fffffffff, 0x0, 0x29, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r0, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r3 = dup3(r2, r1, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) 06:11:44 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x12) 06:11:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:44 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r1, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:44 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x13) 06:11:44 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r1, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x900000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:11:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:45 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:45 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r1, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:45 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x14) 06:11:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) fcntl$setflags(r0, 0x2, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfffffffffffff401, 0x200) 06:11:45 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:45 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x15) 06:11:45 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:45 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x16) 06:11:45 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x1000000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:11:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:46 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:46 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x17) 06:11:46 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000000), 0x4) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r5 = getpgrp(0xffffffffffffffff) kcmp(r4, r5, 0x3, r3, r3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) 06:11:46 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x18) 06:11:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x01\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:46 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:46 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:46 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x19) 06:11:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x8}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:11:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:47 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x1a) 06:11:47 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:47 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000300)='/dev/bus/usb/00#/00#\x00', 0x8, 0x2000) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x100003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) memfd_create(&(0x7f0000000380)='/dev/hwrng\x00', 0x3) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000002c0)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) read(r1, &(0x7f0000000440)=""/153, 0x99) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x1f, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r4 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) keyctl$clear(0x7, r4) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) ioctl$VIDIOC_G_FMT(r2, 0xc0cc5604, &(0x7f00000001c0)={0x8, @pix={0x1, 0x3, 0x32315659, 0x5, 0x40, 0x9, 0xb, 0x2, 0x1, 0x7, 0x1, 0x6}}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x100, 0x0) 06:11:47 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x1b) 06:11:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:47 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:47 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x1c) 06:11:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:11:48 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:48 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x1d) 06:11:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:48 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r0, &(0x7f00000001c0)="5f292ed742e1f0555ae1afa9b4bc45c7866f90b58c48583695a12a81cb511e5556a8b8f774f19ae7af987776e76a414e9846fc707028884f7352640f169e1e02dd5d2e8b57", 0x45, 0x1, &(0x7f0000000000)={0xa, 0x4e23, 0x2, @local, 0x4}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write(r4, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0x57, "41bd546744cd28678435e162ac90d58042210a4d20266bedf5238c343720c271afef9a6a13b33b0fb38e51fde38f4047a2e12c48051158e0e7bd99640842054656c9efb70695943d23149891c36f596dd7b473ffa64e31"}, &(0x7f0000000100)=0x5f) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000002c0)={r5, 0x2, 0xb1, "c413056a18796b080d62834f69794efcd17e804a26c393507a7037a7582e6023ecfcc2631c2ff2c9981492f9c2bb89b974ca443ca9da268a9603e6321ba44f4b85124bdd14f5b35848c283684358c29d3d64485eb11d9e15369ba0255dfdc83a0fde0ce29996de515e44d8c989628036c2dc98102929c73242abcadaefcf0fe9a0d93ef47b34dafa63f5b70c73dacb00c9ac179eac95ec47aef1b9dee64c21982c3623048f55b824becbfa1cc334da9600"}, 0xb9) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r3, &(0x7f0000000000), 0x0, 0x0) 06:11:48 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x1e) 06:11:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:48 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:48 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x21) 06:11:49 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x10}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:11:49 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01`\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:49 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x22) 06:11:49 executing program 0: pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:49 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x234}, 0x1, 0x0, 0x0, 0x1}, 0x80d0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x440000, 0x0) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) 06:11:49 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x23) 06:11:49 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:49 executing program 0: pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:49 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x2a) 06:11:49 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x900}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:11:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:50 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x2b) 06:11:50 executing program 0: pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:50 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:50 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000001c0)="4563b242b114797d8a936a847f5dc5e89d56b9d2758d7911087b27b06d6db0dcac0f4c5cc645af5aa017a032382366d1991af0f05bd18a4c3cd630b4522dc74669af9245362adee57038d9d2068a441ddbec993341d270327bab5ae6bfd9ff5a359e83c1089991b646267214ad10cfabc5acebbf84438db783b2cf29b17a24b016fb1a3bfa39f3b4bf2cae3c7d00d974cd1d36da7ca1d70c1c407ce7d69190b9aaff7f5016b30bcc0e0da51fbbc881d636b4af4becb6cc03a111c8f1ba913ebb4947844b3d5524ee8a919e9632393143c91f9d4cfafc460733cdcb6a13a2a6fc1e879a7c54794883d5ce147794eec94382160bae99938fbded7dfd19df38c7ac") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) 06:11:50 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x2c) 06:11:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:50 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:50 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x0, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:50 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x0, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:50 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x2d) 06:11:51 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x1000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:11:51 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x2e) 06:11:51 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x0, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0xa, &(0x7f00000000c0)={0x0, 0x0, 0x100000000000000, 0x1ed0fe66, 0x9}, 0x0, &(0x7f0000000140)={0x1b5, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000000)=0x6) 06:11:51 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x2f) 06:11:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:51 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:51 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:51 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:51 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x30) 06:11:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:51 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x8000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:11:52 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:52 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x31) 06:11:52 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = perf_event_open(&(0x7f0000000280)={0x6, 0x70, 0x3, 0x7ff, 0x0, 0x100, 0x0, 0x4, 0x8000, 0x1, 0x8, 0x4, 0x8000, 0x4, 0x1, 0x3, 0x0, 0x9, 0xffffffffffffffcf, 0x1f, 0x4, 0x5, 0x5, 0xca1, 0xfff, 0x8, 0x7, 0x9, 0xdbc0, 0x40, 0x10001, 0x4, 0xffff, 0x68, 0x400, 0x80000000, 0x1, 0x3f0, 0x0, 