37 executing program 1: keyctl$update(0x2, 0x0, &(0x7f0000000680)="12", 0x1) 22:57:37 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={'veth1_virt_wifi\x00', {0x2, 0x0, @multicast1}}) 22:57:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001640)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) 22:57:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:37 executing program 2: r0 = socket(0xa, 0x3, 0x5) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) 22:57:37 executing program 3: r0 = openat$tcp_mem(0xffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$tcp_mem(r0, 0x0, 0x0) 22:57:37 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000005c0)=@routing, 0x8) 22:57:37 executing program 1: r0 = socket(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8907, 0x0) 22:57:37 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000380), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0x0, 0x5, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000140)="4cc73f59dd", 0x0, 0x0, 0x0, 0x0, 0x0}) 22:57:37 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000380), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0x0, 0x3, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000140)="4cc73f", 0x0, 0x0, 0x0, 0x0, 0x0}) 22:57:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000c00)='attr\x00') fcntl$notify(r0, 0x402, 0x1) syz_open_procfs(0x0, &(0x7f0000000c00)='attr\x00') 22:57:37 executing program 2: openat$vcs(0xffffff9c, &(0x7f0000000bc0), 0x2040, 0x0) 22:57:37 executing program 1: r0 = socket(0x2, 0x80003, 0x2) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000340)={0x0, 'team_slave_1\x00'}) 22:57:37 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$vcs(0xffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) syz_clone(0x80000, &(0x7f0000001780), 0x0, &(0x7f0000002780), &(0x7f00000027c0), 0x0) 22:57:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000e80)=@dellinkprop={0x20, 0x6d, 0x1}, 0x20}}, 0x0) 22:57:38 executing program 0: mq_notify(0xffffffffffffffff, &(0x7f0000004b40)) 22:57:38 executing program 4: r0 = openat$autofs(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) read(r0, 0x0, 0x0) 22:57:38 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, 0x0, 0x0) 22:57:38 executing program 2: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000002980)) 22:57:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000700)=[@mss, @mss, @mss, @mss], 0x4) 22:57:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0x3, &(0x7f0000000700)=@framed, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x8c, &(0x7f0000000780)=""/140, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r1, 0x1}, 0x14}}, 0x0) 22:57:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, 0x0) 22:57:38 executing program 4: openat$null(0xffffffffffffff9c, 0x0, 0x10042, 0x0) 22:57:38 executing program 5: bpf$MAP_UPDATE_ELEM(0x1c, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 22:57:38 executing program 1: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) pipe2(&(0x7f0000000240), 0x80000) 22:57:38 executing program 3: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$tcp_mem(r0, &(0x7f00000000c0), 0x48) 22:57:38 executing program 2: pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) ioctl$TCSETAF(r0, 0x5408, 0x0) 22:57:38 executing program 0: syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x58, &(0x7f0000000080)}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000140)={@loopback}, &(0x7f0000000180)=0xc) unshare(0x40000000) 22:57:38 executing program 5: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000580), 0xffffffffffffffff) 22:57:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) add_key$user(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)="11", 0x1, r0) 22:57:38 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x1, 0x0) 22:57:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={0x0}}, 0x0) 22:57:38 executing program 2: ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000640)) 22:57:38 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x42000, 0x0) 22:57:38 executing program 5: bpf$MAP_UPDATE_ELEM(0xa, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x20) [ 367.415339] IPVS: ftp: loaded support on port[0] = 21 22:57:38 executing program 4: request_key(&(0x7f00000000c0)='logon\x00', 0x0, 0x0, 0xfffffffffffffff8) 22:57:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000000c0)={'team_slave_0\x00', @local}) 22:57:38 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/netpoll', 0x200082, 0x0) 22:57:38 executing program 1: futex(0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x3938700}, 0x0, 0x0) 22:57:38 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000100)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@jmp], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000100)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @remote}}}}) 22:57:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 22:57:38 executing program 4: request_key(&(0x7f00000000c0)='trusted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0) 22:57:38 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0xc, &(0x7f00000006c0)=@framed={{}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x3}, @generic={0x8, 0x5, 0x7, 0x2, 0x65}, @cb_func, @map_idx]}, &(0x7f0000000740)='GPL\x00', 0x8, 0xb4, &(0x7f0000000780)=""/180, 0x41000, 0x3, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x3, 0x10, 0x7, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x80) 22:57:38 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x3, &(0x7f00000006c0)=@framed, &(0x7f0000000740)='GPL\x00', 0x0, 0xb4, &(0x7f0000000780)=""/180, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 22:57:38 executing program 2: keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000180), 0x0, 0x0, 0x0) 22:57:38 executing program 1: socket$inet(0x2, 0xa, 0x978) 22:57:38 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/block/ram10', 0x40, 0x0) 22:57:38 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) 22:57:38 executing program 4: r0 = add_key$keyring(&(0x7f0000000600), &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x9, 0x0, r0) 22:57:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:38 executing program 3: add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='?', 0x1, 0xfffffffffffffffd) 22:57:38 executing program 1: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001c40), r0) 22:57:38 executing program 0: bpf$MAP_UPDATE_ELEM(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 22:57:38 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)={0x14}, 0x14}}, 0x0) 22:57:38 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001980)={0x6, 0x3, &(0x7f0000001700)=@raw=[@map_fd, @kfunc], &(0x7f0000001740)='syzkaller\x00', 0x4, 0xef, &(0x7f0000001780)=""/239, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:38 executing program 2: bpf$MAP_UPDATE_ELEM(0x21, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 22:57:38 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x66280, 0x0) 22:57:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000e80)={0x0, 0x0, 0x0}, 0x0) 22:57:38 executing program 1: bpf$MAP_UPDATE_ELEM(0x14, 0x0, 0x0) 22:57:39 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/usbcore', 0x1001, 0x0) 22:57:39 executing program 4: pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 22:57:39 executing program 5: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000001c0)=':\x00', 0x0) 22:57:39 executing program 2: socket(0xa, 0x0, 0x7fffffff) 22:57:39 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x5, &(0x7f00000006c0)=@framed={{}, [@map_idx]}, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:39 executing program 3: sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) socket$packet(0x11, 0x2, 0x300) 22:57:39 executing program 0: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0xffffffffffffff38) 22:57:39 executing program 4: syz_emit_ethernet(0x5a, &(0x7f0000000000)={@remote, @broadcast, @val={@void}, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "decbc6619894b3c7457dac2a40bdeb6cf58ff354c7844e24c3e1ace31301337e0a4ddc19771caecfe90df16aabce32a5902767354d09b84f7626be5fcb7e080a"}}}}, 0x0) 22:57:39 executing program 2: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, 0x0, &(0x7f0000000180)) unshare(0x40000000) 22:57:39 executing program 1: bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 22:57:39 executing program 5: add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000180)="f3", 0x1, 0xfffffffffffffffd) 22:57:39 executing program 3: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) unshare(0x40000000) 22:57:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r1, 0x1}, 0x14}}, 0x0) 22:57:39 executing program 0: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) unshare(0x40000000) 22:57:39 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000140)={@loopback, @rand_addr, 0x0}, &(0x7f0000000180)=0xc) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x148, r0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x4008880}, 0x0) unshare(0x40000000) 22:57:39 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x3, &(0x7f00000006c0)=@framed, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 368.334672] IPVS: ftp: loaded support on port[0] = 21 [ 368.346678] IPVS: ftp: loaded support on port[0] = 21 22:57:39 executing program 4: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x0) read$watch_queue(r0, 0x0, 0x0) [ 368.408247] IPVS: ftp: loaded support on port[0] = 21 22:57:39 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x9, &(0x7f00000006c0)=@framed={{}, [@btf_id, @map_fd, @map_idx]}, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 368.500186] IPVS: ftp: loaded support on port[0] = 21 22:57:39 executing program 4: bpf$MAP_UPDATE_ELEM(0x9, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 22:57:39 executing program 1: pipe2(&(0x7f0000000440), 0x0) 22:57:39 executing program 2: pipe2(&(0x7f00000011c0), 0x0) 22:57:39 executing program 3: bpf$MAP_UPDATE_ELEM(0x22, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 22:57:39 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000001500)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001280)={0x14}, 0x14}}, 0x0) 22:57:39 executing program 1: bpf$MAP_UPDATE_ELEM(0x10, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 22:57:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x16, 0x2, &(0x7f0000000180)=@raw=[@btf_id], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 22:57:39 executing program 0: request_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) 22:57:39 executing program 5: keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000600), &(0x7f0000000640)=ANY=[@ANYBLOB='enc=o'], 0x0, 0x0) 22:57:39 executing program 4: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) 22:57:39 executing program 3: keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000600), &(0x7f0000000640)=ANY=[@ANYBLOB='enc='], 0x0, 0x0) 22:57:39 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/fc_vports', 0x90000, 0x0) 22:57:39 executing program 0: futex(&(0x7f00000001c0), 0x4, 0x0, 0x0, &(0x7f0000000280), 0x0) 22:57:39 executing program 2: syz_genetlink_get_family_id$nbd(&(0x7f0000000580), 0xffffffffffffffff) 22:57:39 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[], 0x84}}, 0x0) 22:57:39 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000140)={@loopback}, &(0x7f0000000180)=0xc) unshare(0x40000000) 22:57:39 executing program 2: keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000600), &(0x7f0000000640)=ANY=[@ANYBLOB='enc=oaep hash=vm'], 0x0, 0x0) 22:57:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={&(0x7f0000000dc0)={0x14}, 0x14}}, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000001500)={&(0x7f0000001200), 0xc, &(0x7f00000014c0)={&(0x7f0000001280)={0x14}, 0x14}}, 0x0) 22:57:39 executing program 5: bpf$MAP_UPDATE_ELEM(0x6, 0x0, 0x0) 22:57:39 executing program 3: request_key(&(0x7f00000015c0)='asymmetric\x00', &(0x7f0000001600)={'syz', 0x0}, &(0x7f0000001640)='.request_key_auth\x00', 0x0) 22:57:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000003c0)=[{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000280)="d6c76dc526720ee32e50c4684e5b9553562a36bcfd63dd3776a878aedf53c864833face9a771f53f8131f790cd1554f0cc4980bb766a0f4475aa62f8b268f2c36f908970782398012c77774f87b92eb017b1bdddd07f5811439986f495485cfa9a5f5bdd7fcbe23fec1fe9d8125cc937731e7687f059763fb4878db4a1811e26e86f14b4a87cf9a8de9d56c6b57e1855e85d74be497c4669d1b63facf70a184dc0ebf6b0ce29f6182ad82f959058e4fac6b16b58d85e87df0682a19bb3c5b2e4c85280385292a6a70ba81dcdf2403ad3ea5e8224e0ec3df431c58d1e26e6f97b9eaf2075c44ba7098c6ae65f44d328edd6661d23e816", 0xf6}], 0x1}], 0x1, 0x0) 22:57:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x0, 0x3, &(0x7f0000000a40)=@framed, &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 369.085009] IPVS: ftp: loaded support on port[0] = 21 22:57:40 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x7, &(0x7f00000006c0)=@framed={{}, [@map_fd, @map_idx]}, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:40 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='6'], 0x48}}, 0x0) 22:57:40 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x8, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 22:57:40 executing program 1: bpf$MAP_UPDATE_ELEM(0x9, 0x0, 0x0) 22:57:40 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/block/ram10', 0x0, 0x0) 22:57:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x13, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 22:57:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@datasec={0x2, 0x1, 0x0, 0xf, 0x1, [{0x4, 0x2}], "fa"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], '+c{'}]}, {0x0, [0x0, 0x4f, 0x30, 0x2e]}}, &(0x7f0000001300)=""/213, 0x46, 0xd5, 0x1}, 0x20) 22:57:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 22:57:40 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 22:57:40 executing program 1: add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="91", 0x1, 0xfffffffffffffffb) 22:57:40 executing program 0: unshare(0x40000400) r0 = eventfd(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r0, 0x0, 0x3}) 22:57:40 executing program 3: pipe(&(0x7f0000001800)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000002c40)=[{&(0x7f00000005c0)="f7bc174e4bf0186891dc522dd1a9cc1d83f53a7309151c1ba6f4a49e7e04391c338f221174d4725e105522c2e6285587b8df0779de0190c4248a403e09b6c87b3d22a6addaf27760e27aa8d39639b6fcb17df28d2f5c041f05f45993", 0x5c}, {&(0x7f0000000640)="f8b275ac1df0dff20ee92d25a269fc612965ee0b81d39eeaf36c6a4678464893c1d62d96a84016b30b2b1324445b9158a69f5dd3742b91ab101dcc9f961a4d2b8210920cb339520be6676d1ba8da0ae4b25977eb71c8ad98da7e1846385ee4dd0193fdeef82fca23ccacd63eb4bc2404a5f4ff36bbe489b4bcdd6bfdd2a9787dd7208ac9e3c167b7bd9cc7d6e1916124ed955a850c90efc35acff97d5760ca76d5cd6373b4b606a2886d6dbb3cbf4ff38d701ad66db78f5f6d757e05a5b69ad5672d4493a7e0b90d7492874b1b11efbcbb2200152a76", 0xd6}, {&(0x7f0000000740)="5ac6d245ff74e4de86163f7305f52d36a88cc0f6f3d793b592ad6835e83524c7318257bd6f4ea5c1e7582d1c622ce5ce3ac33f4b0f56e0bc18558421898f4ade4550080a7a8fb4b31510fa114fee9030bae82430aa", 0x55}], 0x3) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000380)=[{&(0x7f0000000400)="d8add5e6f262175848546a995bb0a65bef63c24613d3267f91c84bf139b00879f0e3921d9add96c98e25ecd27e35a25f7df10a3fc845dc9ef5d977d19b3f763ee2422118f1ea2d84ce3d7e0c520202ab86bc6c7c7530785ebe1e6c9f4604e4a1b277e5f10949a94e5833d7a4f059ec93a67c92eb829fee70f31901cf30284971b083184c8f56cd3638f926f49c72830280b8ea20ca39558bc1870d42ac664f08af", 0xa1}, {&(0x7f0000000240)="efc436da3b8f32cfe0ae34cfe5b74f6edae520a3", 0x14}, {&(0x7f00000004c0)="9e6beb3767dae5d726b751ebaa0c06cd1af245c77bbae9321678f866a40b444e7b17e3a67ecac3bbd4b1aa1cc88304f4cf2f96d0802e512833333bff6560010859352f110d0bb23c7b8e564a3bb66c974445181bc7a6d52231ef62535a72c5b58006925fe17281dc3c5f058c", 0x6c}, {&(0x7f0000000540)="2e7392ad0fb46fcc24bcb1f2071a0cad4f573cf03a5995349ff6d6e3119b9872a66a82766d8b89fdeb9e7ba4a5a3c531c71b067b4f50f9def1d1cd7fa4f299977a0bd5f20cef165be2f989c13bbed5943887f96758ef86215ba8b8bc9033181e281a58ba", 0x64}], 0x4, 0x0) splice(r0, 0x0, r3, 0x0, 0x7, 0x0) 22:57:40 executing program 1: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000140)={@loopback}, &(0x7f0000000180)=0xc) unshare(0x40000000) 22:57:40 executing program 5: socket$inet(0x2, 0x3, 0x9c) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 22:57:40 executing program 4: syz_emit_ethernet(0x5a, &(0x7f0000000000)={@remote, @broadcast, @val={@void, {0x8100, 0x2}}, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "decbc6619894b3c7457dac2a40bdeb6cf58ff354c7844e24c3e1ace31301337e0a4ddc19771caecfe90df16aabce32a5902767354d09b84f7626be5fcb7e080a"}}}}, 0x0) 22:57:40 executing program 2: pipe2(0x0, 0x80000) [ 369.463535] IPVS: ftp: loaded support on port[0] = 21 22:57:40 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000000c0)='keyring\x00', 0x0, &(0x7f0000000140)="8f", 0x1, r0) 22:57:40 executing program 5: bpf$MAP_UPDATE_ELEM(0x16, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x20) [ 369.539061] IPVS: ftp: loaded support on port[0] = 21 22:57:40 executing program 4: openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) 22:57:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x2, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:40 executing program 3: bpf$MAP_UPDATE_ELEM(0x18, 0x0, 0x0) 22:57:40 executing program 5: add_key$user(&(0x7f0000000000), 0x0, &(0x7f0000000080)='?', 0x1, 0xfffffffffffffffd) 22:57:40 executing program 0: write$tcp_mem(0xffffffffffffffff, &(0x7f00000000c0), 0x48) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) 22:57:40 executing program 4: pipe(&(0x7f0000001800)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000002c40)=[{&(0x7f00000005c0)="f7bc174e4bf0186891dc522dd1a9cc1d83f53a7309151c1ba6f4a49e7e04391c338f221174d4725e105522c2e6285587b8df0779de0190c4248a403e09b6c87b3d22a6addaf27760e27aa8d39639b6fcb17df28d2f5c041f05f45993bf", 0x5d}, {&(0x7f0000000640)="f8b275ac1df0dff20ee92d25a269fc612965ee0b81d39eeaf36c6a4678464893c1d62d96a84016b30b2b1324445b9158a69f5dd3742b91ab101dcc9f961a4d2b8210920cb339520be6676d1ba8da0ae4b25977eb71c8ad98da7e1846385ee4dd0193fdeef82fca23ccacd63eb4bc2404a5f4ff36bbe489b4bcdd6bfdd2a9787dd7208ac9e3c167b7bd9cc7d6e1916124ed955a850c90efc35acff97d5760ca76d5cd6373b4b606a2886d6dbb3cbf4ff38d701ad66db78f5f6d757e05a5b69ad5672d4493a7e0b90d7492874b1b11efbcbb2200152a76", 0xd6}, {&(0x7f0000000740)="5ac6d245ff74e4de86163f7305f52d36a88cc0f6f3d793b592ad6835e83524c7318257bd6f4ea5c1e7582d1c622ce5ce3ac33f4b0f56e0bc18558421898f4ade4550080a7a8fb4b31510fa114fee9030bae82430", 0x54}], 0x3) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000380)=[{&(0x7f0000000400)="d8add5e6f262175848546a995bb0a65bef63c24613d3267f91c84bf139b00879f0e3921d9add96c98e25ecd27e35a25f7df10a3fc845dc9ef5d977d19b3f763ee2422118f1ea2d84ce3d7e0c520202ab86bc6c7c7530785ebe1e6c9f4604e4a1b277e5f10949a94e5833d7a4f059ec93a67c92eb829fee70f31901cf30284971b083184c8f56cd3638f926f49c72830280b8ea20ca39558bc1870d42ac664f08af", 0xa1}, {&(0x7f0000000240)="efc436da3b8f32cfe0ae34cfe5b74f6edae520a3", 0x14}, {&(0x7f00000004c0)="9e6beb3767dae5d726b751ebaa0c06cd1af245c77bbae9321678f866a40b444e7b17e3a67ecac3bbd4b1aa1cc88304f4cf2f96d0802e512833333bff6560010859352f110d0bb23c7b8e564a3bb66c974445181bc7a6d52231ef62535a72c5b58006925fe17281dc3c5f058c", 0x6c}, {&(0x7f0000000540)="2e7392ad0fb46fcc24bcb1f2071a0cad4f573cf03a5995349ff6d6e3119b9872a66a82766d8b89fdeb9e7ba4a5a3c531c71b067b4f50f9def1d1cd7fa4f299977a0bd5f20cef165be2f989c13bbed5943887f96758ef86215ba8b8bc9033181e281a58ba", 0x64}], 0x4, 0x0) splice(r0, 0x0, r3, 0x0, 0x7, 0x0) 22:57:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000001c0)={'gre0\x00', 0x0}) 22:57:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 22:57:40 executing program 5: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x0) bind$alg(r0, 0x0, 0x0) 22:57:40 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x9, &(0x7f00000006c0)=@framed={{}, [@btf_id, @map_fd, @cb_func]}, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:40 executing program 5: bpf$MAP_UPDATE_ELEM(0x11, 0x0, 0x0) 22:57:40 executing program 3: syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) unshare(0x40000000) 22:57:40 executing program 4: sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sched_rr_get_interval(0x0, &(0x7f00000009c0)) 22:57:40 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000680), 0x140, 0x0) 22:57:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000003c0)={'syztnl2\x00', 0x0}) 22:57:40 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000800), 0x111000, 0x0) 22:57:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:40 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0xb, &(0x7f00000006c0)=@framed={{}, [@btf_id, @map_fd, @cb_func, @map_idx]}, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:40 executing program 1: bpf$MAP_UPDATE_ELEM(0x13, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 22:57:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x2, &(0x7f0000000080)=@raw=[@map_fd], &(0x7f00000000c0)='GPL\x00', 0x0, 0x5b, &(0x7f0000000100)=""/91, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 370.057409] IPVS: ftp: loaded support on port[0] = 21 22:57:41 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000140)={@loopback, @rand_addr, 0x0}, &(0x7f0000000180)=0xc) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'sit0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x1000, 0x10d, {{0x26, 0x4, 0x1, 0x3, 0x98, 0x67, 0x0, 0x4, 0x29, 0x0, @rand_addr=0x64010102, @empty, {[@timestamp_addr={0x44, 0x14, 0xad, 0x1, 0x2, [{@dev={0xac, 0x14, 0x14, 0xc}, 0x9b2}, {@multicast2, 0xe9b}]}, @generic={0x44, 0x6, "09b6111a"}, @cipso={0x86, 0x6a, 0x3, [{0x5, 0x8, "eaf2bf2b29ee"}, {0x0, 0x9, "2691c309862263"}, {0x7, 0x10, "0b084017e00b475a8c7d26d53aa0"}, {0x1, 0xa, "3a98d57d504a1025"}, {0x0, 0x2}, {0x0, 0x12, "e83daa52eaa544a6dde26ca2b80520ad"}, {0x1, 0x3, 'Z'}, {0x7, 0xf, "024ffd70a727d5a31c183d8f71"}, {0x1, 0xd, "78579712d7e222fbc5f095"}, {0x6, 0x6, "c9f4e9aa"}]}]}}}}}) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x148, r0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x4008880}, 0x0) unshare(0x40000000) 22:57:41 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={&(0x7f0000000dc0)={0x14}, 0x14}}, 0x0) 22:57:41 executing program 0: pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, 0x0, 0x0) [ 370.220789] IPVS: ftp: loaded support on port[0] = 21 22:57:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000480)={'batadv_slave_0\x00'}) 22:57:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1b, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 22:57:41 executing program 2: keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000600), &(0x7f0000000640)=ANY=[], 0x0, 0x0) 22:57:41 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) unshare(0x40000000) 22:57:41 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/module/8250_core', 0x0, 0x0) 22:57:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f00000004c0)=@framed, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:41 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/dm_verity', 0x4c800, 0x0) 22:57:41 executing program 4: pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x0) ioctl$FIOCLEX(r0, 0x5451) 22:57:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x0, 0x0, 0x0, &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 370.440146] IPVS: ftp: loaded support on port[0] = 21 22:57:41 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:41 executing program 5: sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x24, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x4}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x24}}, 0x0) unshare(0x40000000) 22:57:41 executing program 4: add_key(&(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) 22:57:41 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x20001320) 22:57:41 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x3, &(0x7f00000006c0)=@framed, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)}, 0x80) 22:57:41 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0x91, &(0x7f0000000400)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000100)='kfree\x00', r1}, 0x10) dup2(r1, r0) [ 370.633942] IPVS: ftp: loaded support on port[0] = 21 22:57:41 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={&(0x7f0000000dc0)={0x14}, 0x14}}, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001280)={0x14}, 0x14}}, 0x0) 22:57:41 executing program 0: pipe2(&(0x7f0000000440), 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 22:57:41 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x0, 0x0, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:41 executing program 4: ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) socket(0x0, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r0 = socket(0x200000000000011, 0x3, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x8000}, 0x4) syz_emit_ethernet(0x36, &(0x7f0000001800)=ANY=[@ANYBLOB="0180c20000000180c200000008004500002800000002"], 0x0) 22:57:41 executing program 2: add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) 22:57:41 executing program 3: pipe2(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x13, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x80) 22:57:41 executing program 0: openat$vcsu(0xffffffffffffff9c, 0x0, 0x200402, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x8000}, 0x4) syz_emit_ethernet(0x36, &(0x7f0000001800)=ANY=[@ANYBLOB="0180c20000000180c200000008004500002800000002"], 0x0) 22:57:41 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(0x0, r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:57:41 executing program 1: r0 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$link(0x8, 0x0, r1) 22:57:41 executing program 4: openat$autofs(0xffffffffffffff9c, &(0x7f0000000800), 0x0, 0x0) 22:57:41 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x236740, 0x0) 22:57:41 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001980)={0x6, 0x1, &(0x7f0000001700)=@raw=[@kfunc], &(0x7f0000001740)='syzkaller\x00', 0x4, 0xef, &(0x7f0000001780)=""/239, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x24, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, 0x48) 22:57:41 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 22:57:41 executing program 1: unshare(0x18040100) 22:57:41 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x225c1, 0x0) 22:57:41 executing program 3: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 22:57:41 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/libiscsi', 0x0, 0x0) 22:57:42 executing program 2: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 22:57:42 executing program 5: socket$inet(0x2, 0x0, 0x80000000) 22:57:42 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x9, &(0x7f00000006c0)=@framed={{}, [@btf_id, @cb_func, @map_idx]}, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 22:57:42 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x3, &(0x7f00000006c0)=@framed, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000008c0), 0x10}, 0x80) 22:57:42 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x82, 0x0) 22:57:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000001c0)='kfree\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)={0x34, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) 22:57:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x13, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8993, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8914, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:42 executing program 4: socketpair$unix(0x2, 0x1, 0x0, &(0x7f0000001040)) 22:57:42 executing program 0: semget(0x3, 0x4, 0x100) 22:57:42 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0xe, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="28000000030701"], 0x28}}, 0x0) 22:57:42 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 22:57:42 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c}, 0x1c}}, 0x0) [ 371.414130] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 22:57:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x9c}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)={0x300}) 22:57:42 executing program 2: pipe(&(0x7f0000001bc0)={0xffffffffffffffff}) syz_genetlink_get_family_id$ethtool(&(0x7f0000001ec0), r0) 22:57:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891f, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) 22:57:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000540)='W', 0x1}], 0x1}, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x56403681a84b2be6, 0x0, 0x0) 22:57:42 executing program 3: socket(0x2c, 0x3, 0x101) 22:57:42 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8d}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000740)={0x14, 0x0, 0x19c833dba83e2495}, 0x14}}, 0x0) 22:57:42 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, 0x0, 0x0) 22:57:42 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x1403, 0x229}, 0x10}}, 0x0) 22:57:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x5, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x4, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000040)={0x0, 0x129c}}, 0x0) 22:57:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x2d}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:42 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x7}, 0x0) 22:57:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0xf, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891e, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xb}}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x541b, 0x0) 22:57:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x5, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 0: pipe(&(0x7f0000001a40)) 22:57:43 executing program 3: sendmsg$NL80211_CMD_SET_WOWLAN(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000001b40)) 22:57:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:43 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x30, 0x140e, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x5f}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x2}]}, 0x30}}, 0x0) 22:57:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xc9}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 2: socketpair(0x1, 0x0, 0x0, &(0x7f0000000a40)) 22:57:43 executing program 3: pipe(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000001ec0), 0xffffffffffffffff) 22:57:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x16, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xac}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x96}}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x0, 0xf4240, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}]}, &(0x7f0000000100)=0x10) 22:57:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x0, @dev}, 0x0, {0x2, 0x0, @empty}, 'veth0_macvtap\x00'}) 22:57:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x1b, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x360, 0x98, 0x278, 0xffffffff, 0x1a8, 0x1a8, 0x390, 0x390, 0xffffffff, 0x390, 0x390, 0x5, 0x0, {[{{@ip={@empty, @rand_addr, 0x0, 0x0, 'macvtap0\x00', 'team_slave_0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@ip={@local, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'syzkaller1\x00'}, 0x0, 0x70, 0xb8}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@empty, @ipv4=@empty, @gre_key, @gre_key}}}, {{@ip={@private, @empty, 0x0, 0x0, 'team_slave_0\x00', 'vlan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xa8}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x0, @empty, @broadcast, @port, @icmp_id}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c0) 22:57:43 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xca}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8919, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x5}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="3804"], 0x438}, {&(0x7f0000000440)={0x10}, 0x10}], 0x2}, 0x0) 22:57:43 executing program 1: bpf$BPF_PROG_DETACH(0x9, 0xfffffffffffffffd, 0x0) 22:57:43 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x50000}, 0x0) 22:57:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8934, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8982, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:43 executing program 4: socket$netlink(0x10, 0x3, 0x9cfbca1b2640aadf) 22:57:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xbf}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x17, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 22:57:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x5411, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000000c0)=@abs={0x2}, 0x6e) 22:57:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8915, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x2}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000640)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x25, 0x4, 0x0, 0x0, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @broadcast, {[@timestamp={0x44, 0x14, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0]}, @lsrr={0x83, 0x23, 0x0, [@local, @broadcast, @broadcast, @rand_addr, @broadcast, @multicast2, @local, @dev]}, @lsrr={0x83, 0x27, 0x0, [@empty, @multicast2, @local, @remote, @private, @broadcast, @remote, @dev, @broadcast]}, @rr={0x7, 0xb, 0x0, [@private, @multicast1]}, @timestamp_prespec={0x44, 0x14, 0x0, 0x3, 0x0, [{@local}, {@local}]}]}}}}}) 22:57:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xcb}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x20, 0x140e, 0x0, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_PORT_INDEX, @RDMA_NLDEV_ATTR_RES_PDN={0x8}]}, 0xffffffffffffffc7}}, 0x0) 22:57:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0}}, 0x1) 22:57:43 executing program 1: socket(0x10, 0x3, 0x7f) 22:57:43 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@map=0x1, 0xffffffffffffffff, 0x19}, 0x10) 22:57:43 executing program 0: sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:57:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0xa, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:43 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000001180)) 22:57:44 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x140e, 0x0, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_PDN={0x8}]}, 0xfffffdef}}, 0x0) 22:57:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8931, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:44 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xb1}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8911, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x13, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0xc000, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xc8}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8991, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:44 executing program 2: r0 = socket(0x10, 0x3, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), r0) 22:57:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8922, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x40020060, 0x0, 0x0) 22:57:44 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5e}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) syz_emit_ethernet(0x42, &(0x7f00000000c0)={@link_local, @random="ca98aaccd618", @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @multicast1, {[@rr={0x7, 0x3, 0x87}]}}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @multicast2}}}}}}, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x7, &(0x7f0000000080)={@multicast2}, 0x8) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 22:57:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 373.321147] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:57:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0)={0xfffffffe}, 0x8) 22:57:44 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0xc, &(0x7f00000006c0)=@framed={{}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x1}, @map_fd, @generic, @cb_func, @map_idx]}, &(0x7f0000000740)='GPL\x00', 0x8, 0xb4, &(0x7f0000000780)=""/180, 0x41000, 0x3, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x3, 0x10, 0x7, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x80) 22:57:44 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x6d}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000b40)) 22:57:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x3, &(0x7f0000000240)=@raw=[@btf_id, @call], &(0x7f0000000280)='GPL\x00', 0x5, 0x9b, &(0x7f00000002c0)=""/155, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8927, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x19, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x15, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a1, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:44 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000012c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 22:57:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @dev}, {0x1, @link_local}, 0x6a, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'vlan1\x00'}) 22:57:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x9e}}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 5: pipe(&(0x7f0000000580)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 22:57:44 executing program 4: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) 22:57:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x6}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x1c, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000040)={0x10}, 0x10}], 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="200000000000ff"], 0x20}, 0x0) 22:57:44 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0xfffffffffffffc4d) 22:57:44 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={@map, 0xffffffffffffffff, 0x9}, 0x10) 22:57:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x541b, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:44 executing program 3: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x10, 0x140e, 0x1}, 0x10}}, 0x0) 22:57:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x37}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x95}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891c, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:44 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x140e, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_PDN={0x8}]}, 0x20}}, 0x0) 22:57:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x894a, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:44 executing program 0: r0 = socket(0x10, 0x0, 0x0) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000000)={0x2c, 0x2, 0x2, 0x0, 0x0, [@dev]}, 0x18) syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), r0) 22:57:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000c80), r0) 22:57:44 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x83}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x71}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:44 executing program 5: syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), 0xffffffffffffffff) syz_genetlink_get_family_id$smc(&(0x7f0000000580), 0xffffffffffffffff) 22:57:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x57}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c}, 0x1c}}, 0x0) 22:57:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000640)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @broadcast}}}}) 22:57:45 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x14) 22:57:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 22:57:45 executing program 5: syz_genetlink_get_family_id$ethtool(&(0x7f0000001ec0), 0xffffffffffffffff) 22:57:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x3e9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xb6}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x6a}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8990, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x5}}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x1, &(0x7f0000000240)=@raw=[@call], &(0x7f0000000280)='GPL\x00', 0x5, 0x9b, &(0x7f00000002c0)=""/155, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x70}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891a, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xab}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x24}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@gettclass={0x24, 0x2a, 0x1}, 0x24}}, 0x0) 22:57:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x140e, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x10}]}, 0x18}}, 0x0) 22:57:45 executing program 0: sendmsg$NL80211_CMD_SET_WOWLAN(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x0) pipe(&(0x7f0000001bc0)) 22:57:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x0, 0x40000142, 0x0, 0x0) 22:57:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x2, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc) 22:57:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3}, 0x80) 22:57:45 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000000)=@framed={{0x6}}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x78}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={0x0, 0x0, 0x28}, 0x10) 22:57:45 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvfrom$inet(r0, 0x0, 0x0, 0x40000162, 0x0, 0x0) 22:57:45 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x840, 0x55) 22:57:45 executing program 4: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 22:57:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, 0x0}, 0x0) 22:57:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x9e}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) 22:57:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x3}}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xb4}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x2}}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8995, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x15}, 0x48) 22:57:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xaf}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:45 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x2}, 0x0) 22:57:45 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x3c}, 0x0) 22:57:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000000)="c6660e5e8c58658821", 0x9) 22:57:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x7}}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f0000000540)={'tunl0\x00', 0x0}) 22:57:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x86}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:46 executing program 4: syz_emit_ethernet(0x39, &(0x7f0000000080)=ANY=[@ANYBLOB="bbbbbbbbbbbb00280af240008847"], 0x0) 22:57:46 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000700), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, 0x0) 22:57:46 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000700), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x8933, 0x0) 22:57:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x2, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:46 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x37}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, &(0x7f0000000240)) 22:57:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xc6}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:46 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000200)={'tunl0\x00', &(0x7f0000000100)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @broadcast}}}}) 22:57:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8971, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:46 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000180)={0x2, 