0x5, 0x4, @perf_config_ext={0x8, 0x9}, 0x0, 0xdfb, 0x9, 0xd, 0x8, 0x7fff, 0x1ff}, 0x0, 0x1, r0, 0x1) writev(r4, &(0x7f0000001900)=[{&(0x7f0000000300)="6f6a0fba063c974c3bd0b0d0db883a81eb83d07c041ad8ca964b2feabde6ac674534c62478926885d084061bb853eac78570482b92207b95710de928fda6b7a23e45c82a4dbe7d9f73b5acb855cdffa1f020a7ec5aaea4f965987d3a06b03ea40b00fe80cca18c7b45becb9d3421c55f9fca05eb4c2bf8c800189dcf38639cf3977a3f036dbcc98073ffa0f7e0e1", 0x8e}, {&(0x7f0000001480)="35d3f461a0c39140e18e1174cee544c6cf968fc080c8f8d2fa6c03668a0a62f7443862f486c6945410d6c969d665bf6d55d3b04a3df05950be273dfa86a55a0fa8a2e236e73758f93a19afc967529a2de2da03ae1fd854a58e", 0x59}, {&(0x7f0000001500)="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", 0xfc}, {&(0x7f0000001600)="6317984c974700f68d9fddea15f0502bc785cd88adb9c9b42a5b3484a303471038b7bd8ac79f850aff1a4a4226c6ded3c221c6f504e3a832c57fa3be9deb5372b4b77989639d0feebf24f240379be3e7bf49c23509792c613c79547b89cfa2ecac21a3b639d6721b3da3e4e742bb0a8dd935396233fb9244f496ad3d991f4aa1156841b3fe663efa473b5bb4b9885fa554e325dcd8702d1904a0b7", 0x9b}, {&(0x7f00000016c0)="ad1663bc73ee0b382a8b223dde229736ccddddb6a8bd5968561dd8261d2db0fb4091b99144965657b67a5c3f421f6271dcfd817dc7a646a5eeb344b33ccc3610d7698b6c2624248eddbf869fa950f55c9669b53aa52bed0c0aad3b12668bd09030ea779cb837ab81e3f43d0dff2f70cc1e8f69495c5e1b2ed7c1765598b0e581f4b6b6d1e8c4cde61bbe3bf0ef899579ccb1e69e762bdf9a4fcf48ef739b004d04d85a687cd59ea6c5de1afcd79df8b69a1cd90751a76b3da0bd0e987997cf", 0xbf}, {&(0x7f0000001780)="5cf41c5b2d83dd8a645f70d37e920aa140756f840544cbd8f2cfb31c01f89217e082be77f9cda8644409810c80a54042d5030bdfda9c29a28fff1ae4c51bfc27819144366031b28015c8342cc544f60d88cf3e9a8cc9c36eea03473bc7731d4488d17f9495961f557edbee8ca676886e52820cd9584c83190b7aae9a944ade14bc182070aee61725e56669f55f9520a915f30715231d909f093729f5f4d5939470354e4557bd27b32cf60cb4120c7cc28d1dd26802cb2f7e3cf7d7f3d1679d5cb1048e03cc03d1fe82fdcdddea1aeb9b7e3b2b71b73f41c29e8bceae4fc6cb6b", 0xe0}, {&(0x7f00000003c0)="44331f1998b55fc064d40be397d638de2a", 0x11}, {&(0x7f0000001880)="0f4c098b15a91452fd347253e9ef6c342e5deb838e881f293366297cca15f73807e598e413d7c5a24258fdff36238b4ecaf33c11d9e3dfcc5538a678c25aa1006de4e7", 0x43}], 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000440)={0x0, 0x1000, "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"}, &(0x7f0000000000)=0x1008) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f00000001c0)={r5, 0xa3, "2413d99ef05e41224c009722b0294524d0670603935af1143de6a4dc0d11ae3668ba469b5c273d244e1ea956916823b801bfdce8471a04c6cedc9448066ebc29efe952b200d1fbb4fa2acf284a15e02f6f528bad0653469279e0b0b2137c78a6a0b7ccaf272f9d17f9d85412073c6f285865681b3b19f2e7909d06bd791644de1f56b4aa3d247b2e83312bef02853044b919975f184c4218ccc08ec733cefd4fae4d11"}, &(0x7f0000000100)=0xab) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001940)='/dev/hwrng\x00', 0x80000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x65, &(0x7f0000001980)=[@in6={0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, [], 0x1d}, 0x11f}, @in6={0xa, 0x4e20, 0xffffffff, @ipv4={[], [], @rand_addr=0x1000}, 0xd3}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e22, @loopback}], 0x58) 06:11:52 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:52 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x32) 06:11:52 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:52 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:52 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x33) 06:11:52 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:52 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, 0x0, 0x0) 06:11:52 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x9000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:11:52 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, 0x0, 0x0) 06:11:52 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x400000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000300)={{0x1feb, 0x9b}, {0x0, 0xcc4}, 0x8, 0x1, 0x101}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) iopl(0x0) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={r3, @empty, @loopback}, 0xc) vmsplice(r1, &(0x7f00000002c0), 0x0, 0x4) write$apparmor_current(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030315e5e00e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e2d277070703169626465763a23002f6465762f616d6964692300e83779d80efa45bb7f48bebc95870bd0cd39bd2830ec895faf8da0f4d28e17f74e6a3dc250ee47afe7b33fc778bde252c50d2e"], 0x7f) 06:11:53 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x35) 06:11:53 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r0, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r3 = dup3(r2, r1, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) 06:11:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:53 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, 0x0, 0x0) 06:11:53 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x36) 06:11:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01`\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:53 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:53 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r0, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r3 = dup3(r2, r1, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) [ 1945.993780][ T1414] net_ratelimit: 3 callbacks suppressed [ 1945.993790][ T1414] dccp_close: ABORT with 1 bytes unread 06:11:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x10000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:11:53 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x37) 06:11:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 06:11:54 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r0, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r3 = dup3(r2, r1, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) 06:11:54 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:54 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x38) 06:11:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:54 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x39) 06:11:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:54 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) [ 1946.707169][ T1438] dccp_close: ABORT with 1 bytes unread 06:11:54 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x3a) 06:11:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x1000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:11:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000200)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r2, r1}}, 0x18) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 06:11:54 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x3b) 06:11:54 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:54 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:54 executing program 2 (fault-call:7 fault-nth:0): r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) [ 1947.518701][ T1476] FAULT_INJECTION: forcing a failure. [ 1947.518701][ T1476] name failslab, interval 1, probability 0, space 0, times 0 [ 1947.551006][ T1476] CPU: 0 PID: 1476 Comm: syz-executor.2 Not tainted 5.1.0+ #3 [ 1947.558535][ T1476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 06:11:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) [ 1947.569131][ T1476] Call Trace: [ 1947.572450][ T1476] dump_stack+0x172/0x1f0 [ 1947.576806][ T1476] should_fail.cold+0xa/0x15 [ 1947.581423][ T1476] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1947.587283][ T1476] __should_failslab+0x121/0x190 [ 1947.592238][ T1476] should_failslab+0x9/0x14 [ 1947.596764][ T1476] kmem_cache_alloc_node+0x56/0x710 [ 1947.601976][ T1476] ? inet6_sk_rebuild_header+0x14d/0xcd0 [ 1947.607617][ T1476] __alloc_skb+0xd5/0x5e0 [ 1947.611940][ T1476] ? skb_trim+0x190/0x190 06:11:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) [ 1947.611964][ T1476] sock_wmalloc+0xd9/0x120 [ 1947.611983][ T1476] dccp_send_reset+0xf8/0x2b0 [ 1947.611999][ T1476] dccp_disconnect+0x6b3/0xb10 [ 1947.612021][ T1476] __inet_stream_connect+0x239/0xea0 [ 1947.635532][ T1476] ? mark_held_locks+0xa4/0xf0 [ 1947.640307][ T1476] ? inet_dgram_connect+0x2e0/0x2e0 [ 1947.645510][ T1476] ? lock_sock_nested+0x9a/0x120 [ 1947.650458][ T1476] ? trace_hardirqs_on+0x67/0x230 [ 1947.655494][ T1476] ? lock_sock_nested+0x9a/0x120 [ 1947.660449][ T1476] ? __local_bh_enable_ip+0x15a/0x270 06:11:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) [ 1947.665838][ T1476] inet_stream_connect+0x58/0xa0 [ 1947.670798][ T1476] __sys_connect+0x266/0x330 [ 1947.675412][ T1476] ? __ia32_sys_accept+0xb0/0xb0 [ 1947.680487][ T1476] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1947.685952][ T1476] ? do_fast_syscall_32+0xd1/0xd54 [ 1947.691069][ T1476] ? entry_SYSENTER_compat+0x70/0x7f [ 1947.696362][ T1476] ? do_fast_syscall_32+0xd1/0xd54 [ 1947.701500][ T1476] __ia32_sys_connect+0x72/0xb0 [ 1947.706363][ T1476] do_fast_syscall_32+0x281/0xd54 [ 1947.711425][ T1476] entry_SYSENTER_compat+0x70/0x7f 06:11:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) [ 1947.716538][ T1476] RIP: 0023:0xf7fc6849 [ 1947.720609][ T1476] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1947.740751][ T1476] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 000000000000016a [ 1947.749174][ T1476] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000207a8000 [ 1947.757146][ T1476] RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000000 06:11:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) [ 1947.757156][ T1476] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1947.757164][ T1476] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1947.757173][ T1476] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:11:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x100000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:11:55 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x3c) 06:11:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r1 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000040)) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x101000, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000080)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f00000002c0)) ioctl$VT_WAITACTIVE(r0, 0x5607) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000000)=0x7) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000200)={@mcast1, 0x7c}) syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x5, 0x40) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x0, 0x4) ioctl$FICLONE(r3, 0x40049409, 0xffffffffffffffff) 06:11:55 executing program 2 (fault-call:7 fault-nth:1): r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:55 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x3e) [ 1948.383382][ T1516] FAULT_INJECTION: forcing a failure. [ 1948.383382][ T1516] name failslab, interval 1, probability 0, space 0, times 0 06:11:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:55 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x42) 06:11:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) [ 1948.428769][ T1516] CPU: 0 PID: 1516 Comm: syz-executor.2 Not tainted 5.1.0+ #3 [ 1948.436271][ T1516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1948.446342][ T1516] Call Trace: [ 1948.449642][ T1516] dump_stack+0x172/0x1f0 [ 1948.453981][ T1516] should_fail.cold+0xa/0x15 [ 1948.458584][ T1516] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1948.464411][ T1516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1948.470668][ T1516] ? should_fail+0x1de/0x852 [ 1948.475273][ T1516] __should_failslab+0x121/0x190 [ 1948.480223][ T1516] should_failslab+0x9/0x14 [ 1948.484736][ T1516] kmem_cache_alloc_node_trace+0x5a/0x720 [ 1948.490474][ T1516] __kmalloc_node_track_caller+0x3d/0x70 [ 1948.496146][ T1516] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1948.501531][ T1516] __alloc_skb+0x10b/0x5e0 [ 1948.505957][ T1516] ? skb_trim+0x190/0x190 [ 1948.510308][ T1516] sock_wmalloc+0xd9/0x120 [ 1948.514743][ T1516] dccp_send_reset+0xf8/0x2b0 [ 1948.519434][ T1516] dccp_disconnect+0x6b3/0xb10 [ 1948.524221][ T1516] __inet_stream_connect+0x239/0xea0 06:11:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) [ 1948.529516][ T1516] ? mark_held_locks+0xa4/0xf0 [ 1948.534288][ T1516] ? inet_dgram_connect+0x2e0/0x2e0 [ 1948.539492][ T1516] ? lock_sock_nested+0x9a/0x120 [ 1948.544437][ T1516] ? trace_hardirqs_on+0x67/0x230 [ 1948.549475][ T1516] ? lock_sock_nested+0x9a/0x120 [ 1948.554427][ T1516] ? __local_bh_enable_ip+0x15a/0x270 [ 1948.559813][ T1516] inet_stream_connect+0x58/0xa0 [ 1948.564765][ T1516] __sys_connect+0x266/0x330 [ 1948.569371][ T1516] ? __ia32_sys_accept+0xb0/0xb0 [ 1948.574344][ T1516] ? trace_hardirqs_on_thunk+0x1a/0x1c 06:11:56 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) [ 1948.579812][ T1516] ? do_fast_syscall_32+0xd1/0xd54 [ 1948.584928][ T1516] ? entry_SYSENTER_compat+0x70/0x7f [ 1948.590230][ T1516] ? do_fast_syscall_32+0xd1/0xd54 [ 1948.595365][ T1516] __ia32_sys_connect+0x72/0xb0 [ 1948.600227][ T1516] do_fast_syscall_32+0x281/0xd54 [ 1948.605258][ T1516] entry_SYSENTER_compat+0x70/0x7f [ 1948.610372][ T1516] RIP: 0023:0xf7fc6849 [ 1948.614448][ T1516] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1948.634144][ T1516] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 000000000000016a [ 1948.634160][ T1516] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000207a8000 [ 1948.634167][ T1516] RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000000 [ 1948.634174][ T1516] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1948.634181][ T1516] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1948.634189][ T1516] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:11:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x800000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:11:56 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x43) 06:11:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r2, 0xd30, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x4) 06:11:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:56 executing program 2 (fault-call:7 fault-nth:2): r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:56 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000), 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:56 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x46) 06:11:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:56 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000), 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:56 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x48) 06:11:56 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:56 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x49) 06:11:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x900000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:11:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x1b) readv(r2, &(0x7f0000000340)=[{&(0x7f0000000040)=""/188, 0xbc}], 0x1) write(r1, &(0x7f0000000340), 0x41395527) getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000000)={0x7, 0xffffffff}) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 06:11:57 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000), 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:57 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x2, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:57 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x4a) 06:11:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:57 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x4b) 06:11:57 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x4, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:57 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:57 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x4c) 06:11:58 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x1000000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:11:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 06:11:58 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x7, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:58 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x4d) 06:11:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:58 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x4e) 06:11:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:58 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x9, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:58 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(0xffffffffffffffff, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:11:59 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20000020) 06:11:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000)=0x7, 0x4) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 06:11:59 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xa, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(0xffffffffffffffff, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:59 executing program 3: r0 = socket$inet6(0xa, 0x7fc, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:11:59 executing program 3: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) socket$alg(0x26, 0x5, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x440000, 0x1) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000080)) 06:11:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:11:59 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(0xffffffffffffffff, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:11:59 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xe, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:11:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:00 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x44, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) ioctl$BLKBSZSET(r0, 0x40041271, &(0x7f0000000000)=0x168) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000240)=""/99) r3 = pkey_alloc(0x0, 0x2) pkey_free(r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)=0x0) sched_setscheduler(r4, 0x7, &(0x7f00000001c0)=0xd8) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000200)) 06:12:00 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x1, 0x0, 0x7, 0x0, 0x7}, 