0x0, {&(0x7f0000000040)=""/94, 0x5e, 0x0, 0x0, 0x3}}, 0x48) 22:57:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8912, 0x0) 22:57:46 executing program 5: bpf$BPF_MAP_GET_NEXT_ID(0x1d, &(0x7f0000000000)={0xffff0000}, 0x8) 22:57:46 executing program 2: r0 = gettid() rt_sigqueueinfo(r0, 0x7, &(0x7f0000000040)) 22:57:46 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:46 executing program 1: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x0, 0x0}, 0x10) 22:57:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000002440)=@base={0x12, 0x4d, 0x8, 0x4, 0x10c8}, 0x48) 22:57:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xa, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_ELP_INTERVAL, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x44}}, 0x0) 22:57:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000100)=0x3, 0x4) 22:57:46 executing program 2: bpf$BPF_MAP_GET_NEXT_ID(0x3, &(0x7f0000000000)={0xffff0000}, 0x8) 22:57:46 executing program 0: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x0, 0x1, &(0x7f0000000300)=@raw=[@call], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x80) 22:57:46 executing program 1: bpf$BPF_MAP_GET_NEXT_ID(0x16, &(0x7f0000000000)={0xffff0000}, 0x8) 22:57:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x891f, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:46 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x2}, 0x48) 22:57:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8955, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'tunl0\x00', &(0x7f0000000100)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @broadcast}}}}) 22:57:46 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89a1, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:46 executing program 1: bpf$BPF_MAP_GET_NEXT_ID(0x21, &(0x7f0000000000)={0xffff0000}, 0x8) 22:57:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8911, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x891c, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8992, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x6, &(0x7f0000000140)=@raw=[@map_fd, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:46 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8940, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:46 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xb, 0x3, &(0x7f0000000140)=@framed={{}, [], {0x95, 0x0, 0x0, 0xffffff9f}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200000}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:46 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x3, 0x0, 0x200000}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:46 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x2, 0x0, 0x200000}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x5421, &(0x7f0000000400)={'sit0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 22:57:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x5421, &(0x7f0000000400)={'sit0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}}, 0x0) 22:57:46 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x7a000000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8937, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:46 executing program 4: socketpair(0x26, 0x5, 0x2, &(0x7f0000000100)) 22:57:46 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8919, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:46 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x7, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89a0, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000380)={'sit0\x00', &(0x7f00000002c0)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x7, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x4, 0x0, @empty, @local, {[@cipso={0x86, 0x6}]}}}}}) 22:57:47 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x1b, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8990, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8935, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:47 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x7, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x3f00, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8917, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8922, &(0x7f0000000400)={'sit0\x00', &(0x7f00000003c0)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 22:57:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x0, 0x0, 0x2}, 0x48) 22:57:47 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) 22:57:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8904, 0x0) 22:57:47 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) [ 376.247427] sit0: mtu greater than device maximum 22:57:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'tunl0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@rr={0x7, 0x3}]}}}}}) 22:57:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'tunl0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 22:57:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8941, 0x0) 22:57:47 executing program 4: bpf$BPF_MAP_GET_NEXT_ID(0x10, &(0x7f0000000000)={0xffff0000}, 0x8) 22:57:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x5421, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @private1, @ipv4}}) 22:57:47 executing program 0: bpf$BPF_MAP_GET_NEXT_ID(0x9, &(0x7f0000000000)={0xffff0000}, 0x8) 22:57:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) read$FUSE(r0, &(0x7f0000006500)={0x2020}, 0x2020) 22:57:47 executing program 1: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xb, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0}, 0x10) 22:57:47 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000180)=ANY=[@ANYRESHEX=0x0], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:47 executing program 2: bpf$BPF_MAP_GET_NEXT_ID(0xa, &(0x7f0000000000)={0xffff0000}, 0x8) 22:57:47 executing program 0: bpf$BPF_MAP_GET_NEXT_ID(0x15, &(0x7f0000000000)={0xffff0000}, 0x8) 22:57:47 executing program 1: bpf$BPF_MAP_GET_NEXT_ID(0x23, &(0x7f0000000000)={0xffff0000}, 0x8) 22:57:47 executing program 4: unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder0\x00') unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs2/binder0\x00') 22:57:47 executing program 3: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r0}, 0x10) 22:57:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8910, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000002440)=@base={0x12, 0x4d, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 22:57:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8935, 0x0) 22:57:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8912, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:48 executing program 5: bpf$MAP_CREATE(0xa, &(0x7f0000000180), 0x48) 22:57:48 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x7, 0x3, &(0x7f0000000140)=@framed={{}, [], {0x95, 0x0, 0x0, 0x6b}}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8942, &(0x7f0000000400)={'sit0\x00', 0x0}) 22:57:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8983, 0x0) 22:57:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000002c0)={'batadv_slave_0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:48 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x7, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB='P'], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:48 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181f8321536a5e3e54d829000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:48 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCCBRK(r0, 0x4b41) 22:57:48 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000240), &(0x7f00000002c0)={&(0x7f0000000280)={[0xff]}, 0x8}) 22:57:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x3, &(0x7f0000000280)=@raw=[@call, @btf_id], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:48 executing program 5: io_setup(0x7, &(0x7f00000003c0)=0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='net/netstat\x00') io_submit(r0, 0x3, &(0x7f00000015c0)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0]) 22:57:48 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f000000b080)='ns/pid\x00') 22:57:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0x0, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:48 executing program 1: syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$BINDER_GET_EXTENDED_ERROR(0xffffffffffffffff, 0xc00c6211, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) io_setup(0xe000, &(0x7f0000000080)) 22:57:48 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='net/netstat\x00') 22:57:48 executing program 0: socket$inet6(0xa, 0x3, 0x20) 22:57:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0x0, 0xee}, 0x48) 22:57:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0x3d, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2a5}, 0x48) 22:57:48 executing program 4: socket$inet6(0xa, 0x3, 0x8) 22:57:48 executing program 3: socket$inet6(0xa, 0x80000, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs(0x0, &(0x7f0000001a40)='net/rt_acct\x00') 22:57:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c0000001000850619fbb7c75150926b00000000", @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, &(0x7f0000006440)={0x0, 0x0, &(0x7f00000063c0)=[{&(0x7f0000000000)={0x34, 0x10, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0x14, 0x1b, 0x0, 0x0, @ipv6=@loopback}]}, 0x34}], 0x1}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x7404, &(0x7f0000000280)={&(0x7f0000000080)=@newlink={0x20, 0x11, 0x455, 0x0, 0x0, {0x10, 0x0, 0x0, r8}}, 0x20}}, 0x0) 22:57:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_CONFIG(r0, 0x0, 0x0) 22:57:48 executing program 2: inotify_init1(0x0) syz_open_dev$loop(&(0x7f0000000140), 0x8000000000000001, 0x0) 22:57:48 executing program 1: syz_clone(0x0, &(0x7f0000001280), 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001340)='\n') 22:57:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3}, 0x48) 22:57:48 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) madvise(&(0x7f000017e000/0xe000)=nil, 0xe03b, 0x65) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) read$alg(0xffffffffffffffff, &(0x7f0000000280)=""/139, 0x8b) read$alg(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001680)=0x14) 22:57:48 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$BINDER_GET_EXTENDED_ERROR(0xffffffffffffffff, 0xc00c6211, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='net/netstat\x00') io_setup(0xe000, &(0x7f0000000080)) [ 377.855051] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 22:57:48 executing program 3: syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x40a00) 22:57:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x3, &(0x7f0000000280)=@raw=[@call, @btf_id], &(0x7f0000000300)='GPL\x00', 0x0, 0xb6, &(0x7f0000000340)=""/182, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:57:48 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='fd/3\x00') 22:57:48 executing program 2: ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 22:57:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) [ 378.012967] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 378.049943] bond1: Enslaving batadv1 as an active interface with an up link [ 378.095626] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 379.688108] ieee802154 phy0 wpan0: encryption failed: -22 [ 379.693705] ieee802154 phy1 wpan1: encryption failed: -22 [ 379.983820] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.991193] bridge0: port 1(bridge_slave_0) entered disabled state [ 380.040386] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 380.052140] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 380.102122] bond1 (unregistering): Releasing backup interface batadv1 [ 380.110930] bond1 (unregistering): Released all slaves 22:57:51 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f00000015c0), 0xffffffffffffffff) 22:57:51 executing program 3: syz_clone(0x14020800, 0x0, 0x0, 0x0, 0x0, 0x0) 22:57:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), r0) syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), r0) 22:57:51 executing program 5: syz_open_procfs(0x0, &(0x7f000000b100)='net/rt_cache\x00') 22:57:51 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001200)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) 22:57:51 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0x0, 0xee, 0x7fff, 0x1000}, 0x48) 22:57:51 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r2 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r2, 0x1, 0x1c, 0x0, 0x0) getpid() r3 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r3, @ANYRESDEC, @ANYRESHEX=r3], 0x1, 0x522, &(0x7f0000000a80)="$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") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001cc0)=0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001d00)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000003c0)="4725321e13274f9902feea5b0a1a124aad138ae1d65164123e10", 0x1a}], 0x1, &(0x7f0000000a40)=[@cred={{0x1c}}], 0x20, 0x841}, 0x4040000) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001f00)=[{{&(0x7f0000000500)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000000840), 0x0, &(0x7f0000000580)=ANY=[], 0x90}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001e80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r4}}}], 0x40, 0xc0d1}}], 0x2, 0x10) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f00000000c0)) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100"/13], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000240)='./bus\x00', 0x400017e) lseek(r5, 0x200, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) r7 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r5, r7, 0x0, 0x10000) 22:57:51 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0xc0045878, 0x0) 22:57:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x40101283, 0x0) 22:57:51 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0xffff0000, 0xf0, 0x0, &(0x7f0000001a40)="2b206d074843b397737ea49da2aa", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x48) 22:57:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000d00)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x40080d1}, 0x400c000) 22:57:51 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x127c, 0x0) 22:57:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1267, 0x0) 22:57:51 executing program 1: syz_clone(0x86046200, 0x0, 0x0, 0x0, 0x0, 0x0) 22:57:51 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1260, 0x0) 22:57:51 executing program 4: syz_open_dev$loop(0x0, 0x0, 0x0) syz_clone(0xc2001200, &(0x7f0000000080)="4b2aa292ae37fdf2c7d0e399e62352", 0xf, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="251e9225fef15506cc1d89709c9ae7cee6c27df2b847ec6210fa8c8067b5791db6a0ff4c9317bbd7e8f20cf56ccb33b50d6a9c60fff39119ed322fa21a5566c9fc96e04af9b18f5987828caa632f07b69f16e412a3172f814cb2d0112e93d17a6f33e34500e4eb357a0afb767ade1501b7c2cf92c53db9ac66ed49f743518642e4cce9f92ee0ea7a94b0b3e93b8cbeb997876e2fbb029e141e37adc55778a0059002bd93e191a91e88e0c5c87796bcb2") syz_open_dev$vcsu(&(0x7f0000000200), 0x9, 0x448000) 22:57:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x401870c8, 0x0) 22:57:51 executing program 5: socket(0x18, 0x0, 0xfffffffd) [ 380.651103] IPVS: ftp: loaded support on port[0] = 21 [ 380.712517] audit: type=1804 audit(1671404271.644:20): pid=19747 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir4032785089/syzkaller.SB9Oxr/536/file0/bus" dev="loop3" ino=4 res=1 [ 380.765800] audit: type=1800 audit(1671404271.694:21): pid=19747 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="loop3" ino=4 res=0 22:57:52 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000140)=@v1={0x0, @adiantum, 0x0, @desc1}) getdents64(r0, &(0x7f0000000000)=""/247, 0xf7) 22:57:52 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x4, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 22:57:52 executing program 5: syz_open_dev$loop(0x0, 0x0, 0x0) syz_clone(0xc2001200, &(0x7f0000000080)="4b2aa292ae37fdf2c7d0e3", 0xb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="251e9225fef15506cc1d89709c9ae7cee6c27df2b847ec6210fa8c8067b5791db6a0ff4c9317bbd7e8f20cf56ccb33b50d6a9c60fff39119ed322fa21a5566c9fc96e04af9b18f5987828caa632f07b69f16e412a3172f814cb2d0112e93d17a6f33e34500e4eb357a0afb767ade1501b7c2cf92c53db9ac66ed49f743518642e4cce9f92ee0ea7a94b0b3e93b8cbeb997876e2fbb029e141e37adc55778a0059002bd93e191a91e88e0c5c87796bcb2") openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200c2, 0x0) syz_open_dev$vcsu(&(0x7f0000000200), 0x9, 0x448000) 22:57:52 executing program 1: syz_open_dev$loop(0x0, 0x0, 0x0) syz_clone(0xc2001200, &(0x7f0000000080)="4b2aa292ae37fdf2c7d0e399e62352", 0xf, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="251e9225fef15506cc1d89709c9ae7cee6c27df2b847ec6210fa8c8067b5791db6a0ff4c9317bbd7e8f20cf56ccb33b50d6a9c60fff39119ed322fa21a5566c9fc96e04af9b18f5987828caa632f07b69f16e412a3172f814cb2d0112e93d17a6f33e34500e4eb357a0afb767ade1501b7c2cf92c53db9ac66ed49f743518642e4cce9f92ee0ea7a94b0b3e93b8cbeb997876e2fbb029e141e37adc55778a0059002bd93e191a91e88e0c5c87796bcb2") openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200c2, 0x0) syz_open_dev$vcsu(&(0x7f0000000200), 0x9, 0x448000) 22:57:52 executing program 3: syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) syz_clone(0xc2001200, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x200c2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, 0x0) 22:57:52 executing program 4: unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder1\x00') r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x50200) syz_open_dev$loop(&(0x7f0000000000), 0x100, 0x2000) syz_open_dev$loop(&(0x7f00000000c0), 0x8, 0x140c40) ioctl$BLKTRACESTART(r0, 0x125d, 0x0) 22:57:52 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x890b, &(0x7f0000000040)) 22:57:52 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 22:57:52 executing program 2: mmap$KVM_VCPU(&(0x7f0000fff000/0x1000)=nil, 0x930, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_clone(0x42040200, &(0x7f0000000080)="ea72905c4973f80a12e26b0078a8e8f0b1a9b347b8cb94c9365c74f13202651fc1ee9d5152e2c52c0ce58d42717f54e5492329fc273736e7219993af546a042c30fb4193c8cb1a044dffb10fea6ca8e9bb6c4c550d11cd6aced84743c1c293f29c3045ea8d3b71c8e1f402b12b6ea22cc5a12cacaa287eef244e9dd3969d83", 0x7f, &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)="74084932681c7a5f1c2367fff2c0b1be7e4c0986920d793de36b5ae9d9b9e0dcdb83a6917d3ec49a8e88e711e42e1f2ef58f3c7c9ae1f1d2425ff5e70bc22d9f6cd6411983f36dcf2040e1c38bebcb98211cb00feff89068ca2aaa947f0f811eea87c0c14a04cd88ba9b08bef89d7773796066fa777653edf519592580722fbd89edd1a43bd005") 22:57:52 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1262, 0x0) [ 381.366036] IPVS: ftp: loaded support on port[0] = 21 [ 381.367353] IPVS: ftp: loaded support on port[0] = 21 22:57:52 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x14}, 0x1, 0x0, 0x4000}, 0x0) [ 381.412791] IPVS: ftp: loaded support on port[0] = 21 [ 381.444423] IPVS: ftp: loaded support on port[0] = 21 22:57:52 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1269, 0x0) 22:57:52 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x5451, 0x0) 22:57:52 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x401070ca, 0x0) 22:57:52 executing program 5: syz_clone(0xc2001200, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="251e9225fef15506cc1d89709c9ae7cee6c27df2b847ec6210fa8c8067b5791db6a0ff4c9317bbd7e8f20cf56ccb33b50d6a9c60fff39119ed322fa21a5566c9fc96e04af9b18f5987828caa632f07b69f16e412a3172f814cb2d0112e93d17a6f33e34500e4eb357a0afb767ade1501b7c2cf92c53db9ac66ed49f743518642e4cce9f92ee0ea7a94b0b3e93b8cbeb997876e2fbb029e141e37adc55778a0059002bd93e191a91e") syz_open_dev$vcsu(&(0x7f0000000200), 0x9, 0x448000) 22:57:52 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x80081270, 0x0) 22:57:52 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x5452, 0x0) 22:57:52 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x401870cc, 0x0) 22:57:52 executing program 2: r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000000)={0x30000000}) 22:57:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x176}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/16], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = open(&(0x7f0000000000)='./bus\x00', 0x24000, 0x0) sendfile(r0, r1, 0x0, 0x10000) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x6609, &(0x7f0000000400)=@v2={0x2, @aes128, 0x0, '\x00', @c}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x282200, 0x0) 22:57:52 executing program 4: add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r0) 22:57:52 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x25}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000004180000000000000000000850000007500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) creat(0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'veth0_to_hsr\x00'}) getdents64(r0, &(0x7f0000000000)=""/247, 0xf7) [ 381.912698] IPVS: ftp: loaded support on port[0] = 21 22:57:52 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x40087602, 0x0) 22:57:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000003d000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x3) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000100)={[], 0x0, 0x223214}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000340)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x4]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 381.952668] audit: type=1804 audit(1671404272.884:22): pid=19933 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir4032785089/syzkaller.SB9Oxr/538/bus" dev="sda1" ino=15075 res=1 [ 381.985966] audit: type=1800 audit(1671404272.884:23): pid=19933 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15075 res=0 22:57:53 executing program 4: creat(&(0x7f0000000600)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='befs\x00', 0x0, 0x0) 22:57:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) [ 382.798346] *** Guest State *** 22:57:53 executing program 5: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) lseek(r0, 0x7, 0x0) 22:57:53 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) 22:57:53 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0x40086602, 0x0) [ 382.821070] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 382.855782] befs: (nbd4): No write support. Marking filesystem read-only 22:57:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') lseek(r0, 0x4, 0x0) [ 382.883646] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 22:57:53 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000080)={{0x3, 0x1, 0x18}, './file0\x00'}) [ 382.939083] block nbd4: Attempted send on invalid socket [ 382.945027] print_req_error: I/O error, dev nbd4, sector 0 [ 382.955975] befs: (nbd4): unable to read superblock 22:57:53 executing program 3: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40c0, 0x0) 22:57:53 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x6000, 0x1) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, 0x0) 22:57:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000002180)='projid_map\x00') lseek(r0, 0x1000000, 0x0) [ 382.997763] CR3 = 0x0000000000000000 [ 383.017914] RSP = 0x0000000000000000 RIP = 0x0000000000000000 22:57:54 executing program 0: openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000022c0), 0x1, 0x0) [ 383.073449] RFLAGS=0x00223216 DR7 = 0x0000000000000400 [ 383.100358] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 383.142546] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 383.205693] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 383.247999] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 383.277230] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 383.304200] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 383.327659] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 383.340331] GDTR: limit=0x00000000, base=0x0000000000000000 [ 383.367826] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 383.385491] IDTR: limit=0x00000000, base=0x0000000000000000 [ 383.393479] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 383.401853] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 383.408555] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 383.416249] Interruptibility = 00000000 ActivityState = 00000000 [ 383.422475] *** Host State *** [ 383.425940] RIP = 0xffffffff811a9c2f RSP = 0xffff88809fd478c0 [ 383.431920] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 383.439833] FSBase=00007f30c6966700 GSBase=ffff8880ba000000 TRBase=fffffe0000003000 [ 383.448884] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 383.454775] CR0=0000000080050033 CR3=00000000aa1b3000 CR4=00000000003426f0 [ 383.467893] Sysenter RSP=fffffe0000003000 CS:RIP=0010:ffffffff88201290 [ 383.474569] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 383.484184] *** Control State *** [ 383.490419] PinBased=0000003f CPUBased=b5986dfe SecondaryExec=000000e2 [ 383.500647] EntryControls=0000d1ff ExitControls=002fefff [ 383.508819] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 22:57:54 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x6000, 0x1) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0x127a, 0x0) 22:57:54 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r0, 0x9408, 0x0) 22:57:54 executing program 3: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) lseek(r0, 0x0, 0x0) 22:57:54 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000035c0), 0x2, 0x0) writev(r0, &(0x7f0000001540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) 22:57:54 executing program 5: openat$uhid(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0) pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f00000001c0)={0x8}, &(0x7f0000000200)={0x0, 0x3938700}, 0x0) 22:57:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_targets\x00') lseek(r0, 0x2, 0x0) [ 383.519264] VMEntry: intr_info=80000042 errcode=00000000 ilen=00000000 [ 383.528697] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 383.537614] reason=80000021 qualification=0000000000000000 [ 383.543938] IDTVectoring: info=00000000 errcode=00000000 [ 383.549821] TSC Offset = 0xffffff3a1afdfb32 [ 383.554141] EPT pointer = 0x00000000a70eb01e [ 383.558831] Virtual processor ID = 0x0001 22:57:54 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30}, 0x30) 22:57:54 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$fuse(0x20100000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) 22:57:54 executing program 1: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0) 22:57:54 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, 0x0) 22:57:54 executing program 2: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$tcp_mem(r0, &(0x7f0000000300), 0x48) 22:57:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002500)) 22:57:54 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) lseek(r0, 0x0, 0x0) 22:57:54 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x0, 0xffffffffffffffff}) 22:57:54 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0x5451, 0x0) 22:57:54 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$fuseblk(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x29480, 0x0) 22:57:54 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x89082, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0x5450, 0x0) 22:57:54 executing program 0: openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000022c0), 0xbe0f, 0x0) 22:57:54 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200) 22:57:54 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x20141, 0x0) write(r0, &(0x7f0000000040)='/', 0x1) 22:57:54 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) 22:57:54 executing program 0: r0 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000002340)='./binderfs/binder-control\x00', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0) 22:57:54 executing program 2: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x8}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 22:57:54 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x6400, 0x0) 22:57:55 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0x5421, 0x0) 22:57:55 executing program 4: pselect6(0xffffffffffffff17, &(0x7f0000000000), 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 22:57:55 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="3300000006"], 0x33) 22:57:55 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x6000, 0x1) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0x125e, 0x0) 22:57:55 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00') read(r0, &(0x7f0000000080)=""/230, 0xe6) 22:57:55 executing program 1: r0 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$6lowpan_enable(r0, &(0x7f0000000000)='1', 0x1) 22:57:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/udp6\x00') lseek(r0, 0x1000000, 0x0) 22:57:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000002040)='personality\x00') lseek(r0, 0x100000000000000, 0x0) 22:57:55 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc0189436, 0x0) 22:57:55 executing program 2: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000080)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) read$snapshot(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f00000022c0), 0x1, 0x0) 22:57:55 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18}, './file0\x00'}) 22:57:55 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000002080)='syscall\x00') lseek(r0, 0x1000000, 0x0) 22:57:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00') lseek(r0, 0x100000000000000, 0x0) 22:57:55 executing program 1: syz_open_procfs(0x0, &(0x7f0000002040)='setgroups\x00') 22:57:55 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/ram11', 0x10000, 0x0) 22:57:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') r1 = dup2(r0, r0) preadv(r1, &(0x7f0000002cc0)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000000180)=""/86, 0x56}], 0x2, 0x0, 0x0) 22:57:55 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x1) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) chown(&(0x7f0000000100)='./file0\x00', r0, 0xffffffffffffffff) utime(&(0x7f00000000c0)='./file0\x00', 0x0) 22:57:55 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') read(r0, &(0x7f0000000080)=""/62, 0x3e) 22:57:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000002180)='gid_map\x00') lseek(r0, 0x5, 0x0) 22:57:55 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040), 0x20001, 0x0) writev(r0, 0x0, 0x0) 22:57:55 executing program 5: r0 = creat(&(0x7f00000011c0)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 22:57:55 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0x5450, 0x0) 22:57:55 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000004500), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000004480), &(0x7f00000044c0)='./file0\x00', 0x0, &(0x7f0000006580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}, 0x0, 0x0, &(0x7f0000000000)) 22:57:55 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000380)={0x27, 0x3, 0x0, {0x0, 0x6, 0x0, '^@-]:-'}}, 0x27) 22:57:55 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f00000001c0)={0x8}, &(0x7f0000000200), 0x0) 22:57:55 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x800, 0x1) r0 = open(&(0x7f0000000000)='./file0\x00', 0x141181, 0x0) write$sysctl(r0, &(0x7f0000000200)='7\x00', 0x2) 22:57:55 executing program 0: pselect6(0x82, &(0x7f0000000100), 0x0, &(0x7f00000001c0), &(0x7f0000000200)={0x0, 0x3938700}, 0x0) 22:57:55 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fstat(r0, &(0x7f0000002180)) 22:57:55 executing program 4: r0 = eventfd2(0x9, 0x0) read$eventfd(r0, &(0x7f0000000200), 0x8) 22:57:55 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x6000, 0x1) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0x1261, 0x0) 22:57:55 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x6000, 0x1) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0x4c04, 0x0) 22:57:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') lseek(r0, 0x0, 0x1) 22:57:56 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0x4020940d, 0x0) 22:57:56 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0), 0x44002, 0x0) 22:57:56 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc020660b, 0x0) 22:57:56 executing program 2: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000036c0), 0x0, 0x0) 22:57:56 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x6000, 0x1) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0x4c00, 0x0) 22:57:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000010c0)={&(0x7f0000000040)={0x1078, 0x8, 0x6, 0x801, 0x70bd27, 0x25dfdbff, {0x4}, [@nested={0x1064, 0x11, 0x0, 0x1, [@generic="a25298e9b4057487b405ccc497358b2778b812836e3b5750acfffafaf121bdbcdaca3dae830367f1a63b6e5c3757ba557977cd237fafc71aeb1baa1463aad2321d34d8d39b1e16e8aec91b7d", @typed={0x14, 0x24, 0x0, 0x0, @ipv6=@remote}, @generic="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"]}]}, 0x1078}, 0x1, 0x0, 0x0, 0x4000004}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001140)={'vcan0\x00'}) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001200)={&(0x7f00000011c0)={0x38, 0x0, 0x10, 0x70bd26, 0x25dfdbff, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0xffff}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x81}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x4a014) r1 = socket$igmp(0x2, 0x3, 0x2) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000001280)) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000001600)={0x8, 'pimreg\x00', {'veth0_virt_wifi\x00'}, 0xb98}) 22:57:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x80081270, 0x0) 22:57:56 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x80081272, &(0x7f0000000040)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eeb3c8580440022447b6ae3baeb46ba7ef303dce5d53937fb01bd91e2531fb15ac9db711a3b8c74dcb9323563b94e400480affd37a4bc10a793d72b803a5ed51", "798afb7af1e7d1fb864d4d00803fd2235ce08f33f1e3306fb35530dbcc93e4d64dc30aa1c717c37d2ee758577b40e82e81389a28a0fa254199fae3e3b2c8a6ac", "226d860b14c2c15595bc0c9502b06e45f6fec12240b83439328e1a079cc40a2b"}}) 22:57:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="f9ffff7f00000000000006"], 0x2c}}, 0x0) 22:57:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000002040), r1) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000002100)={0x0, 0x0, &(0x7f00000020c0)={&(0x7f0000002080)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:57:56 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/vlan/vlan1\x00') lseek(r0, 0x1000000, 0x0) 22:57:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x80081270, 0x700000000000000) 22:57:56 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x401870cc, 0x0) 22:57:56 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001680)={0x10}, 0x10}}, 0x0) 22:57:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, 0x0) 22:57:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000040)={0x14, 0x0, 0x6, 0x801}, 0x14}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) socket$igmp(0x2, 0x3, 0x2) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000001440)={'bond_slave_0\x00', {0x2, 0x0, @empty}}) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$AUDIT_USER_AVC(r1, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001680)={0x14, 0x453, 0x0, 0x0, 0x0, "c4"}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r3, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001840)={&(0x7f00000017c0)={0x14}, 0x14}}, 0x0) 22:57:56 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200), r1) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 22:57:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000003640)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x2, 0x1c, "3f65cfe608f7cc5fd11c5bb4b8d7b0a58be8a00705a95349874168f94cb5b3b5ce823895294556b0726ac4ce1ef0799b18bc698f752b95dcf4fada55a7ba723b", "400ee13e1c9911240c9ba7aec0b55336c286284cc5bea34410d006a9e3735243", [0x0, 0x4]}) 22:57:56 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000001700)={&(0x7f0000001640)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x14, 0x453, 0x0, 0x0, 0x0, "c4"}, 0x14}}, 0x0) 22:57:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001840)={&(0x7f00000017c0)={0x14}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000001f00), r1) 22:57:56 executing program 5: socketpair(0x2b, 0x0, 0x0, &(0x7f00000018c0)) 22:57:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000040)={r1, 0x0, {0x0, 0x0, 0x0, 0xa305, 0x0, 0x0, 0x0, 0x0, 0x0, "eeb3c8580440022447b6ae3baeb46ba7ef303dce5d53937fb01bd91e2531fb15ac9db711a3b8c74dcb9323563b94e400480affd37a4bc10a793d72b803a5ed51", "798afb7af1e7d1fb864d4d00803fd2235ce08f33f1e3306fb35530dbcc93e4d64dc30aa1c717c37d2ee758577b40e82e81389a28a0fa254199fae3e3b2c8a6ac", "226d860b14c2c15595bc0c9502b06e45f6fec12240b83439328e1a079cc40a2b"}}) 22:57:56 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240), r0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000500)={0x18, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x4}]}, 0x18}}, 0x0) [ 385.390652] audit: type=1107 audit(1671404276.324:24): pid=20186 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='Ä' 22:57:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000040)={0xec4, 0x0, 0x0, 0x801, 0x0, 0x0, {}, [@nested={0xead, 0x0, 0x0, 0x1, [@generic="a25298e9b4057487b405ccc497358b2778b812836e3b5750acfffafaf121bdbcdaca3dae830367f1a63b6e5c3757ba557977cd237fafc71aeb1baa1463aad2321d34d8d39b1e16e8aec91b7d8c", @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@remote}, @generic="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"]}]}, 0xec4}}, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, 0x0, 0x0) 22:57:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000010c0)={&(0x7f0000000040)={0x14, 0x8}, 0x14}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, 0x0, 0x0) r1 = socket$igmp(0x2, 0x3, 0x2) ioctl$SIOCGSTAMP(r1, 0x8906, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) listen(0xffffffffffffffff, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000001f40)) 22:57:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000040)={0x14, 0x0, 0x0, 0x801}, 0x14}}, 0x0) 22:57:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, 0x0, 0x20000810) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000001f00), r1) [ 385.464810] audit: type=1107 audit(1671404276.394:25): pid=20193 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='Ä' 22:57:56 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000200), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000006"], 0x2c}}, 0x0) 22:57:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x401070cd, 0x0) 22:57:56 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000040)={0xec4, 0x8, 0x0, 0x0, 0x70bd27, 0x25dfdbff, {}, [@nested={0xead, 0x0, 0x0, 0x1, [@generic="a25298e9b4057487b405ccc497358b2778b812836e3b5750acfffafaf121bdbcdaca3dae830367f1a63b6e5c3757ba557977cd237fafc71aeb1baa1463aad2321d34d8d39b1e16e8aec91b7d8c", @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@remote}, @generic="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"]}]}, 0xec4}}, 0x0) [ 385.578134] nbd: must specify an index to disconnect 22:57:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "1afa3cc9a64262cdb93d01b4fcbd54628734d93b5673215efa32e6456170a975835d0d2d516913f5390902d872ff68a5f42233656c8718366252707432d625a4", "2148dd9ba9c84bf6ccbcb124d981d3acebe3480fca5c0d9b8528c1d0444afb4c", [0xce2]}) 22:57:56 executing program 1: getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 22:57:56 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) [ 385.635922] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 22:57:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000040)={0x14, 0x0, 0x6, 0x801}, 0x14}}, 0x0) 22:57:56 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1267, 0x0) 22:57:56 executing program 4: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000010c0)={&(0x7f0000000040)={0x2c, 0x0, 0x6, 0x0, 0x0, 0x0, {}, [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@remote}, @generic]}]}, 0x2c}}, 0x0) socket$igmp(0x2, 0x3, 0x2) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f00000012c0)={0x6, 'vxcan1\x00', {0x3}}) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={0x0}}, 0x0) listen(0xffffffffffffffff, 0x6987) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000015c0)) socket$inet(0x2, 0x0, 0x0) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000001700)={&(0x7f0000001640), 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x14, 0x453, 0x400, 0x70bd25, 0x0, "c4", [""]}, 0x14}}, 0x48080) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x0, 0xa, 0x1000, 0x0) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000001e00), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20040010}, 0x0) 22:57:56 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000ac0)={'wpan0\x00'}) 22:57:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x7, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x18, 0x1d, 0x7daf56d999d621e4, "0ba4996756bb5dd09e1bdcd91109e4aca990fe73d6e1a255ba7d745ad31937396ecc29a93551ee756925147ea33d477397fb8ea6a3a86930989e2515c0458da5", "702e498538133fed35bcedcc7955c043d75ec98055b564b58572296a4248fd91b95cb361072f154db93f78c50c79f20344dd2d1950d8fd478760c940ac57db49", "84afe72c9f0555edf2050677c6993c52d241417e1914785e4d0c806e3d62a1e7", [0xd91, 0x2]}) 22:57:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x15) syz_genetlink_get_family_id$wireguard(&(0x7f0000000200), r0) 22:57:56 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000002040), r1) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000002100)={0x0, 0x0, &(0x7f00000020c0)={&(0x7f0000002080)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}]}, 0x28}}, 0x0) 22:57:56 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000040)={r1, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, "eeb3c8580440022447b6ae3baeb46ba7ef303dce5d53937fb01bd91e2531fb15ac9db711a3b8c74dcb9323563b94e400480affd37a4bc10a793d72b803a5ed51", "798afb7af1e7d1fb864d4d00803fd2235ce08f33f1e3306fb35530dbcc93e4d64dc30aa1c717c37d2ee758577b40e82e81389a28a0fa254199fae3e3b2c8a6ac", "226d860b14c2c15595bc0c9502b06e45f6fec12240b83439328e1a079cc40a2b", [0x9, 0xc3]}}) 22:57:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000000)="c6660e5e8c586588", 0x8) 22:57:56 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001680)={0x14, 0x453, 0x0, 0x0, 0x0, "c4"}, 0x14}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:57:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x541b, 0x0) 22:57:56 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000040)={r1, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa000000, 0x0, 0x0, 0x0, 0x0, "eeb3c8580440022447b6ae3baeb46ba7ef303dce5d53937fb01bd91e2531fb15ac9db711a3b8c74dcb9323563b94e400480affd37a4bc10a793d72b803a5ed51", "798afb7af1e7d1fb864d4d00803fd2235ce08f33f1e3306fb35530dbcc93e4d64dc30aa1c717c37d2ee758577b40e82e81389a28a0fa254199fae3e3b2c8a6ac", "226d860b14c2c15595bc0c9502b06e45f6fec12240b83439328e1a079cc40a2b"}}) 22:57:56 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c01, &(0x7f0000000040)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eeb3c8580440022447b6ae3baeb46ba7ef303dce5d53937fb01bd91e2531fb15ac9db711a3b8c74dcb9323563b94e400480affd37a4bc10a793d72b803a5ed51", "798afb7af1e7d1fb864d4d00803fd2235ce08f33f1e3306fb35530dbcc93e4d64dc30aa1c717c37d2ee758577b40e82e81389a28a0fa254199fae3e3b2c8a6ac", "226d860b14c2c15595bc0c9502b06e45f6fec12240b83439328e1a079cc40a2b", [0x9]}}) 22:57:56 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1279, 0x0) [ 385.924300] audit: type=1107 audit(1671404276.854:26): pid=20232 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='Ä' 22:57:56 executing