0x20) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x20}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x100000000, 0x7, 0x3, 0x1, r1}, 0x10) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100)=0x7, 0x4) 06:12:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:00 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x60, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x01\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:00 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1000000, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0xfffffffffffffffe, &(0x7f0000000080)) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:00 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xfc, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:00 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5, 0x400) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0106434, &(0x7f0000000080)={0x255, 0x0, 0x10003, 0xeb}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0086438, &(0x7f00000000c0)={0xf96, r2}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0xc1e, 0x1, 0x0, 0x8, 0x4}, 0x20) 06:12:01 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) write(r0, &(0x7f0000000000)="fe9712d03713d538b6455112e21dc004fdb8798a53839d2daf1a8ddd57a651d91015488bd71670b8700b6c68edf745033ed373fc12f1fa7dbfe57be1", 0x3c) 06:12:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:01 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x1f4, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:01 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40000, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000080)={0x0, @multicast2, @initdev}, &(0x7f00000000c0)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r1, 0x1, 0x6, @remote}, 0x10) rt_sigpending(&(0x7f0000000100), 0x8) r2 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:01 executing program 3: r0 = socket$inet6(0xa, 0x80f, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x2, 0x0, 0xfffffffffffffffc}, 0x20) 06:12:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:01 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x3e8, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:01 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:01 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x700, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:01 executing program 3: r0 = socket$inet6(0xa, 0x400000003, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:02 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x3) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RATTACH(r0, &(0x7f0000000200)={0x14, 0x69, 0x1, {0x10, 0x0, 0x3}}, 0x14) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0xffff) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) 06:12:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x900}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:02 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x400) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2360f01765ad993449926f4e1fff36d0f3805b4800166b97a08000066b8ff00000066ba000000000f303e0f22130f0f01b60f01cb", 0x35}], 0x1, 0x5, &(0x7f0000000100)=[@cr0={0x0, 0x28}], 0x1) ioctl$TIOCGICOUNT(r1, 0x545d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:02 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x900, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:02 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xa00, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:02 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x9, 0x7, 0x9, 0x6, 0x85cc}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000001c0)={r1, 0x2}, 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01`\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:02 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:02 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x82080, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f00000002c0)={'filter\x00', 0x0, 0x3, 0xcf, [], 0x3, &(0x7f0000000180)=[{}, {}, {}], &(0x7f00000001c0)=""/207}, &(0x7f0000000340)=0x50) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000380)={@remote, 0x0}, &(0x7f00000003c0)=0x14) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000400)={@rand_addr="8ab07fc708763341dcfcb4c9b1449908", @mcast2, @mcast1, 0x3ff, 0x6c73faf4, 0xdc, 0x400, 0xa0, 0x40000000, r2}) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000140)={0x7, &(0x7f0000000100)=[{0x1, 0x7}, {0x401, 0x1}, {0x7ff, 0xd7}, {0x4, 0xfffffffffffffffd}, {0x2, 0x3}, {0xfe20000000000000}, {}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x41, 0x0) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000080)=0xfffffffffffffff9, 0x2) 06:12:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000100)={0x20, 0x24, 0x14, 0x6, 0x8, 0x400, 0x0, 0xa3, 0x1}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) 06:12:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:03 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xe00, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:03 executing program 3: socket$inet6(0xa, 0x6, 0x0) 06:12:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:03 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:03 executing program 3: r0 = socket$inet6(0xa, 0xa, 0xfffffffffffffffb) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000140)={0xffffffff, "a1841c5f42fdbc96cdc074dd58c90877cb995a5833fb130ae0c0adc791a16948", 0x1, 0x1}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) set_robust_list(&(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000080)={&(0x7f0000000040)}}, 0xc) 06:12:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:03 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x4000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:03 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, r2, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x1]}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x6}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x5, 0xa0]}, @SEG6_ATTR_SECRET={0x10, 0x4, [0xfffffffffffffff7, 0x2, 0xfffffffffffffe00]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @loopback}}]}, 0x80}, 0x1, 0x0, 0x0, 0x44080}, 0x80) 06:12:03 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000100)}) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) 06:12:03 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:03 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x4400, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:03 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0485510, &(0x7f0000000240)={0xffffffffd1597b00, 0x7, 0x6, 0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}]}) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:04 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:04 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000040)=0xc974) 06:12:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:04 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x6000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:04 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/vfio/vfio\x00', 0x80000, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000001200)=0x101, 0x4) r1 = socket$inet6(0xa, 0x805, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x3}, 0x1a) 06:12:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\a', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:04 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0xffffffff, 0x40000) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40046432, &(0x7f0000000100)=0xffffffffffffff7f) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:04 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x80fe, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:04 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:04 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x867df9fb7d18b1f6, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000100)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) 06:12:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x9000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:05 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xc0fe, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:05 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000080)={0xc021}) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f00000000c0)={0xb9d, 0xffffffff}) 06:12:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:05 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@remote, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) setreuid(r1, r2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) r3 = geteuid() r4 = geteuid() r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20\x00', 0x80, 0x0) ioctl$CAPI_REGISTER(r5, 0x400c4301, &(0x7f00000004c0)={0x8000000000, 0xa42, 0x1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) add_key(&(0x7f0000000340)='.request_key_auth\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="8b00a1cd66704823f4fb4ea05e4435f8a1dc1c2fb4db4a3de2", 0x19, 0xfffffffffffffff8) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x800, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r7, 