program 2: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000001f00), 0xffffffffffffffff) 22:57:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0xc0189436, 0x700000000000000) [ 385.976418] audit: type=1107 audit(1671404276.904:27): pid=20251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='Ä' 22:57:56 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000400), 0xffffffffffffffff) 22:57:57 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240), r0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000500)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}]}, 0x20}}, 0x0) 22:57:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000040)={r1, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, 0x0, 0x0, "eeb3c8580440022447b6ae3baeb46ba7ef303dce5d53937fb01bd91e2531fb15ac9db711a3b8c74dcb9323563b94e400480affd37a4bc10a793d72b803a5ed51", "798afb7af1e7d1fb864d4d00803fd2235ce08f33f1e3306fb35530dbcc93e4d64dc30aa1c717c37d2ee758577b40e82e81389a28a0fa254199fae3e3b2c8a6ac", "226d860b14c2c15595bc0c9502b06e45f6fec12240b83439328e1a079cc40a2b"}}) 22:57:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001100)={&(0x7f0000000000), 0xc, &(0x7f00000010c0)={&(0x7f0000000040)={0xec4, 0x8, 0x0, 0x0, 0x0, 0x0, {0x4}, [@nested={0xead, 0x0, 0x0, 0x1, [@generic="a25298e9b4057487b405ccc497358b2778b812836e3b5750acfffafaf121bdbcdaca3dae830367f1a63b6e5c3757ba557977cd237fafc71aeb1baa1463aad2321d34d8d39b1e16e8aec91b7d", @generic="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"]}]}, 0xec4}}, 0x0) socket$igmp(0x2, 0x3, 0x2) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) 22:57:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000040)={0xec4, 0x0, 0x6, 0x801, 0x70bd27, 0x25dfdbff, {}, [@nested={0xead, 0x11, 0x0, 0x1, [@generic="a25298e9b4057487b405ccc497358b2778b812836e3b5750acfffafaf121bdbcdaca3dae830367f1a63b6e5c3757ba557977cd237fafc71aeb1baa1463aad2321d34d8d39b1e16e8aec91b7d8c", @generic="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"]}]}, 0xec4}}, 0x4000) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, 0x0, 0x4a014) socket$igmp(0x2, 0x3, 0x2) socket$nl_audit(0x10, 0x3, 0x9) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000014c0)=""/69, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000015c0)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r1, 0x0, 0x0) 22:57:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x14}, 0x14}}, 0x0) 22:57:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x125f, 0x0) [ 386.145703] nbd: must specify an index to disconnect 22:57:57 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000040)={r1, 0x0, {0xffffffe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, "eeb3c8580440022447b6ae3baeb46ba7ef303dce5d53937fb01bd91e2531fb15ac9db711a3b8c74dcb9323563b94e400480affd37a4bc10a793d72b803a5ed51", "798afb7af1e7d1fb864d4d00803fd2235ce08f33f1e3306fb35530dbcc93e4d64dc30aa1c717c37d2ee758577b40e82e81389a28a0fa254199fae3e3b2c8a6ac", "226d860b14c2c15595bc0c9502b06e45f6fec12240b83439328e1a079cc40a2b", [0x9]}}) 22:57:57 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x80041284, &(0x7f0000000040)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eeb3c8580440022447b6ae3baeb46ba7ef303dce5d53937fb01bd91e2531fb15ac9db711a3b8c74dcb9323563b94e400480affd37a4bc10a793d72b803a5ed51", "798afb7af1e7d1fb864d4d00803fd2235ce08f33f1e3306fb35530dbcc93e4d64dc30aa1c717c37d2ee758577b40e82e81389a28a0fa254199fae3e3b2c8a6ac", "226d860b14c2c15595bc0c9502b06e45f6fec12240b83439328e1a079cc40a2b"}}) 22:57:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_KEY(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r0) syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000002100)={&(0x7f0000002000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000020c0)={&(0x7f0000002080)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) 22:57:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1276, 0x0) 22:57:57 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) socket$igmp(0x2, 0x3, 0x2) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, 0x0, 0x20040001) socket$inet(0x2, 0x0, 0x1) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, 0x0) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, 0x0, 0x48080) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) 22:57:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c01, &(0x7f0000000040)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eeb3c8580440022447b6ae3baeb46ba7ef303dce5d53937fb01bd91e2531fb15ac9db711a3b8c74dcb9323563b94e400480affd37a4bc10a793d72b803a5ed51", "798afb7af1e7d1fb864d4d00803fd2235ce08f33f1e3306fb35530dbcc93e4d64dc30aa1c717c37d2ee758577b40e82e81389a28a0fa254199fae3e3b2c8a6ac", "226d860b14c2c15595bc0c9502b06e45f6fec12240b83439328e1a079cc40a2b"}}) 22:57:57 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000003640)={0x0, {}, 0x0, {}, 0x8, 0x1, 0x2, 0x0, "3f65cfe608f7cc5fd11c5bb4b8d7b0a58be8a00705a95349874168f94cb5b3b5ce823895294556b0726ac4ce1ef0799b18bc698f752b95dcf4fada55a7ba723b", "400ee13e1c9911240c9ba7aec0b55336c286284cc5bea34410d006a9e3735243"}) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r1, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, 0x0) 22:57:57 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x127e, 0x0) 22:57:57 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000040)={r1, 0xd422, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eeb3c8580440022447b6ae3baeb46ba7ef303dce5d53937fb01bd91e2531fb15ac9db711a3b8c74dcb9323563b94e400480affd37a4bc10a793d72b803a5ed51", "798afb7af1e7d1fb864d4d00803fd2235ce08f33f1e3306fb35530dbcc93e4d64dc30aa1c717c37d2ee758577b40e82e81389a28a0fa254199fae3e3b2c8a6ac", "226d860b14c2c15595bc0c9502b06e45f6fec12240b83439328e1a079cc40a2b"}}) 22:57:57 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x7, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x3f, 0x20, 0x0, 0x18, 0x1d, 0x7daf56d999d621e4, "0ba4996756bb5dd09e1bdcd91109e4aca990fe73d6e1a255ba7d745ad31937396ecc29a93551ee756925147ea33d477397fb8ea6a3a86930989e2515c0458da5", "702e498538133fed35bcedcc7955c043d75ec98055b564b58572296a4248fd91b95cb361072f154db93f78c50c79f20344dd2d1950d8fd478760c940ac57db49", "84afe72c9f0555edf2050677c6993c52d241417e1914785e4d0c806e3d62a1e7", [0xd91, 0x2]}) 22:57:57 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x4c0a, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000200)) 22:57:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x82) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000040)={r1, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eeb3c8580440022447b6ae3baeb46ba7ef303dce5d53937fb01bd91e2531fb15ac9db711a3b8c74dcb9323563b94e400480affd37a4bc10a793d72b803a5ed51", "798afb7af1e7d1fb864d4d00803fd2235ce08f33f1e3306fb35530dbcc93e4d64dc30aa1c717c37d2ee758577b40e82e81389a28a0fa254199fae3e3b2c8a6ac", "226d860b14c2c15595bc0c9502b06e45f6fec12240b83439328e1a079cc40a2b"}}) 22:57:57 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000040)={r1, 0x0, {0x0, 0x3d870300, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, "eeb3c8580440022447b6ae3baeb46ba7ef303dce5d53937fb01bd91e2531fb15ac9db711a3b8c74dcb9323563b94e400480affd37a4bc10a793d72b803a5ed51", "798afb7af1e7d1fb864d4d00803fd2235ce08f33f1e3306fb35530dbcc93e4d64dc30aa1c717c37d2ee758577b40e82e81389a28a0fa254199fae3e3b2c8a6ac", "226d860b14c2c15595bc0c9502b06e45f6fec12240b83439328e1a079cc40a2b", [0x9]}}) 22:57:57 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001580)={0x0, @private, @multicast1}, &(0x7f00000015c0)=0xc) 22:57:57 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x1278, &(0x7f0000000040)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eeb3c8580440022447b6ae3baeb46ba7ef303dce5d53937fb01bd91e2531fb15ac9db711a3b8c74dcb9323563b94e400480affd37a4bc10a793d72b803a5ed51", "798afb7af1e7d1fb864d4d00803fd2235ce08f33f1e3306fb35530dbcc93e4d64dc30aa1c717c37d2ee758577b40e82e81389a28a0fa254199fae3e3b2c8a6ac", "226d860b14c2c15595bc0c9502b06e45f6fec12240b83439328e1a079cc40a2b"}}) 22:57:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000040)={0xec4, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@nested={0xead, 0x0, 0x0, 0x1, [@generic="a25298e9b4057487b405ccc497358b2778b812836e3b5750acfffafaf121bdbcdaca3dae830367f1a63b6e5c3757ba557977cd237fafc71aeb1baa1463aad2321d34d8d39b1e16e8aec91b7d8c", @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@remote}, @generic="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"]}]}, 0xec4}}, 0x0) 22:57:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001100)={&(0x7f0000000000), 0xc, &(0x7f00000010c0)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 22:57:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x127f, 0x0) 22:57:57 executing program 2: memfd_create(&(0x7f0000000200)='/dev/vcsa#\xa3\xe2[]l<\xdb<\x9c\xbc\x12\xd9\r)\x84\r:\x91\xfa;\xb8\xab\xe7\xa7\\\xd7O\x98%N\t3u\x9a\x1b\x8a\x11\xe9\xd4l\xf6{\x1d\x1a\x14\xf3\x00\x00\x00\x04\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x11\x9eF\xd3\x00\x00\x00\x94\x97\xb2\xa41\x9e\x121\x9cP\xaa\x05\xc370xffffffffffffffff}) connect$caif(r0, 0x0, 0x0) 22:57:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x890b, 0x0) 22:57:59 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xb, r0, 0x7) 22:57:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1e, 0x0, 0x7, 0xa77, 0x0, 0x1}, 0x48) 22:57:59 executing program 0: r0 = gettid() migrate_pages(r0, 0x7, &(0x7f0000001bc0)=0x8001, &(0x7f0000001c00)=0x5) 22:57:59 executing program 3: r0 = openat$fuse(0xffffff9c, &(0x7f00000005c0), 0x2, 0x0) write$FUSE_IOCTL(r0, 0x0, 0x0) 22:57:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x9, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) 22:57:59 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0xb, r0, 0x0, 0x0) 22:57:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1e, 0x0, 0x7, 0xa77, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 22:57:59 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x3, r0, 0x0, 0x0) keyctl$set_timeout(0xb, r0, 0x0) 22:57:59 executing program 3: pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) socketpair(0x1, 0x801, 0x0, &(0x7f0000000000)) 22:57:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x890b, &(0x7f00000000c0)={'gre0\x00', 0x0}) 22:57:59 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x6, r0, 0x0, 0x0) 22:57:59 executing program 5: keyctl$get_persistent(0x16, 0xee00, 0xfffffffffffffffe) 22:57:59 executing program 1: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000140)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r0}) 22:57:59 executing program 3: syz_open_dev$loop(&(0x7f0000001e00), 0x0, 0x802080) 22:57:59 executing program 4: syslog(0x2, &(0x7f0000000080)=""/99, 0x63) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, 0x0) 22:57:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x891b, &(0x7f00000000c0)={'gre0\x00', 0x0}) 22:57:59 executing program 5: r0 = timerfd_create(0x1, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000240)={{}, {0x0, 0x989680}}, &(0x7f0000000280)) 22:57:59 executing program 2: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x4, r0, &(0x7f0000000400)='encrypted\x00', 0x0) 22:57:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x8914, &(0x7f0000000380)={'sit0\x00', 0x0}) 22:57:59 executing program 5: pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000002, 0xffffffffffffffff) 22:57:59 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) 22:57:59 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r1, r0) 22:57:59 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000001c0)={'fscrypt:', @desc2}, &(0x7f0000000200)={0x0, "a77c99c066cab639c4396d8c471bb7d03d6576abddac54f1a4095bd9149adf21cc3f5f9622201d981325d4422872863b1540898811f890421245c3e1ccc0f2f1"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) 22:58:00 executing program 5: keyctl$KEYCTL_RESTRICT_KEYRING(0x6, 0x0, 0x0, 0x0) 22:58:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8904, &(0x7f00000000c0)={'gre0\x00', 0x0}) 22:58:00 executing program 0: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000000c0)) 22:58:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000040), 0x4) 22:58:00 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$unix(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [r0, r1]}}, @rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}], 0x24}, 0x0) 22:58:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc) 22:58:00 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$unix(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [r0, r1]}}], 0x14}, 0x0) 22:58:00 executing program 2: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4020940d, 0x0) 22:58:00 executing program 0: add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='\x00', 0x0) 22:58:00 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) r1 = add_key$user(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="1e", 0x1, 0xfffffffffffffffc) keyctl$unlink(0x9, r1, r0) 22:58:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x8947, 0x0) 22:58:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f00000002c0), r0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) 22:58:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x1a, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) 22:58:00 executing program 3: openat$procfs(0xffffff9c, &(0x7f00000002c0)='/proc/cpuinfo\x00', 0x0, 0x0) 22:58:00 executing program 4: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)={0x0, 0x3, 0xffb}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8080028}, 0xc, &(0x7f0000000380)={&(0x7f00000000c0)={0x240, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x81}]}, @TIPC_NLA_NODE={0xd8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x400}, @TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_ID={0xc4, 0x3, "f5217449ef56ab5dcc3e713157ba1068e322e84e9ab7af698fd05f6960ff9865cb5a99608a7d35bf9f1c20ee5736dfab410bd45deeca9088212b8c902516e2eeb23ae51c12b0c159835e5d2be2ba195c0307351be59126d3173d0bd64ad064d2771e646574fd4dcb7c3a432077bb6c3d98890dd0df2e6f40c170653054295c66123052cd13975ffd0ced9ac4bd395501a8f87826de0ad1fd9132d293612cb30226802e7a933c375f5e9cda25ef0c6414eff85e913645b630a555fffe51437702"}, @TIPC_NLA_NODE_KEY_MASTER={0x4}]}, @TIPC_NLA_SOCK={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x21fa}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}]}, @TIPC_NLA_NODE={0xfc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xf3, 0x3, "e09a47ae942250c9617dd81838da0f467e0419a479c85cafe6608af35837e7a93d7190a81024191c329a87b7160cf770f06105669962b739f7ecd42bede388d87c23bec2d868560e0f3e8d26e6cbcf8ad07fb8d02de4fed3999d45313a49211a88e1bf60337e9747896b33733527720f28fdf1324ad9ab9f5775f0a3feaf4e4df9b11dbfaa5e9cbed3023248521ac6e5b7c421279e4ca39ad268a729c7b9d0a35b3d26a9872588cab2a7175092c9a0dc662c5a92fe3416ed1100e47505a087b9dd37215d4db775d981832a53f98df9c167c8ca70daf28b20d55020e387513fde8401d854ec141a9783d62f1e6c4b8b"}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x8000}, 0x801) 22:58:00 executing program 2: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x8008af00, 0x0) 22:58:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0xa11, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 22:58:00 executing program 1: syslog(0x3, &(0x7f0000000080)=""/93, 0xfffffe1a) 22:58:00 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)={0xfffffffb}, 0x8) 22:58:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x1c, 0x2, 0x1, 0x3, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) [ 389.963351] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 22:58:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0xc0189436, &(0x7f0000000380)={'sit0\x00', 0x0}) 22:58:00 executing program 5: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x2, 0x0) 22:58:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x9effffff}, 0x0) 22:58:01 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)={0x0, 0x989680}, 0x0) 22:58:01 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, r0) 22:58:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000240)={'tunl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1}}}}) 22:58:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r1, 0x421, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 22:58:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0xf}, 0x14}}, 0x0) 22:58:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x402c582a, &(0x7f0000000380)={'sit0\x00', 0x0}) 22:58:01 executing program 0: syslog(0x3, &(0x7f0000000000)=""/142, 0x8e) 22:58:01 executing program 3: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)='\a', 0x1, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0xb, r1, 0x0, 0x0) 22:58:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}}}}) 22:58:01 executing program 2: process_vm_writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/78, 0x4e}], 0x1, 0x0, 0x0, 0x0) 22:58:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 22:58:01 executing program 3: socket$unix(0x1, 0x5, 0x0) pselect6(0x40, &(0x7f0000001140)={0x8}, 0x0, 0x0, 0x0, 0x0) 22:58:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000100)='.dead\x00', &(0x7f0000000140)=@keyring) 22:58:01 executing program 0: add_key$fscrypt_v1(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) 22:58:01 executing program 0: r0 = openat$ptp0(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x43403d05, 0x0) 22:58:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8924, &(0x7f00000000c0)={'gre0\x00', 0x0}) 22:58:01 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x15, 0x8}, 0x48) 22:58:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89a1, 0x0) 22:58:01 executing program 5: r0 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4068aea3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) 22:58:01 executing program 0: keyctl$KEYCTL_RESTRICT_KEYRING(0x16, 0x0, 0x0, 0x0) 22:58:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x10, 0x0, 0x0, 0xfffff800}, 0x48) 22:58:01 executing program 2: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000080)={@my=0x0}) 22:58:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0xa11}, 0x14}}, 0x0) 22:58:01 executing program 1: keyctl$KEYCTL_RESTRICT_KEYRING(0x8, 0x0, 0x0, 0x0) 22:58:01 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, r0, &(0x7f0000000400)='encrypted\x00', &(0x7f0000000440)=@keyring) 22:58:01 executing program 2: r0 = socket$unix(0x1, 0x3, 0x0) accept4$unix(r0, 0x0, 0x0, 0x0) 22:58:01 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x0, 0x0, 0x8}, 0x48) 22:58:01 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001300)={0x6, 0x1, &(0x7f0000001140)=@raw=[@ldst={0x3}], &(0x7f0000001180)='syzkaller\x00', 0x5, 0x81, &(0x7f00000011c0)=""/129, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:01 executing program 3: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x3, r0, 0x0, 0x0) keyctl$set_timeout(0xf, r0, 0x0) 22:58:01 executing program 4: socket$unix(0x1, 0x3, 0x0) pselect6(0x40, &(0x7f0000001140)={0x8}, 0x0, 0x0, &(0x7f0000001f00)={0x0, 0x3938700}, 0x0) 22:58:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x1c, 0x2, 0x1, 0x3, 0x0, 0x0, {}, [@CTA_STATUS={0x8}]}, 0x1c}}, 0x0) 22:58:01 executing program 0: r0 = openat$nvram(0xffffff9c, &(0x7f00000001c0), 0x101181, 0x0) write$P9_RATTACH(r0, 0x0, 0x0) 22:58:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x3, r0, 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000100)={0x0, "1604352185eca358048a92ee6fa69e7f5a4f0f24df5810ce11ed569a14c0fa2292abad2780ceba7d35e8102c9f6e50811cd151a70471c6e5a638fdc996399298"}, 0x48, 0xfffffffffffffffb) keyctl$get_security(0x11, r1, 0x0, 0x0) 22:58:01 executing program 5: getgid() syz_clone(0x24000000, 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000005c0)="7d25850a34fb2cf4ebfba0f3bc1ce9a204276b52a31707017bf7b9e1f3bb864405aeb5c3ba187ef9711724e89df1d2d5ca1b1fcfa8286e8f387fa917e4e68defaccdc64a80cb8e344a95b2aabf4caf502dfe046d4326431b317d951f0626a900f3992a626437") write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000001740)={0x14}, 0x14) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:58:01 executing program 3: migrate_pages(0xffffffffffffffff, 0xfff, 0x0, 0x0) 22:58:01 executing program 1: r0 = openat$ptp0(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0xc0603d0f, &(0x7f0000000240)) 22:58:01 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)='\a', 0x1, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x2, r1, 0x0, 0x0) 22:58:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000280)=""/180, 0x2e, 0xb4, 0x1}, 0x20) 22:58:01 executing program 5: socketpair(0x1, 0x801, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x4c}}, 0x0) 22:58:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000004c0)={'sit0\x00', &(0x7f0000000480)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}}) 22:58:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x17, 0x0, 0x5, 0xfffffffb, 0x0, 0x1}, 0x48) 22:58:01 executing program 4: r0 = openat$ptp0(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0xc0403d11, &(0x7f0000000240)) 22:58:01 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r0) 22:58:01 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x9, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, 0x0) 22:58:01 executing program 5: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc020660b, 0x0) 22:58:01 executing program 4: migrate_pages(0x0, 0x7, &(0x7f0000001bc0)=0x8001, &(0x7f0000001c00)=0x5) 22:58:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[], 0x1c}}, 0x0) 22:58:01 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) 22:58:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8922, &(0x7f00000000c0)={'gre0\x00', 0x0}) 22:58:01 executing program 0: keyctl$KEYCTL_RESTRICT_KEYRING(0xb, 0x0, 0x0, 0x0) 22:58:01 executing program 3: add_key$user(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='|', 0x1, 0xffffffffffffffff) 22:58:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f00000002c0), r0) 22:58:02 executing program 2: r0 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 22:58:02 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000100)={0x0, "fe1a482a1cf55a6b58d2e9d87d08135ca55f178da6a3fdfa5dc8f1438372862352be454e0870673db5036ddd0f2d9638d878c5cf86646b7bf214813c7b82906e"}, 0x48, 0xfffffffffffffffd) keyctl$update(0x2, r0, &(0x7f0000000180)='g', 0x1) 22:58:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x3, 0x4) 22:58:02 executing program 4: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x7ade719aa382a291) 22:58:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8912, &(0x7f00000000c0)={'gre0\x00', 0x0}) 22:58:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x8922, &(0x7f0000000380)={'sit0\x00', 0x0}) [ 391.091253] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 22:58:02 executing program 4: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000400)='encrypted\x00', &(0x7f0000000440)=@keyring) 22:58:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x1c, 0x2, 0x1, 0x3, 0x0, 0x0, {}, [@CTA_STATUS={0x5, 0x2}]}, 0x1c}}, 0x0) 22:58:02 executing program 5: keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, 0x0, 0x0) 22:58:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x8947, &(0x7f0000000380)={'sit0\x00', 0x0}) [ 391.168169] sit0: mtu less than device minimum 22:58:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, 0x2, 0x2, 0x3, 0x0, 0x0, {}, [@CTA_STATUS={0x8, 0x2}, @CTA_TIMEOUT={0x8}]}, 0x24}}, 0x0) 22:58:02 executing program 2: r0 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @desc4}, &(0x7f0000000500)={0x0, "6bf21c788a398c710b4286306c747dca849838ecf276b988df9b1135ea8c783fa6a095462699ec791f41a9abffbba4b784728348b3942667eb1f925f20c36617"}, 0x81, r0) request_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, r1) 22:58:02 executing program 4: setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000040), 0xfffffd4b) 22:58:02 executing program 1: socketpair(0x1, 0x801, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r0) 22:58:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, 0xfffffffffffffffb) 22:58:02 executing program 3: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x5451, 0x0) [ 391.260957] netlink: 'syz-executor.0': attribute type 7 has an invalid length. 22:58:02 executing program 1: r0 = openat$ptp0(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0xc0603d06, &(0x7f0000000240)) 22:58:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x894a, &(0x7f0000000380)={'sit0\x00', 0x0}) 22:58:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, r0) 22:58:02 executing program 4: r0 = openat$ptp0(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x43403d05, &(0x7f0000000240)) 22:58:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) [ 391.311139] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 22:58:02 executing program 3: add_key$user(&(0x7f0000000080), 0x0, 0x0, 0x2c, 0xfffffffffffffffe) 22:58:02 executing program 2: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x6, r0, &(0x7f0000000400)='encrypted\x00', &(0x7f0000000440)=@keyring) 22:58:02 executing program 1: syslog(0x4, &(0x7f0000000080)=""/99, 0x63) 22:58:02 executing program 5: openat$vcsu(0xffffff9c, &(0x7f0000000100), 0x4000, 0x0) 22:58:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0xf00}, 0x0) 22:58:02 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)='\a', 0x1, r0) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="b4", 0x1, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x3, r1, 0x0, 0x0) 22:58:02 executing program 3: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000380), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000100)={0x0, "d4f2e5453c5d05cfa39b26b3b5dc64a041d8d67e1fe176502237f9645a105667f9340cc2bc3f34289dadafbc04136424d5c0de7bb8b12110e63c037679133b20"}, 0x48, r1) 22:58:02 executing program 2: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000100)={0x0, "d4f2e5453c5d05cfa39b26b3b5dc64a041d8d67e1fe176502237f9645a105667f9340cc2bc3f34289dadafbc04136424d5c0de7bb8b12110e63c037679133b20"}, 0x48, r1) keyctl$set_timeout(0xf, r2, 0x0) 22:58:02 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340)=@secondary) 22:58:02 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r1}) 22:58:02 executing program 1: r0 = openat$autofs(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, 0x0) 22:58:02 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x7, r0, 0x0, 0x0) 22:58:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0xc0045878, 0x0) 22:58:02 executing program 2: r0 = openat$procfs(0xffffff9c, &(0x7f0000002080)='/proc/consoles\x00', 0x0, 0x0) write$FUSE_BMAP(r0, 0x0, 0x0) 22:58:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={0x0, 0x220}}, 0x0) 22:58:02 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 22:58:02 executing program 0: socketpair(0x1, 0x801, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={0x0, 0x7000000}}, 0x0) 22:58:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x0, 0x0, 0xffff3214}, 0x48) 22:58:02 executing program 3: pselect6(0xfffffffffffffd5c, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 22:58:02 executing program 2: setresuid(0xee00, 0xee01, 0xee00) add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="bc", 0x1, 0xfffffffffffffffb) 22:58:02 executing program 5: socketpair(0x1, 0x801, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 22:58:02 executing program 1: r0 = add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='2', 0x1, 0xfffffffffffffffd) keyctl$get_keyring_id(0x0, r0, 0x0) 22:58:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8983, &(0x7f00000000c0)={'gre0\x00', 0x0}) 22:58:02 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000140), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:58:02 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x3, r0, 0x0, 0x0) keyctl$set_timeout(0x7, r0, 0x0) 22:58:02 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x1260, &(0x7f0000000040)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "eeb3c8580440022447b6ae3baeb46ba7ef303dce5d53937fb01bd91e2531fb15ac9db711a3b8c74dcb9323563b94e400480affd37a4bc10a793d72b803a5ed51", "798afb7af1e7d1fb864d4d00803fd2235ce08f33f1e3306fb35530dbcc93e4d64dc30aa1c717c37d2ee758577b40e82e81389a28a0fa254199fae3e3b2c8a6ac", "226d860b14c2c15595bc0c9502b06e45f6fec12240b83439328e1a079cc40a2b"}}) 22:58:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000040)=0xfffffffd, 0x4) 22:58:02 executing program 5: process_vm_writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/78, 0x4e}], 0x1, &(0x7f0000000580)=[{0x0}, {0x0}], 0x2, 0x0) 22:58:02 executing program 0: add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="bc", 0x200000c1, 0xfffffffffffffffb) 22:58:02 executing program 3: r0 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) 22:58:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x8910, &(0x7f0000000380)={'sit0\x00', 0x0}) 22:58:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x220}}, 0x0) 22:58:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0xa11, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) 22:58:02 executing program 1: openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) 22:58:02 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x4, r0, 0x0, 0x0) 22:58:02 executing program 2: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x4008af00, 0x0) 22:58:02 executing program 3: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x3, r0, 0x0, 0x0) 22:58:02 executing program 4: r0 = openat$ptp0(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40043d0d, 0x0) 22:58:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0xb, 0x0, &(0x7f0000000040)) 22:58:02 executing program 2: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x5421, 0x0) 22:58:02 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 22:58:02 executing program 5: r0 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x6003, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) 22:58:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x8970, &(0x7f0000000380)={'sit0\x00', 0x0}) 22:58:02 executing program 4: r0 = openat$rtc(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) 22:58:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 22:58:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x891f, &(0x7f0000000380)={'sit0\x00', 0x0}) 22:58:02 executing program 2: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81e8943c, 0x0) 22:58:02 executing program 0: openat$cgroup_root(0xffffff9c, &(0x7f0000000c40)='./cgroup.net/syz1\x00', 0x200002, 0x0) 22:58:02 executing program 4: socketpair(0x1, 0x801, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void, @val={0xc}}}}, 0x28}}, 0x0) 22:58:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/180, 0x30, 0xb4, 0x1}, 0x20) 22:58:03 executing program 1: setresuid(0xee00, 0xee01, 0xee00) 22:58:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89b0, &(0x7f00000000c0)={'gre0\x00', 0x0}) 22:58:03 executing program 2: r0 = openat$rtc(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x2, 0x0) 22:58:03 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000001500)='keyring\x00', 0x0, &(0x7f0000000500)='Z', 0x1, r0) 22:58:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x8923, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000340)={@empty, @loopback, 0x0, 0xb}}) 22:58:03 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x8e6faf38bc6a71dd, 0x0, 0x0) 22:58:03 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x24, 0x2, 0x1, 0x3, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}, @CTA_STATUS={0x8}]}, 0x24}}, 0x0) 22:58:03 executing program 4: r0 = request_key(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0) add_key$user(&(0x7f00000001c0), 0x0, 0x0, 0x0, r0) 22:58:03 executing program 2: add_key$user(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000040), &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="1b", 0x1, 0xfffffffffffffffe) 22:58:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000080)={'tunl0\x00', 0x0, 0x0, 0x7800, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @empty}}}}) 22:58:03 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0xe, r0, 0x0, 0x0) 22:58:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8942, &(0x7f00000000c0)={'gre0\x00', 0x0}) 22:58:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8923, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000380)=ANY=[]}) [ 392.198195] @: renamed from sit0 22:58:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), 0x55) 22:58:03 executing program 0: r0 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) 22:58:03 executing program 2: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xaf01, 0x0) 22:58:03 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x3, r0, 0x0, 0x0) request_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, r0) 22:58:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 22:58:03 executing program 5: pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000003, 0xffffffffffffffff) 22:58:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x1145}, 0x48) 22:58:03 executing program 1: r0 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) 22:58:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x1c, 0x2, 0x2, 0x3, 0x0, 0x0, {}, [@CTA_STATUS={0x8, 0x2}]}, 0x1c}}, 0x0) 22:58:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000480)={'batadv_slave_1\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', r1}, 0x48) 22:58:03 executing program 0: process_vm_writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/78, 0x4e}], 0x1, &(0x7f0000000580)=[{&(0x7f0000000180)=""/114, 0x72}, {0x0}], 0x2, 0x0) 22:58:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8919, &(0x7f00000000c0)={'gre0\x00', 0x0}) 22:58:03 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x0, 0x0, 0x0, 0x1202}, 0x48) 22:58:03 executing program 0: add_key$user(&(0x7f00000001c0), 0x0, 0x0, 0x2, 0x0) 22:58:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8904, &(0x7f0000000280)={'tunl0\x00', 0x0}) [ 392.462310] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 22:58:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x8970, 0x0) 22:58:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0xc0189436, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000340)={@empty, @loopback}}) 22:58:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5}, 0x48) 22:58:03 executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000240)={{}, {0x0, 0x989680}}, 0x0) 22:58:03 executing program 0: syslog(0x2, &(0x7f0000000080)=""/98, 0x62) 22:58:03 executing program 5: r0 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x6000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) 22:58:03 executing program 1: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x40049409, 0x0) 22:58:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfb}, 0xc) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfb}, 0xc) 22:58:03 executing program 4: request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='batadv_slave_1\x00', 0xfffffffffffffffb) 22:58:03 executing program 3: r0 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x2c81a904cf7c6118, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) 22:58:03 executing program 5: keyctl$KEYCTL_RESTRICT_KEYRING(0x3, 0x0, 0x0, 0x0) 22:58:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8905, 0x0) 22:58:03 executing program 2: socketpair(0x1, 0x801, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0, 0x4c}}, 0x8085) 22:58:03 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x15, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) 22:58:03 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xb, r0, 0x0) 22:58:03 executing program 1: syslog(0x3, &(0x7f0000000080)=""/74, 0x4a) 22:58:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$P9_RLOPEN(r0, 0x0, 0x0) 22:58:04 executing program 2: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) 22:58:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x5421, &(0x7f0000000380)={'sit0\x00', 0x0}) 22:58:04 executing program 5: socketpair(0x1, 0x801, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$caif(r0, &(0x7f0000000040), 0x18) 22:58:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x1c, 0x2, 0x1, 0x3, 0x0, 0x0, {}, [@CTA_STATUS={0x8, 0x2}]}, 0x1c}}, 0x0) 22:58:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'gre0\x00'}) 22:58:04 executing program 1: r0 = openat$rtc(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8004700d, 0x0) 22:58:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, r1, 0x421, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x0) 22:58:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000540)={'sit0\x00', &(0x7f0000000500)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}}) 22:58:04 executing program 2: keyctl$KEYCTL_RESTRICT_KEYRING(0xc, 0x0, &(0x7f0000000400)='encrypted\x00', 0x0) 22:58:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8953, &(0x7f00000000c0)={'gre0\x00', 0x0}) [ 393.526417] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 22:58:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0x0}) 22:58:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8971, &(0x7f00000000c0)={'gre0\x00', 0x0}) 22:58:04 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)=']\x00', 0x0) 22:58:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8937, &(0x7f00000000c0)={'gre0\x00', 0x0}) 22:58:04 executing program 4: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0189436, 0x0) 22:58:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8931, &(0x7f00000000c0)={'gre0\x00', 0x0}) 22:58:04 executing program 3: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x9, 0x0, r1) 22:58:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89a0, 0x0) 22:58:04 executing program 2: process_vm_writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/78, 0x4e}], 0x1, &(0x7f0000000580)=[{0x0}], 0x1, 0x0) 22:58:04 executing program 5: add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f00000002c0), &(0x7f0000000240)={0x0, "60969ff2efb8590c8db468fd5daaff0456aaca0c4d85495615a07a4faa26ef6dba2e4f0eb7edd336ec60a3dda1e4110ca06447ed57d767bc1caa6d12071b3b21"}, 0x48, 0xfffffffffffffffb) 22:58:04 executing program 1: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 22:58:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0xd, 0x6, 0x201}, 0x14}}, 0x0) 22:58:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0xa11}, 0x14}}, 0x0) 22:58:04 executing program 5: openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/sysvipc/msg\x00', 0x0, 0x0) 22:58:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x4020940d, &(0x7f0000000380)={'sit0\x00', 0x0}) 22:58:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 22:58:04 executing program 3: socket$unix(0x2, 0x3, 0x0) 22:58:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000040)={'gretap0\x00', 0x0, 0x7800, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1}}}}) 22:58:04 executing program 4: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0xfffffffffffffffa) 22:58:04 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs, 0x6e) 22:58:04 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000240)={{}, {0x0, 0x989680}}, &(0x7f0000000280)) 22:58:04 executing program 2: add_key$user(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) setresuid(0xee01, 0xffffffffffffffff, 0xffffffffffffffff) 22:58:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x3, r0, 0x0, 0x0) 22:58:04 executing program 4: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c82, 0x0) 22:58:04 executing program 2: add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="bc", 0x1, 0xfffffffffffffffb) 22:58:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x20000094}}, 0x0) 22:58:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8916, &(0x7f00000000c0)={'gre0\x00', 0x0}) 22:58:05 executing program 5: socketpair(0x1, 0x801, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000140)={'batadv_slave_1\x00'}) 22:58:05 executing program 4: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r1, 0xa}) 22:58:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000032c0)={&(0x7f0000003180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1}]}}, &(0x7f0000003200)=""/133, 0x26, 0x85, 0x1}, 0x20) 22:58:05 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, r0) 22:58:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r1, 0x421}, 0x14}}, 0x0) 22:58:05 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)='\a', 0x1, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x3, r1, 0x0, 0x0) 22:58:05 executing program 3: keyctl$KEYCTL_RESTRICT_KEYRING(0xe, 0x0, 0x0, 0x0) 22:58:05 executing program 4: r0 = openat$rtc(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x400c744d, 0x0) 22:58:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x1c}}, 0x0) 22:58:05 executing program 0: socketpair(0x1, 0x801, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0xfffffffffffffffe, 0x803e0000, &(0x7f0000000140)={0x0}}, 0x0) 22:58:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0xfffffdef}}, 0x0) 22:58:05 executing program 4: r0 = openat$procfs(0xffffff9c, &(0x7f0000000080)='/proc/consoles\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, 0x0) 22:58:05 executing program 2: socketpair(0x1, 0x801, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 22:58:05 executing program 3: socketpair(0x1, 0x801, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={0x0}, 0x300}, 0x0) 22:58:05 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x3, r0, 0x0, 0x0) 22:58:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8940, &(0x7f00000000c0)={'gre0\x00', 0x0}) 22:58:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfb, 0x10000}, 0xc) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x38, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x8000}, @NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x4}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}]}, 0x38}}, 0x0) 22:58:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x2}, 0x0) 22:58:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000200)=0x5084, 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r0) 22:58:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x6, 0x0, 0x0, @broadcast, @multicast2}}}}) 22:58:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x8927, &(0x7f0000000380)={'sit0\x00', 0x0}) 22:58:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x8993, &(0x7f0000000380)={'sit0\x00', 0x0}) 22:58:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8922, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000080)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @empty}}}}) 22:58:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000780)={&(0x7f0000000180), 0xc, &(0x7f0000000740)={&(0x7f00000001c0)={0xffffffffffffffc2, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR]}]}, 0x98}}, 0x0) 22:58:05 executing program 0: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000002c0)='.request_key_auth\x00', 0x0) 22:58:05 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000100)={0x0, "28b49b70c6666a561a5cb13ee105beb16af22af8813b6036ea1a5f2ffe6e0bc417899800be562e98df19b5208c45011c8374dd93b4b095a47649edf14ea38bd9"}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) 22:58:05 executing program 3: socket$unix(0x1, 0x3, 0x0) pselect6(0x1c, &(0x7f0000001140)={0x8}, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 22:58:05 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f00000002c0)) 22:58:05 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$unix(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [r0, r1]}}], 0x14}, 0x0) 22:58:05 executing program 1: r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000100)={0x0, "d4f2e5453c5d05cfa39b26b3b5dc64a041d8d67e1fe176502237f9645a105667f9340cc2bc3f34289dadafbc04136424d5c0de7bb8b12110e63c037679133b20"}, 