0xc0305602, &(0x7f00000001c0)={0x0, 0x9, 0x1015, 0x1}) setresuid(r3, r4, r6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) 06:12:05 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xe803, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:05 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000000)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f00000001c0)={0x8}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000100)) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) 06:12:05 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xf401, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x10000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:05 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000340)=0x10000, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r1, 0x3}}, 0x18) r2 = socket$inet6(0xa, 0x7, 0x100000000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01`', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:05 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xfc00, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:05 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xfe80, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:06 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x100fff, 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:06 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x400080, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000240)=""/217) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000440)={"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"}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) read$eventfd(r4, &(0x7f0000000340), 0x119) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000840)={0x0, 0x22, "b63301861f12f5e47bb35b5c3ccb1ed0d101665b846be85d9d033fad40af8b961273"}, &(0x7f0000000880)=0x2a) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000008c0)={r5, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xd}}}, 0xff}, &(0x7f0000000980)=0x88) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000009c0)={r5, @in={{0x2, 0x4e21, @broadcast}}, 0x5, 0x1}, 0x88) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_DEL(r6, 0x2, r0) dup(r7) ioctl$TIOCGRS485(r6, 0x542e, &(0x7f00000001c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r6, 0x8080aea1, &(0x7f0000000000)) vmsplice(r3, &(0x7f0000000000), 0x0, 0x0) 06:12:06 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xfec0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:06 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x8000, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0xca8, 0x7, 0x774, 0x5, 0x0, 0x7, 0x0, 0xe, 0x5, 0x9, 0x74, 0x1, 0x5, 0x80, 0x7, 0x1aefcc33, 0x7, 0x1f, 0x7ff, 0x8, 0x0, 0x4, 0x200, 0x8001, 0x4, 0x0, 0x0, 0x1, 0x3, 0x9, 0x0, 0x8, 0x3ff, 0x1, 0x0, 0x9, 0x0, 0x80f5, 0x2, @perf_bp={&(0x7f00000003c0), 0x9}, 0x4, 0xffffffffffffff7c, 0xfffffffffffffffc, 0x2, 0x8c, 0x5, 0x6}, 0xffffffffffffffff, 0xb, r0, 0xa) r1 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x2, 0x1) write$rfkill(r1, &(0x7f0000000300)={0x8, 0x7, 0x0, 0x1, 0x1}, 0x8) r2 = socket$inet6(0xa, 0x6, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r1, 0x0, 0xc, &(0x7f0000000340)='/dev/audio#\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)=r3, 0xfffffffffffffcf1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffff9c, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xffff, 0x400}, 0x0, 0x0, &(0x7f00000000c0)={0x6, 0x2, 0x8000, 0x100000001}, &(0x7f0000000100)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=r4, 0x37d) 06:12:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xfe', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:06 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xff00, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:06 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000180)=@filter={'filter\x00', 0xe, 0x4, 0x44c, 0xec, 0x268, 0x268, 0x0, 0x268, 0x380, 0x380, 0x380, 0x380, 0x380, 0x4, &(0x7f0000000100), {[{{@uncond, 0x0, 0xc8, 0xec}, @REJECT={0x24, 'REJECT\x00', 0x0, {0xf}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x1c}, @remote, [0x0, 0xffffffff, 0xffffffff, 0xffffff00], [0xffffff00, 0xffffffff, 0xff000000, 0xff], 'ip_vti0\x00', 'bond0\x00', {0xff}, {}, 0xc, 0x6, 0x0, 0x3}, 0x0, 0x120, 0x17c, 0x0, {}, [@common=@srh={0x2c, 'srh\x00', 0x0, {0x84, 0x574, 0x7, 0x401, 0x9, 0x20d8, 0x190}}, @common=@srh={0x2c, 'srh\x00', 0x0, {0x62, 0x2, 0x4, 0x9, 0x1000000000, 0x40, 0x210}}]}, @common=@inet=@HMARK={0x5c, 'HMARK\x00', 0x0, {@ipv4=@remote, [0xff000000, 0xffffffff, 0xffffff00, 0xffffff00], 0x4e21, 0x4e23, 0x4e22, 0x4e22, 0x42f, 0xfffffffffffff287, 0x1, 0x0, 0x80000000000000}}}, {{@ipv6={@loopback, @empty, [0xffffff00], [0xff000000, 0xffffffff, 0x0, 0xffffff00], 'veth0_to_hsr\x00', 'rose0\x00', {0xff}, {}, 0x6c, 0x8, 0x1}, 0x0, 0xf4, 0x118, 0x0, {}, [@common=@srh={0x2c, 'srh\x00', 0x0, {0x0, 0x6, 0x1, 0x20, 0x3, 0x2021, 0x80}}]}, @common=@inet=@SYNPROXY={0x24, 'SYNPROXY\x00', 0x0, {0xc, 0xffffffff, 0x4}}}], {{[], 0x0, 0xa8, 0xcc}, {0x24}}}}, 0x4a8) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x8, 0x80800) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000080)={0x1, "89bb5555c57703d8beaaa849d510901f7df1cd909693d6bcfc406cc53b3cbd09", 0x3, 0x1}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={'hwsim0\x00', {0x2, 0x4e21, @loopback}}) mkdir(&(0x7f0000000680)='./file0\x00', 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:06 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x2000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:07 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xced, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0xc87, 0x4000) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000001c0)=""/245) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write$FUSE_OPEN(r1, &(0x7f0000000000)={0x20, 0xfffffffffffffff5, 0x8, {0x0, 0x2}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) 06:12:07 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x4000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:07 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x7, 0x1, 0x0, 0x9, 0x2, 0x200}, 0x20) 06:12:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:07 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x7000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:07 executing program 3: r0 = socket$inet6(0xa, 0x4, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:07 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x9000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_subtree(r1, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) prctl$PR_SET_ENDIAN(0x14, 0x3) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000100)=0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) r2 = gettid() ioprio_set$pid(0x3, r2, 0x3) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 06:12:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:08 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x800000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:08 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xa000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:08 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0x40) write$P9_RSTAT(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="510000007d010000004a0008000700000020030000000000000000000000000000044f0300000800000000000000000000000d00656d3176626f786e6574316c6f04007573657206405c776c616e300000"], 0x51) 06:12:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:08 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xe000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:08 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) r1 = dup3(r0, r0, 0x80000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000040)="4ae8bbb0e139ddd65a5798c836913355eb515cfc24ec6859da896cec9f8d4ca3cfae3d60b14f5d6fd22921fdf5c426e7789c331d6a", &(0x7f0000000080)="af22e2d89c0b7888ecdb18a778e6b06e6599d19bece708b063829c06ff543aea9904b8affabd2a7ed39554859a43b506230fee8c1ed2704bdde70130f8db9089659733b3bf579cfcd4195cfb5cdd5272"}, 0x20) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000140)={0x6, 0x7543b047, 0x2, 0x40, 0x18, 0x73bb, 0x400, 0x275379a9, 0x2, 0x800, 0x1, 0x9}) 06:12:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x400) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000100), &(0x7f00000001c0)=0x4) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) 06:12:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x7, 0x4) 06:12:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x900000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:09 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x40000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:09 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x201, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="277e23b92158b4ad6221e066d1ac364ccd1a3dd79958624688cb4333bd785a30637796e891d43959c8cce9d929511c5328ffdcb8ef769367d33fa65c123b", @ANYRES16=r1, @ANYBLOB="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"], 0x12c}, 0x1, 0x0, 0x0, 0x80}, 0x20000804) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0xffffffffffffffff, r0, 