0x48, r1) 22:58:05 executing program 0: setresuid(0xffffffffffffffff, 0xee00, 0xee00) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 22:58:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'tunl0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 22:58:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89b1, &(0x7f0000000380)={'sit0\x00', 0x0}) 22:58:05 executing program 4: pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xf9095d6c91cf86c8, 0xffffffffffffffff) 22:58:05 executing program 1: r0 = openat$ptp0(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0xc4c03d09, 0x0) 22:58:05 executing program 3: add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000640)='logon\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000680)='ss\xcb', 0x0) 22:58:05 executing program 0: migrate_pages(0xffffffffffffffff, 0xfff, &(0x7f0000000200), &(0x7f0000000240)=0x6) 22:58:05 executing program 5: socket(0x25, 0x3, 0x40) 22:58:05 executing program 4: r0 = openat$ptp0(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x80503d01, &(0x7f0000000240)) 22:58:05 executing program 1: socket$netlink(0x10, 0x3, 0x0) pselect6(0x40, &(0x7f0000001140)={0x8}, 0x0, 0x0, &(0x7f0000001f00)={0x0, 0x3938700}, 0x0) 22:58:05 executing program 3: r0 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000180)='$', 0x1, 0xfffffffffffffffe) keyctl$invalidate(0x15, r0) 22:58:05 executing program 2: keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000400)='encrypted\x00', 0x0) 22:58:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0xa11, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 22:58:05 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000001840)=[{{&(0x7f0000000000)=@abs={0x1}, 0x6e, &(0x7f0000000280)=[{0x0}, {&(0x7f00000000c0)="b9", 0x1}, {0x0}, {&(0x7f0000000200)='E', 0x1}], 0x4}}], 0x1, 0x0) 22:58:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f00000020c0)) 22:58:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) 22:58:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8912, &(0x7f0000000280)={'tunl0\x00', 0x0}) 22:58:05 executing program 1: add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f00000002c0)={'fscrypt:', @auto=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}, &(0x7f0000000240)={0x0, "60969ff2efb8590c8db468fd5daaff0456aaca0c4d85495615a07a4faa26ef6dba2e4f0eb7edd336ec60a3dda1e4110ca06447ed57d767bc1caa6d12071b3b21"}, 0x48, 0xfffffffffffffffb) 22:58:06 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000940)={0x2020}, 0x2020) 22:58:06 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r1}) add_key$keyring(&(0x7f0000000140), &(0x7f0000001b00)={'syz', 0x2}, 0x0, 0x0, r0) 22:58:06 executing program 0: pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x7, 0xffffffffffffffff) 22:58:06 executing program 4: r0 = socket$unix(0x1, 0x3, 0x0) sendto$unix(r0, &(0x7f0000000040)="c8", 0x1, 0x40, &(0x7f0000000140)=@abs={0x1}, 0x6e) 22:58:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1400}, 0x0) 22:58:06 executing program 2: migrate_pages(0x0, 0x7, 0x0, &(0x7f0000001c00)=0x5) 22:58:06 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000000540), 0xffffffffffffffff) socketpair(0x1, 0x801, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={0x0}, 0x300}, 0x0) 22:58:06 executing program 4: bind$netlink(0xffffffffffffffff, &(0x7f0000000000), 0xc) socket$unix(0x1, 0x3, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:58:06 executing program 3: r0 = openat$ptp0(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x2, 0x0) 22:58:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r0) r1 = request_key(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f00000002c0), r0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, 0x0, 0x20000000) keyctl$get_security(0x11, r1, &(0x7f0000000000)=""/20, 0x14) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000000540)={0x0, [], 0x0, "b02bd0be9ca7f7"}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, 0x0) 22:58:06 executing program 1: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000080)) 22:58:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, 0x2, 0x1, 0x3, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x4}]}, 0x18}}, 0x0) 22:58:06 executing program 4: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x402c5828, 0x0) 22:58:06 executing program 3: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000100)={0x0, "28b49b70c6666a561a5cb13ee105beb16af22af8813b6036ea1a5f2ffe6e0bc417899800be562e98df19b5208c45011c8374dd93b4b095a47649edf14ea38bd9"}, 0x48, 0xffffffffffffffff) 22:58:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x14, 0x2, 0x1, 0x3, 0x0, 0x0, {0x0, 0x6}}, 0x14}}, 0x0) 22:58:06 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="d0000000100003000000000000000000000000090800084000000003180001"], 0xd0}}, 0x0) 22:58:06 executing program 2: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) nanosleep(&(0x7f0000000040)={0x0, r0+10000000}, 0x0) 22:58:06 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_GET_TARGET(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0xfffffffffffffeff, 0x0, 0x0, 0x0, 0x0, {}, [""]}, 0x14}}, 0x0) [ 395.334643] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 22:58:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000180)={'gre0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="65727370616e30000000000000000000ff2d817d00b5"]}) 22:58:06 executing program 3: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() migrate_pages(r0, 0x7, &(0x7f0000001bc0)=0x8001, &(0x7f0000001c00)=0x5) 22:58:06 executing program 0: pselect6(0x1c, &(0x7f0000001140), 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 22:58:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x8922, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000340)={@empty, @loopback}}) 22:58:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000380)=ANY=[]}) 22:58:06 executing program 1: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)=@chain) [ 395.441761] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 395.466736] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.1'. [ 395.524313] sit0: mtu greater than device maximum 22:58:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/180, 0x28, 0xb4, 0x1}, 0x20) 22:58:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00', 0x0}) 22:58:06 executing program 5: openat$ptp0(0xffffff9c, &(0x7f0000000040), 0x6000, 0x0) 22:58:06 executing program 1: socketpair(0x1, 0x801, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000180)={0xfffffffffffffffe, 0x7, &(0x7f0000000140)={0x0}}, 0x0) 22:58:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000380)=ANY=[]}) 22:58:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000340)={@empty, @loopback, 0x0, 0xb}}) 22:58:06 executing program 4: r0 = openat$rtc(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4004700c, 0x1048) 22:58:06 executing program 5: keyctl$KEYCTL_RESTRICT_KEYRING(0xa, 0x0, &(0x7f0000000400)='encrypted\x00', &(0x7f0000000440)=@keyring) 22:58:06 executing program 1: pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) msync(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 22:58:06 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)=@keyring) 22:58:06 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}, 0x6e) 22:58:06 executing program 5: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x80000, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x5450, 0x0) 22:58:06 executing program 3: keyctl$KEYCTL_RESTRICT_KEYRING(0x14, 0x0, &(0x7f0000000400)='encrypted\x00', &(0x7f0000000440)=@keyring) 22:58:06 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000010c0)={0x14}, 0x14}}, 0x0) 22:58:06 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000047c0)={0x9, 0x3, &(0x7f0000004580)=@framed, &(0x7f00000045c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x7}, 0x80) 22:58:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x7ffe, 0x4) 22:58:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1f, 0x0, 0x1000000) 22:58:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x7, 0x0, 0x0, 0x6, 0x8, 0x1}, 0x48) 22:58:06 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001600)={0x0, 0x0, 0x8}, 0x10) 22:58:06 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @private0}, 0x1c) 22:58:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @local}}) 22:58:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x2c, 0x1, 0x2, 0x801, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @loopback}}}]}]}, 0x2c}}, 0x0) 22:58:07 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x7, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:07 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000047c0)={0x6, 0x5, &(0x7f0000004580)=@framed={{}, [@map_idx_val={0x18, 0x0, 0x6, 0x0, 0x1000000}]}, &(0x7f00000045c0)='GPL\x00', 0x2, 0xc9, &(0x7f0000004600)=""/201, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004780)}, 0x80) 22:58:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x88, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x470, 0x1c0, 0xd0, 0xffffffff, 0xd0, 0x1c0, 0x448, 0x448, 0xffffffff, 0x448, 0x448, 0x5, 0x0, {[{{@ipv6={@mcast2, @private1, [], [], 'netpci0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast2, @ipv6=@dev, @gre_key, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'rose0\x00', 'bridge0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@remote, @ipv4=@multicast1, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d0) 22:58:07 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, r0, 0x315, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) 22:58:07 executing program 3: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000400)=ANY=[], 0x268}, 0x0) 22:58:07 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x200003b8, 0xffffffff, 0x0, 0x1a0, 0xa0, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@ip={@private, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x338) 22:58:07 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x18, 0x0, 0x0) 22:58:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000000c0)=0x40, 0x4) 22:58:07 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0}}, 0x0) 22:58:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x38, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x470, 0x1c0, 0xd0, 0xffffffff, 0xd0, 0x1c0, 0x448, 0x448, 0xffffffff, 0x448, 0x448, 0x5, 0x0, {[{{@ipv6={@mcast2, @private1, [], [], 'netpci0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast2, @ipv6=@dev, @gre_key, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'rose0\x00', 'bridge0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@remote, @ipv4=@multicast1, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d0) 22:58:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000006500012000"/20, @ANYRES32], 0x24}}, 0x0) 22:58:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x0) 22:58:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x1000, 0x4) 22:58:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000380)={&(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c, 0x0}, 0x0) 22:58:07 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1a, 0x0, 0x0) 22:58:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000bc0)=@raw={'raw\x00', 0x9, 0x3, 0x400, 0x0, 0xffffffff, 0xffffffff, 0xf0, 0xffffffff, 0x330, 0xffffffff, 0xffffffff, 0x330, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@ipv6={@loopback, @dev, [], [], 'veth0_virt_wifi\x00', 'wg0\x00'}, 0x0, 0x208, 0x240, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@mcast2, @ipv4={'\x00', '\xff\xff', @empty}, @mcast2, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, @empty, @dev, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, @local, @loopback, @loopback, @local, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 22:58:07 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8924, &(0x7f0000000080)) 22:58:07 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x17, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x470, 0x1c0, 0xd0, 0xffffffff, 0xd0, 0x1c0, 0x448, 0x448, 0xffffffff, 0x448, 0x448, 0x5, 0x0, {[{{@ipv6={@mcast2, @private1, [], [], 'netpci0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast2, @ipv6=@dev, @gre_key, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'rose0\x00', 'bridge0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@remote, @ipv4=@multicast1, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d0) 22:58:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000340)=0x14, 0x4) 22:58:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000a40)={0x14, 0x3, 0x1, 0x701, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 22:58:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000042c0)={0x0, 0x0, &(0x7f0000004280)={0x0}}, 0x0) 22:58:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private0}, 0x1c) 22:58:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x7fffffe, 0x470, 0x1c0, 0xd0, 0xffffffff, 0xd0, 0x1c0, 0x448, 0x448, 0xffffffff, 0x448, 0x448, 0x5, 0x0, {[{{@ipv6={@mcast2, @private1, [], [], 'netpci0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast2, @ipv6=@dev, @gre_key, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'rose0\x00', 'bridge0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@remote, @ipv4=@multicast1, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d0) [ 396.516864] x_tables: duplicate underflow at hook 3 22:58:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000000c0)='\t', 0x1, 0x0, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) 22:58:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x140, 0x0, 0x0) 22:58:07 executing program 1: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x7fffffe, 0x2d8, 0xffffffff, 0x0, 0x1a0, 0xa0, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@ip={@private, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x338) 22:58:07 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0xc, 0x0, 0x0) 22:58:07 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r0, &(0x7f00000003c0)={'#! ', './file0'}, 0xb) 22:58:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000a40)={0x1c, 0x3, 0x1, 0x701, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 22:58:07 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) getsockopt$MRT(r0, 0x0, 0xce, 0x0, &(0x7f0000000100)) 22:58:07 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1600bd7d, 0x0, 0x0) 22:58:07 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff}) connect$vsock_stream(r0, 0x0, 0x0) 22:58:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x700}]}}, &(0x7f00000001c0)=""/205, 0x32, 0xcd, 0x1}, 0x20) 22:58:07 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r0, &(0x7f00000003c0)={'#! ', './file0', [], 0xa, "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"}, 0x1001) 22:58:09 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000047c0)={0x12, 0x3, &(0x7f0000004580)=@framed, &(0x7f00000045c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:09 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1600bd7d, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x2d8, 0xffffffff, 0x0, 0x1a0, 0xa0, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@ip={@private, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x338) 22:58:09 executing program 3: bpf$PROG_BIND_MAP(0x23, 0x0, 0x700) 22:58:09 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1600bd80, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x2d8, 0xffffffff, 0x0, 0x1a0, 0xa0, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@ip={@private, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x338) 22:58:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x88, 0x67, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x470, 0x1c0, 0xd0, 0xffffffff, 0xd0, 0x1c0, 0x448, 0x448, 0xffffffff, 0x448, 0x448, 0x5, 0x0, {[{{@ipv6={@mcast2, @private1, [], [], 'netpci0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast2, @ipv6=@dev, @gre_key, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'rose0\x00', 'bridge0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@remote, @ipv4=@multicast1, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d0) 22:58:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 22:58:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x8, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:09 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000900), 0x8) 22:58:09 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x5, &(0x7f00000005c0)=@raw=[@generic={0x5, 0x0, 0x0, 0xfd61}, @ldst, @exit, @map_idx_val], &(0x7f0000000640)='syzkaller\x00', 0x1, 0xac, &(0x7f0000000680)=""/172, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:09 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x540, 0x1c0, 0xd0, 0xffffffff, 0xd0, 0x1c0, 0x448, 0x448, 0xffffffff, 0x448, 0x448, 0x5, 0x0, {[{{@ipv6={@mcast2, @private1, [], [], 'netpci0\x00', 'veth1_to_team\x00'}, 0x0, 0x500, 0x128}, @common=@inet=@TCPMSS}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast2, @ipv6=@dev, @gre_key, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'rose0\x00', 'bridge0\x00'}, 0x0, 0x120, 0x168, 0x0, {}, [@common=@srh={{0x30}}, @common=@dst={{0x48}}]}, @unspec=@DNAT1={0x7e, 'DNAT\x00', 0x1, {0x0, @ipv4=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0, 0x0, {}, [@common=@frag]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@remote, @ipv4=@multicast1, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5d4) 22:58:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000000)=0x730, 0x4) 22:58:09 executing program 1: socket$inet(0x2, 0x0, 0x66fe) 22:58:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f0000000000)=0x7, 0x4) 22:58:09 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x268}, 0x0) 22:58:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="240000006600010000965ceac5557324d9"], 0x24}}, 0x0) 22:58:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x7, 0x4) 22:58:09 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000047c0)={0x12, 0x3, &(0x7f0000004580)=@framed, &(0x7f00000045c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:09 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0x10) 22:58:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, 0xfffffffffffffffc, &(0x7f0000000040)) 22:58:09 executing program 0: bpf$PROG_BIND_MAP(0x8, 0x0, 0x0) 22:58:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) 22:58:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000005e80)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f0000004e80)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 22:58:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) 22:58:09 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r0, 0x0, 0x0) 22:58:09 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=@base={0x5, 0x2, 0xa00, 0x8}, 0x48) 22:58:09 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000047c0)={0x12, 0x3, &(0x7f0000004580)=@framed, &(0x7f00000045c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:09 executing program 5: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x23, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x2d8, 0xffffffff, 0x0, 0x1a0, 0xa0, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@ip={@private, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x338) 22:58:09 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000047c0)={0x4, 0x3, &(0x7f0000004580)=@framed, &(0x7f00000045c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x40, 0x4) 22:58:09 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) accept4$vsock_stream(r0, 0x0, 0x0, 0x400) 22:58:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000100)=0xe, 0x4) 22:58:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x38, 0x1, 0x2, 0x101, 0x0, 0x0, {0x2}, [@CTA_EXPECT_MASTER={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}]}, 0x38}}, 0x0) 22:58:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x20, 0x17, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}}, 0x0) 22:58:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{}, "faa3b416987da844", "e0fde3fbe5919bde8fe10cdef33aaa37", "2fa4ca51", "d90bd3dbd82a612a"}, 0x28) setsockopt$inet6_tcp_int(r0, 0x6, 0x3, &(0x7f0000000000), 0x4) 22:58:09 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003b00)={0x6, 0x1, &(0x7f00000036c0)=@raw=[@alu], &(0x7f0000003740)='syzkaller\x00', 0x0, 0xce, &(0x7f0000003780)=""/206, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 22:58:09 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000280)={'vxcan0\x00'}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3002, 0x0, 0x12, r0, 0x0) 22:58:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x37820e8a, 0x4) 22:58:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x18, 0x4, &(0x7f00000001c0)=@framed={{}, [@jmp]}, &(0x7f0000000200)='GPL\x00', 0x7, 0x9a, &(0x7f0000000240)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:10 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0x10}, 0x10}}, 0x0) 22:58:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000005500)=[{{0x0, 0x0, &(0x7f0000000700)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) 22:58:10 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x22, 0x0, 0x0) 22:58:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x39, 0x0, 0x0) 22:58:10 executing program 5: bpf$PROG_BIND_MAP(0x23, 0x0, 0x9000) 22:58:10 executing program 2: pipe(&(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 22:58:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, 0xd, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 22:58:10 executing program 0: socket$inet(0x2, 0x1, 0x40) 22:58:10 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xb, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3}, 0x48) 22:58:10 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0}, 0x48) 22:58:10 executing program 3: r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x9, 0x3, 