0x0, 0x7, &(0x7f0000000200)=')eth1{\x00', 0xffffffffffffffff}, 0x30) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000580)={0xa, 0x1, 0x4fae, 0x80}, 0xa) syz_open_procfs(r2, &(0x7f0000000540)='net/bnep\x00') socket$inet6(0xa, 0xf, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f00000002c0)=[0x400000000002, 0x8000000000008]) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc008641d, &(0x7f0000000500)={r3, &(0x7f0000000100)=""/228}) r4 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x20) 06:12:09 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x44000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:09 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080), 0x0, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:09 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x1}, 0x20) 06:12:09 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xb12a, 0x101000) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x109000) 06:12:09 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x60000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:10 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:10 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080), 0x0, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:10 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x8dffffff, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:10 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xe8030000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:10 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') 06:12:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080), 0x0, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:10 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x9, 0x1ff, 0x8005, 0x38c0000, 0xff, 0x9, 0x81, 0xffffffffffff5426, 0x0}, &(0x7f0000000100)=0x20) statfs(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=""/49) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000002c0)={0x1, 0x12000000000, 0x8, 0x6, 0x6, 0x1, 0x80000000, 0x8, r1}, &(0x7f0000000300)=0x20) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0xd7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000180)={r2, @in={{0x2, 0x4e24, @broadcast}}, [0xffffffff, 0x6, 0x9, 0xa9, 0xe6, 0x2, 0x913c, 0xff, 0x6e5e, 0x20, 0x4, 0x100000001, 0x8, 0x7, 0x233]}, &(0x7f0000000280)=0x100) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0xb9, @dev={0xfe, 0x80, [], 0x1a}, 0x6f}, @in6={0xa, 0x4e20, 0xb5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4fd}, @in6={0xa, 0x4e24, 0x2, @mcast1, 0x5}, @in={0x2, 0x4e22, @remote}], 0x64) 06:12:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0x8, &(0x7f0000000000)='loproc.\x00'}, 0x30) wait4(r2, &(0x7f00000001c0), 0x81000009, &(0x7f0000000200)) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 06:12:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:11 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xf4010000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:11 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x5, 0x8200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:11 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = accept4(r0, &(0x7f0000000040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000000c0)=0x80, 0x800) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000100)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:11 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:11 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xf5ffffff, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:11 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xfc000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:11 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xa8, r1, 0x2, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x80000000}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffffffffffe}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x8}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x811}, 0x4000010) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000740)={&(0x7f0000000300)=@in6={0xa, 0x4e24, 0x55068b7b, @loopback, 0xffffffff}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000440)="a2510124433e5c76d665e35b63e2366185fb02ccd9889b57deba85bdddec819eafd816e15cb0aee59934695e25816a8c8c97f38938d3c78c77b6f9ccecc31085e46cb69866a6b789ad5a6b579c9f33652dce1afafb4931f6991ebc49305dc0fc48af71ed61d972d042299dc548088b1d804eff8aa19e6aac3bf07cc9286f0c2f39f53a6755b1f110a98f52aba4fb84b1eed145b256424854c42b02ec46e81ec07c63beb6132014f5022660e9bd72d09546e6a49deba77926db59897a84778c2163a221939ab1142c", 0xc8}, {&(0x7f0000000340)="d0e5e3f622c6081ee640c462f9c48cd3e036004115046e8e7b2e5b2664c7d4ccb73f0eb16809dc71c8f3ecec94a9b98cf333473a2c216ee0201f310915e8fa0d86d0fd6a13e16d43c5fdea2c3a38908ea1aa2c6ac1077c1214bdca33f3931a5c3ebc89f43705875055b24f384a677ddb3b5c08fc4d0be919cb4a9c3fb53c748a42a18c6fc9cabd58ca521ebb64a68a87a24856cab1454373a10f3215f696db484c6e92417a42580abb40c207bedc034bdf8294e4", 0xb4}, {&(0x7f0000000540)="128c53efe96ecccd16b5aa637a69d6cadf12bd6b55419aa376d3aeb510a47f17cb71d14a741807116a3b5f0bdf0f7478d2f6e384f4c1e7dcef63a5358ecb16fdc2c6dc5fc9f49a299587ec1cffb719a4b21fd6d9c1360ed0919e6b346f6bf0d468607b5ddc9053a0f345ecfe0a94d4b892896826021938cc4c4468727bce6a9ffddaa5885c080b2aea7b5a5d4308cb4084fda84ad7703049d9e6ffe9561befc82d6b4713df6b1d1306c0ece9df38222a36d02583782fc3471edde56dfade6b2700747e37b7c67f47927b3f37d430855726278d4b1a1f0ac85bd8504a54111acce19b08ae9492c98ae5ea857eb750ac480f4c29ab8af3", 0xf6}, {&(0x7f0000000640)="2639f030f153593a666cefa8a1f345627161ec21712f6c7f4b5f1a7b6124c5990278bae95ed58d6246b974f4029b06fb1272e11a3d729a12c6ba02410d36c45a9b99200727bee56633cf565537ea84a2386b31530e1915876364460b04e516f3bef6f84b38ac540b08d1c7ea6ac5607c3599f0e55d3d3587bea2c4b2a1bb568d392e0bbe86f7936ea5aa7c1c054098b50ab73808c2b40e3de8", 0x99}], 0x4, 0x0, 0x0, 0x10}, 0x8010) 06:12:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:12 executing program 3: r0 = socket$inet6(0xa, 0x8, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000040)='keyringkeyringvboxnet1\x00', 0xffffffffffffffff}, 0x30) prctl$PR_SET_PTRACER(0x59616d61, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) ustat(0xd, &(0x7f00000000c0)) 06:12:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:12 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xfe800000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0), 0x0, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:12 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xfec00000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:12 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/189, 0xbd}, {&(0x7f0000000140)=""/130, 0x82}], 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) r2 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x100000001, 0x800) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000280)=""/95) 06:12:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:12 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101080, 0x0) 06:12:12 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xff000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:13 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0), 0x0, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x01\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:13 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x2, 0x3, 0x0, 0x800}, 0x20) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffc524, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x2) 06:12:13 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xffffff8d, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:13 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xfffffff5, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:13 executing program 3: socket$inet6(0xa, 0x6, 0x0) 06:12:13 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0), 0x0, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:13 executing program 1: 06:12:13 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1, 0x1, 0x100000000, 0x100000000000}, 0x12) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7ff, 0x400) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000180)={'broute\x00', 0x0, 0x3, 0x7b, [], 0x7, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000100)=""/123}, &(0x7f0000000200)=0x50) 06:12:14 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:14 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x200000000000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:14 executing program 1: 06:12:14 executing program 3: r0 = socket$inet6(0xa, 0xa, 0x400) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) socket$inet_udplite(0x2, 0x2, 0x88) 06:12:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{0x0}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:14 executing program 1: 06:12:14 executing program 3: r0 = socket$inet6(0xa, 0x86, 0x2712) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) ioctl$void(r0, 0x5451) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80000, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000180)={0x1, &(0x7f0000000100)=[{}, {}]}) 06:12:14 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{0x0}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:14 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x400000000000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:15 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x3c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x3c}}, 0x40d4) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0d4e18014c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae955baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e00005480") 06:12:15 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev={0xfe, 0x80, [], 0x15}, 0x0, 0x2, 0x2000000000000, 0x800000000000000, 0x0, 0x8}, 0x20) 06:12:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{0x0}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:15 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x700000000000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:15 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:15 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000180)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) fstatfs(r0, &(0x7f0000000b80)=""/35) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f00000003c0)=0xe8) setresuid(r1, r2, r3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000400)) r4 = syz_open_dev$audion(&(0x7f0000000440)='/dev/audio#\x00', 0x9, 0x501000) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x121000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000500)=@filter={'filter\x00', 0xe, 0x4, 0x610, 0x44c, 0x0, 0x44c, 0x138, 0x44c, 0x57c, 0x57c, 0x57c, 0x57c, 0x57c, 0x4, &(0x7f0000000480), {[{{@uncond, 0x0, 0x114, 0x138, 0x0, {}, [@common=@ah={0x2c, 'ah\x00', 0x0, {0xe9, 0x9}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x1, 0x8, 0x2}}]}, @REJECT={0x24, 'REJECT\x00', 0x0, {0x3}}}, {{@ip={@broadcast, @rand_addr=0x3, 0xff000000, 0xffffff00, 'veth0_to_hsr\x00', 'tunl0\x00', {}, {0xff}, 0xff, 0x0, 0x58}, 0x0, 0x2f0, 0x314, 0x0, {}, [@common=@unspec=@bpf1={0x22c, 'bpf\x00', 0x1, @fd={0x2, 0x0, r5}}, @common=@addrtype={0x2c, 'addrtype\x00', 0x0, {0x1, 0x620, 0x1}}]}, @REJECT={0x24, 'REJECT\x00', 0x0, {0x5}}}, {{@ip={@remote, @multicast1, 0xffffff00, 0xffffffff, 'veth1_to_bridge\x00', 'veth0_to_hsr\x00', {}, {}, 0xff, 0x1, 0x7}, 0x0, 0x10c, 0x130, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x19, 0x8, 0x2}}, @common=@ttl={0x24, 'ttl\x00', 0x0, {0x0, 0x27b1}}]}, @REJECT={0x24, 'REJECT\x00', 0x0, {0x8}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x66c) 06:12:15 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x900000000000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:15 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01`\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:15 executing program 3: syz_execute_func(&(0x7f0000000040)="d926f20fe66a0065f30fae2502000000de81d00c0000f26e8fe9409190a4000000660f381dae0000000065660f2da900000080180f8fc9c892e2") r0 = socket$inet6(0xa, 0x9, 0x3) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xff, 0x400) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f00000000c0)={0x1}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:15 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:16 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:16 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xa00000000000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x84, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @local}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @rand_addr="cc7dfc58fcc9b5883468ce621eb4c853"}}}}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x84}}, 0x0) syz_execute_func(&(0x7f0000000100)="f2af91930f0124eda133fa20430fbafce842f66188d0d4e18014c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae955baaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e00005480") 06:12:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:16 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x4) r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:16 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) accept4$tipc(r1, &(0x7f0000000080)=@id, &(0x7f00000000c0)=0x10, 0x80000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:16 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xe00000000000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:16 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x4000000000000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="f2af91930f0124eda133fa20430fbafce842f66188d0d4e18014c1ab5b41d9e1e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae955baa9a420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000000e8c4af") 06:12:17 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1, 0x0, 0x9}, 0xffffffffffffffce) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000080)=0x4) socket$inet6(0xa, 0x5, 0x7) 06:12:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:17 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x4400000000000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:17 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x6000000000000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:17 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x24080, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000080)={0x0, 0x2, 0x1, 0xcc5, 'syz1\x00', 0x1f}) 06:12:17 executing program 1 (fault-call:6 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:17 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@local, 0xffffffffffffa3a0, 0x1, 0xff, 0x0, 0x0, 0x6}, 0x20) 06:12:17 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x8dffffff00000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000280)=0x5, 0x8) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={0x20, r2, 0x701, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x20}}, 0x0) splice(r0, &(0x7f0000000140), r1, &(0x7f0000000180), 0x5, 0xc) r3 = socket$inet6(0xa, 0x6, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400100}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="100325bd7000fbdbdf2505000000080005004e000000440001000800010002000000080004004e22000008000200840000000800080002279f202f3b05624169c4663201000000080004024e220000080004004e210000080001000a000000080004004e2400000000"], 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4040011) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, r4, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffff7fff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044810}, 0x40000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:17 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x0, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:17 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xe803000000000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x0, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) [ 1970.745808][ T2705] FAULT_INJECTION: forcing a failure. [ 1970.745808][ T2705] name fail_futex, interval 1, probability 0, space 0, times 0 [ 1970.773065][ T2705] CPU: 1 PID: 2705 Comm: syz-executor.1 Not tainted 5.1.0+ #3 [ 1970.780579][ T2705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1970.790633][ T2705] Call Trace: [ 1970.793912][ T2705] dump_stack+0x172/0x1f0 [ 1970.798231][ T2705] should_fail.cold+0xa/0x15 [ 1970.802804][ T2705] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1970.808587][ T2705] ? find_held_lock+0x35/0x130 [ 1970.813328][ T2705] ? is_bpf_text_address+0xac/0x170 [ 1970.818596][ T2705] get_futex_key+0xba3/0x1660 [ 1970.823252][ T2705] ? __lock_acquire+0x54f/0x5490 [ 1970.828184][ T2705] ? unqueue_me_pi+0xc0/0xc0 [ 1970.832753][ T2705] ? is_dynamic_key+0x1c0/0x1c0 [ 1970.837580][ T2705] ? is_bpf_text_address+0xd3/0x170 [ 1970.842762][ T2705] futex_wake+0xf9/0x4d0 [ 1970.846982][ T2705] ? get_futex_key+0x1660/0x1660 [ 1970.851893][ T2705] ? __lock_acquire+0x54f/0x5490 [ 1970.856828][ T2705] ? __lock_acquire+0x54f/0x5490 [ 1970.861750][ T2705] do_futex+0x32a/0x1e60 [ 1970.865977][ T2705] ? exit_robust_list+0x2c0/0x2c0 [ 1970.870987][ T2705] ? __might_fault+0x12b/0x1e0 [ 1970.875725][ T2705] ? find_held_lock+0x35/0x130 [ 1970.880464][ T2705] ? __might_fault+0x12b/0x1e0 [ 1970.885225][ T2705] ? lock_downgrade+0x880/0x880 [ 1970.890061][ T2705] mm_release+0x33d/0x490 [ 1970.894369][ T2705] do_exit+0x417/0x2fa0 [ 1970.898505][ T2705] ? find_held_lock+0x35/0x130 [ 1970.903244][ T2705] ? get_signal+0x331/0x1d50 [ 1970.907810][ T2705] ? find_held_lock+0x35/0x130 [ 1970.912553][ T2705] ? mm_update_next_owner+0x640/0x640 [ 1970.917904][ T2705] ? kasan_check_write+0x14/0x20 [ 1970.922838][ T2705] ? _raw_spin_unlock_irq+0x28/0x90 [ 1970.928012][ T2705] ? get_signal+0x331/0x1d50 [ 1970.932587][ T2705] ? _raw_spin_unlock_irq+0x28/0x90 [ 1970.937778][ T2705] do_group_exit+0x135/0x370 [ 1970.942357][ T2705] get_signal+0x399/0x1d50 [ 1970.946771][ T2705] ? poll_freewait+0x260/0x260 [ 1970.951513][ T2705] ? lock_downgrade+0x880/0x880 [ 1970.956348][ T2705] do_signal+0x87/0x1900 [ 1970.960578][ T2705] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1970.966015][ T2705] ? setup_sigcontext+0x7d0/0x7d0 [ 