0x400, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x330, 0xffffffff, 0xffffffff, 0x330, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xd0, 0x1f8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:dhcpd_var_run_t:s0\x00'}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @mcast1, [], [], 'lo\x00', 'veth1_macvtap\x00'}, 0x0, 0xd0, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 22:58:10 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001680)={0x6, 0x4, &(0x7f0000000540)=@framed={{}, [@generic={0x6, 0x0, 0x0, 0x30b1}]}, &(0x7f0000000580)='syzkaller\x00', 0x1, 0x1000, &(0x7f00000005c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:10 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001680)={0x6, 0x4, &(0x7f0000000540)=@framed={{}, [@generic]}, &(0x7f0000000580)='syzkaller\x00', 0x1, 0x1000, &(0x7f00000005c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x8, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x470, 0x1c0, 0xd0, 0xffffffff, 0xd0, 0x1c0, 0x448, 0x448, 0xffffffff, 0x448, 0x448, 0x5, 0x0, {[{{@ipv6={@mcast2, @private1, [], [], 'netpci0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast2, @ipv6=@dev, @gre_key, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'rose0\x00', 'bridge0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@remote, @ipv4=@multicast1, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d0) 22:58:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x34}}, 0x0) 22:58:10 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x5, 0x0, 0x0, 0x3f}, 0x48) [ 399.386086] x_tables: duplicate underflow at hook 3 22:58:10 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x24, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x2d8, 0xffffffff, 0x0, 0x1a0, 0xa0, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@ip={@private, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x338) 22:58:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockname(r0, &(0x7f0000000180)=@l2tp6={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x80) 22:58:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000200)=0x9, 0x4) 22:58:10 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000280)=@raw=[@func], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:10 executing program 0: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, r0, 0x315, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x1c}}, 0x0) 22:58:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4a, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x470, 0x1c0, 0xd0, 0xffffffff, 0xd0, 0x1c0, 0x448, 0x448, 0xffffffff, 0x448, 0x448, 0x5, 0x0, {[{{@ipv6={@mcast2, @private1, [], [], 'netpci0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast2, @ipv6=@dev, @gre_key, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'rose0\x00', 'bridge0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@remote, @ipv4=@multicast1, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d0) 22:58:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000006000)={'wg1\x00'}) 22:58:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@newtclass={0x2c, 0x28, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x6}]}, 0x2c}}, 0x0) 22:58:10 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000047c0)={0xe, 0x3, &(0x7f0000004580)=@framed, &(0x7f00000045c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:10 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x2d8, 0xffffffff, 0x0, 0x1a0, 0xa0, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@ip={@private, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'veth0_to_team\x00', {}, {}, 0x0, 0x0, 0xa0}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x338) 22:58:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000bc0)=@raw={'raw\x00', 0x9, 0x3, 0x400, 0x0, 0xffffffff, 0xffffffff, 0xf0, 0xffffffff, 0x330, 0xffffffff, 0xffffffff, 0x330, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@ipv6={@loopback, @dev, [], [], 'veth0_virt_wifi\x00', 'wg0\x00', {}, {}, 0x3c}, 0x0, 0x208, 0x240, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@mcast2, @ipv4={'\x00', '\xff\xff', @empty}, @mcast2, @ipv4={'\x00', '\xff\xff', @local}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, @empty, @dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, @local, @loopback, @loopback, @local, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x460) 22:58:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x4c, r1, 0x1, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0x7fff, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6}}]}, 0x4c}}, 0x0) 22:58:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6cb, &(0x7f00000000c0)=0x40, 0x4) 22:58:10 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[], 0x268}, 0x0) 22:58:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x10, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x48) 22:58:10 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001340)=@base={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) [ 399.707551] x_tables: duplicate underflow at hook 3 22:58:10 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1600bd80, 0x0, 0x0) 22:58:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000002340), 0xffffffffffffffff) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000002400)={&(0x7f0000002300), 0xc, &(0x7f00000023c0)={&(0x7f0000002380)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HOP_PENALTY={0x5}]}, 0x1c}}, 0x0) [ 399.737836] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 22:58:10 executing program 2: bpf$OBJ_GET_PROG(0x9, &(0x7f0000000180)={0x0, 0x10}, 0x7d1) 22:58:10 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x80) 22:58:10 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x17, 0x0, 0x0, 0x101, 0x0, 0x1}, 0x48) 22:58:10 executing program 5: syz_genetlink_get_family_id$team(&(0x7f0000000380), 0xffffffffffffffff) 22:58:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)=@getqdisc={0x24, 0x26, 0x1}, 0x24}}, 0x0) 22:58:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x25, &(0x7f00000000c0)=0x40, 0x4) 22:58:10 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000047c0)={0x12, 0x3, &(0x7f0000004580)=@framed, &(0x7f00000045c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7}, 0x80) 22:58:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5411, &(0x7f0000000080)) 22:58:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=@getqdisc={0x24, 0x26, 0xa79d4b7e66727383}, 0x24}}, 0x0) 22:58:10 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x9, &(0x7f0000000180)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:10 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x8c77fffe8d2ecfb0, 0x4, &(0x7f0000000700)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000400)={0x1e4, 0x1, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_HELP_NAME={0xf, 0x6, 'tftp-20000\x00'}, @CTA_EXPECT_TUPLE={0x6c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_EXPECT_TIMEOUT={0x8}, @CTA_EXPECT_ID={0x59}, @CTA_EXPECT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_EXPECT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x3}, @CTA_EXPECT_TUPLE={0x48, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_NAT={0x70, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x48, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @loopback}}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x4}, @CTA_EXPECT_NAT_TUPLE={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_FLAGS={0x8}]}, 0x1e4}}, 0x0) 22:58:10 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x89e0, 0x0) 22:58:11 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000002c80)=@base={0x19, 0x0, 0x0, 0xab48, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 22:58:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, r1, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 22:58:11 executing program 5: bpf$PROG_BIND_MAP(0x21, 0x0, 0x0) 22:58:11 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000047c0)={0x12, 0x3, &(0x7f0000004580)=@framed, &(0x7f00000045c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 400.106430] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 22:58:11 executing program 0: bpf$PROG_BIND_MAP(0x9, 0x0, 0x0) 22:58:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3e, 0x0, 0x0) 22:58:11 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000400)={0x1e4, 0x1, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_HELP_NAME={0xf, 0x6, 'tftp-20000\x00'}, @CTA_EXPECT_TUPLE={0x6c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_EXPECT_TIMEOUT={0x8}, @CTA_EXPECT_ID={0x59}, @CTA_EXPECT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_EXPECT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}]}, @CTA_EXPECT_ZONE={0x6}, @CTA_EXPECT_TUPLE={0x48, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_NAT={0x70, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x48, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @loopback}}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x4}, @CTA_EXPECT_NAT_TUPLE={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_FLAGS={0x8}]}, 0x1e4}}, 0x0) 22:58:11 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x19, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x2d8, 0xffffffff, 0x0, 0x1a0, 0xa0, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@ip={@private, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x338) 22:58:11 executing program 5: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x22, &(0x7f0000000080)=@security={'security\x00', 0xe, 0x4, 0x2d8, 0xffffffff, 0x0, 0x1a0, 0xa0, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@ip={@private, @rand_addr, 0x0, 0x0, 'gretap0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x338) 22:58:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="d0000000010203000000000000000000000000090800084000000003180001"], 0xd0}}, 0x0) 22:58:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000002200), r0) 22:58:11 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x32, 0x0, 0x0) 22:58:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=@base={0x15}, 0x48) 22:58:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x38, 0x1, 0x2, 0x101, 0x0, 0x0, {0x2}, [@CTA_EXPECT_MASTER={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}]}, 0x38}}, 0x0) [ 400.282583] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 400.321561] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.1'. 22:58:11 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000000)={0x0}, 0x94) 22:58:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1c, 0x0, 0x0) 22:58:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000080)={'vlan1\x00', 0x0}) [ 400.368054] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 22:58:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001800)=ANY=[@ANYBLOB="9feb0100180000000000000044000000440000000c"], &(0x7f0000000280)=""/4096, 0x68, 0x1000, 0x1}, 0x20) 22:58:11 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1600bd78, 0x0, 0x0) 22:58:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)={0x20, r1, 0x1, 0x0, 0x0, {0x3}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 22:58:11 executing program 5: mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x58033bbc40ad8537, 0xffffffffffffffff, 0x0) 22:58:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) 22:58:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000004400)={0x0, 0x0, &(0x7f0000003f00)=[{&(0x7f0000000640)={0x18, 0x26, 0x821, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@empty}]}, 0x18}], 0x1}, 0x0) 22:58:11 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x16, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x470, 0x1c0, 0xd0, 0xffffffff, 0xd0, 0x1c0, 0x448, 0x448, 0xffffffff, 0x448, 0x448, 0x5, 0x0, {[{{@ipv6={@mcast2, @private1, [], [], 'netpci0\x00', 'veth1_to_team\x00'}, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast2, @ipv6=@dev, @gre_key, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'rose0\x00', 'bridge0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@remote, @ipv4=@multicast1, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d0) 22:58:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000002340), 0xffffffffffffffff) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000002400)={&(0x7f0000002300), 0xc, &(0x7f00000023c0)={&(0x7f0000002380)={0x24, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HOP_PENALTY={0x5}, @BATADV_ATTR_VLANID={0x6}]}, 0x24}}, 0x0) 22:58:11 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000005500)=[{{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @private1, 0xe1}, 0x1c, 0x0, 0x0, &(0x7f0000003200)=[@hopopts_2292={{0x18}}, @hopopts_2292={{0x18}}], 0x30}}], 0x1, 0x0) 22:58:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0)=0x7, 0x4) 22:58:11 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg$unix(r0, &(0x7f00000015c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x5421, &(0x7f0000000100)) 22:58:11 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000000c80), 0x0, 0x4000) 22:58:11 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_STATFS(r0, 0x0, 0x45) 22:58:11 executing program 4: mq_open(&(0x7f0000000000)='^}\x00', 0x841, 0xa0, &(0x7f0000000040)) 22:58:11 executing program 5: openat$random(0xffffffffffffff9c, &(0x7f0000000140), 0x68282, 0x0) 22:58:11 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_LK(r0, 0x0, 0x0) 22:58:11 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000200)=0x8) 22:58:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2e, 0x0, 0x0) 22:58:11 executing program 5: pipe2(&(0x7f0000004340)={0xffffffffffffffff}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) 22:58:11 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 22:58:11 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, 0x0, 0xfffffffffffffd52, 0x0) 22:58:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x10, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 22:58:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x1, 0x0, 0x0, {{0x6}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 22:58:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000046c0)={0x0, 0x0, &(0x7f0000004680)={&(0x7f0000000100)=ANY=[@ANYBLOB='0\x00\x00\x00h\x00', @ANYRES32, @ANYBLOB="00000000000004"], 0x30}}, 0x0) 22:58:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x28}}, 0x0) 22:58:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000046c0)={0x0, 0x0, &(0x7f0000004680)={&(0x7f0000000100)=@delchain={0x24, 0x65, 0x1}, 0x24}}, 0x0) 22:58:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001a00)={0x0, 0x0, &(0x7f00000019c0)={&(0x7f0000000200)={0x14}, 0x7ffff000}}, 0x0) 22:58:12 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000480)={&(0x7f0000000000), 0xc, &(0x7f0000000440)={0x0}}, 0x0) 22:58:12 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000180)=@framed={{}, [@ldst={0x1}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0xf3, &(0x7f0000000200)=""/243, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MCAST_RATE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 22:58:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000080)='\'', 0x1) 22:58:12 executing program 5: r0 = socket(0x2, 0x2, 0x1) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 22:58:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x28}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) [ 401.656335] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 22:58:12 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x7, 0xc0, &(0x7f00000000c0)=""/192, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MCAST_RATE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x6}, @void}}}, 0x1c}}, 0x0) 22:58:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) 22:58:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x1, 0x0, 0x0, {{0x5}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 22:58:12 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141440080002007f0020010c00028005000100000000001c002280080003400000000008000140000000000800024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000002000080007"], 0x80}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[], 0x208e24b) bind$netlink(r2, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x11, r3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000100)=0x3, 0x4) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) [ 401.786703] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 22:58:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0xa}]}, 0x24}}, 0x0) 22:58:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 22:58:12 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @local=0x7}, 0x10) 22:58:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x1, 0x0, 0x0, {{0x7}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 22:58:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MCAST_RATE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {{0x1b}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 22:58:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'syzkaller0\x00'}]}, 0x28}}, 0x0) 22:58:12 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) [ 401.938423] ------------[ cut here ]------------ [ 401.958054] wlan1: Failed check-sdata-in-driver check, flags: 0x4 [ 401.993087] WARNING: CPU: 0 PID: 21871 at net/mac80211/driver-ops.h:17 ieee80211_bss_info_change_notify+0x824/0x920 [ 402.003709] Kernel panic - not syncing: panic_on_warn set ... [ 402.003709] [ 402.011081] CPU: 0 PID: 21871 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 402.018960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 402.028309] Call Trace: [ 402.030903] dump_stack+0x1fc/0x2ef [ 402.034541] panic+0x26a/0x50e [ 402.037741] ? __warn_printk+0xf3/0xf3 [ 402.041638] ? ieee80211_bss_info_change_notify+0x824/0x920 [ 402.047358] ? __probe_kernel_read+0x130/0x1b0 [ 402.051953] ? __warn.cold+0x5/0x5a [ 402.055583] ? ieee80211_bss_info_change_notify+0x824/0x920 [ 402.061295] __warn.cold+0x20/0x5a [ 402.064842] ? ieee80211_bss_info_change_notify+0x824/0x920 [ 402.070562] report_bug+0x262/0x2b0 [ 402.074201] do_error_trap+0x1d7/0x310 [ 402.078093] ? math_error+0x310/0x310 [ 402.081899] ? __irq_work_queue_local+0x101/0x160 [ 402.086750] ? irq_work_queue+0x29/0x80 [ 402.090735] ? error_entry+0x72/0xd0 [ 402.094458] ? trace_hardirqs_off_caller+0x6e/0x210 [ 402.099496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 402.104347] invalid_op+0x14/0x20 [ 402.107805] RIP: 0010:ieee80211_bss_info_change_notify+0x824/0x920 [ 402.114123] Code: 00 00 48 8b ab 28 05 00 00 48 85 ed 74 53 e8 53 1e cd f9 e8 4e 1e cd f9 44 89 fa 48 89 ee 48 c7 c7 c0 3f 67 89 e8 21 56 5d 00 <0f> 0b e9 19 f9 ff ff e8 30 1e cd f9 0f 0b e9 0a fb ff ff e8 24 1e [ 402.133018] RSP: 0018:ffff88809caff600 EFLAGS: 00010282 [ 402.138369] RAX: 0000000000000000 RBX: ffff888042fa5240 RCX: 0000000000000000 [ 402.145623] RDX: 0000000000019298 RSI: ffffffff814dff01 RDI: ffffed101395feb2 [ 402.152871] RBP: ffff888042fa4740 R08: 0000000000000001 R09: 0000000000000000 [ 402.160119] R10: 0000000000000005 R11: 0000000000000000 R12: 0000000002000000 [ 402.167369] R13: ffff888042fa61f8 R14: 0000000000000000 R15: 0000000000000004 [ 402.174639] ? vprintk_func+0x81/0x180 [ 402.178517] ieee80211_set_mcast_rate+0x37/0x40 [ 402.183167] ? ieee80211_set_wds_peer+0x30/0x30 [ 402.187817] nl80211_set_mcast_rate+0x355/0x930 [ 402.192467] ? nl80211_set_bss+0xf50/0xf50 [ 402.196692] ? nl80211_pre_doit+0xa2/0x620 [ 402.200908] ? __cfg80211_rdev_from_attrs+0x700/0x700 [ 402.206080] genl_family_rcv_msg+0x642/0xc40 [ 402.210471] ? genl_rcv+0x40/0x40 [ 402.213903] ? genl_rcv_msg+0x12f/0x160 [ 402.217855] ? mutex_trylock+0x1a0/0x1a0 [ 402.221904] ? __radix_tree_lookup+0x216/0x370 [ 402.226469] genl_rcv_msg+0xbf/0x160 [ 402.230167] netlink_rcv_skb+0x160/0x440 [ 402.234233] ? genl_family_rcv_msg+0xc40/0xc40 [ 402.238796] ? netlink_ack+0xae0/0xae0 [ 402.242663] ? genl_rcv+0x15/0x40 [ 402.246100] genl_rcv+0x24/0x40 [ 402.249358] netlink_unicast+0x4d5/0x690 [ 402.253402] ? netlink_sendskb+0x110/0x110 [ 402.257618] ? _copy_from_iter_full+0x229/0x7c0 [ 402.262266] ? __phys_addr_symbol+0x2c/0x70 [ 402.266573] ? __check_object_size+0x17b/0x3e0 [ 402.271156] netlink_sendmsg+0x6c3/0xc50 [ 402.275213] ? aa_af_perm+0x230/0x230 [ 402.279012] ? nlmsg_notify+0x1f0/0x1f0 [ 402.282972] ? kernel_recvmsg+0x220/0x220 [ 402.287113] ? nlmsg_notify+0x1f0/0x1f0 [ 402.291069] sock_sendmsg+0xc3/0x120 [ 402.294765] ___sys_sendmsg+0x7bb/0x8e0 [ 402.298719] ? copy_msghdr_from_user+0x440/0x440 [ 402.303458] ? __fget+0x32f/0x510 [ 402.306893] ? lock_downgrade+0x720/0x720 [ 402.311021] ? check_preemption_disabled+0x41/0x280 [ 402.316019] ? check_preemption_disabled+0x41/0x280 [ 402.321015] ? __fget+0x356/0x510 [ 402.324449] ? do_dup2+0x450/0x450 [ 402.327970] ? lock_downgrade+0x720/0x720 [ 402.332096] ? check_preemption_disabled+0x41/0x280 [ 402.337098] ? __fdget+0x1d0/0x230 [ 402.340619] __x64_sys_sendmsg+0x132/0x220 [ 402.344833] ? __sys_sendmsg+0x1b0/0x1b0 [ 402.348876] ? __se_sys_futex+0x298/0x3b0 [ 402.353010] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 402.358359] ? trace_hardirqs_off_caller+0x6e/0x210 [ 402.363395] ? do_syscall_64+0x21/0x620 [ 402.367354] do_syscall_64+0xf9/0x620 [ 402.371144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.376314] RIP: 0033:0x7fe05dcf10d9 [ 402.380009] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 402.398889] RSP: 002b:00007fe05c263168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 402.406586] RAX: ffffffffffffffda RBX: 00007fe05de10f80 RCX: 00007fe05dcf10d9 [ 402.413845] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 402.421102] RBP: 00007fe05dd4cae9 R08: 0000000000000000 R09: 0000000000000000 [ 402.428366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 402.435616] R13: 00007ffd4cfd2a1f R14: 00007fe05c263300 R15: 0000000000022000 [ 402.443402] Kernel Offset: disabled [ 402.447128] Rebooting in 86400 seconds..