1970.971018][ T2705] ? retint_kernel+0x2b/0x2b [ 1970.975586][ T2705] ? exit_to_usermode_loop+0x43/0x2c0 [ 1970.980931][ T2705] ? do_fast_syscall_32+0xb30/0xd54 [ 1970.986218][ T2705] ? exit_to_usermode_loop+0x43/0x2c0 [ 1970.991576][ T2705] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1970.996839][ T2705] ? trace_hardirqs_on+0x67/0x230 [ 1971.001843][ T2705] exit_to_usermode_loop+0x244/0x2c0 [ 1971.007145][ T2705] do_fast_syscall_32+0xb30/0xd54 [ 1971.012157][ T2705] entry_SYSENTER_compat+0x70/0x7f [ 1971.017245][ T2705] RIP: 0023:0xf7fa4849 [ 1971.021292][ T2705] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 06:12:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:18 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xf401000000000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:18 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000100)=""/46, &(0x7f0000000140)=0x2e) r1 = socket$inet6(0xa, 0x6, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x0, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) [ 1971.040986][ T2705] RSP: 002b:00000000f5d7f0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000134 [ 1971.049399][ T2705] RAX: fffffffffffffdfe RBX: 0000000000000040 RCX: 00000000200000c0 [ 1971.057346][ T2705] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000000 [ 1971.065302][ T2705] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1971.073249][ T2705] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1971.081283][ T2705] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:12:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:18 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="441f2a1f1503fb4615cebaa610ef3c1a", 0x0, 0x1}, 0x20) 06:12:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, 0x0, 0x0) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:18 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xf5ffffff00000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:18 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x6}, 0x20) 06:12:18 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, 0x0, 0x0) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:19 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x8}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:19 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xfc00000000000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8200, 0x42) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@local, @in=@remote, 0x4e24, 0x4, 0x4e24, 0x0, 0xa, 0xa0, 0x20, 0x8, 0x0, r1}, {0x7, 0x100000000, 0xfffffffffffffffe, 0x8, 0x8, 0x7, 0x1, 0xfffffffffffffff7}, {0x9ba, 0x3, 0xfe54, 0x6}, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2}, {{@in6=@loopback, 0x4d5, 0xff}, 0xa, @in6=@remote, 0x0, 0x0, 0x0, 0x25, 0x7fff, 0x3, 0x2a}}, 0xe8) r2 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, 0x0, 0x0) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:19 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:19 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000140)={0x2}) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)='syzkaller0\x00') r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000100)={0x2, 0x9}, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x18) 06:12:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(0xffffffffffffffff, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:19 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xfe80000000000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(0xffffffffffffffff, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:19 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:20 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xfec0000000000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(0xffffffffffffffff, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:20 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4, 0x1, 0x400000002, 0x2, 0x0, 0x56}, 0xfffffc2a) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 06:12:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:20 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0xff00000000000000, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:20 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x10}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:20 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40046607, &(0x7f0000000000)=0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @local}, 0x0, 0x5, 0x3, 0x0, 0x0, 0xffffffffffffffff}, 0xfffffffffffffe8f) 06:12:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:20 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b006d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:20 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:21 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000080)="cb8d2e53277e70648094e2ca862ec576abbe3642cf8b86ae9e7188b1b483416c14b651e19061ba04328e12980c6044ef445e0ed2d92ee266a8cba7399351ddfc0e02ce5aff13d74f36f3a242d665b80f4bd7f25606ea0bcbc7b3a350ac8a29ca622faf51f26f7da78f66e3cadc3ce0913affa56ec19b29fa75cd0733cd1840803b89b3c203d40dd89b7e843bf079c7e5ded31c0b748f3e5fd1dd9b4917e6de4b96b47fde5198f393f2cdd5e394c03c0093f72d7b11c429d4646a4b5b2b5c8b1a5672d961ae15c0da6205544944537b5c87c2fa972e2fec0c") r1 = socket$inet6(0xa, 0x6, 0x8001) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0xffffffffffffffff, 0x1}, 0x20) 06:12:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x900000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:21 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) r1 = dup3(r0, r0, 0x80000) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000040)) 06:12:21 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768026b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, 0x0, 0x0) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:21 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x900}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:21 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) socketpair(0x0, 0x3, 0x80, &(0x7f0000000040)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x1) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f0000000200)={0x5, 0xbd, 0xfff}) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xef, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r2, 0x320, 0x70bd2a, 0x25dedbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4044000}, 0x800) 06:12:21 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768036b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:21 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(0xffffffffffffffff, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:22 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768046b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:22 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:22 executing program 3: r0 = socket$inet6(0xa, 0x800, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @local}, 0x0, 0x1, 0x100000000, 0x4}, 0x20) 06:12:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:22 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(0xffffffffffffffff, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:22 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768056b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:22 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x1000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:22 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(0xffffffffffffffff, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:22 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768066b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:22 executing program 3: r0 = socket$inet6(0xa, 0x7, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, 0xffffffffffffffff, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) [ 1975.695873][ T3006] dccp_close: ABORT with 1 bytes unread 06:12:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:23 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768076b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, 0xffffffffffffffff, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:23 executing program 3: r0 = socket$inet6(0xa, 0xe, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) socket$inet_udplite(0x2, 0x2, 0x88) 06:12:23 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x8000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:23 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000080)={0x7, 0x4d, 0x2}, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, 0xffffffffffffffff, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) [ 1976.351361][ T3025] dccp_close: ABORT with 1 bytes unread 06:12:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:23 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768086b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) dup3(r3, r2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) [ 1976.497278][ T3039] dccp_close: ABORT with 1 bytes unread 06:12:24 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x80, 0x0) write$apparmor_current(r1, &(0x7f0000000080)=@hat={'permhat ', 0x3, 0x5e, ['\xdakeyring{em0vmnet0$eth1em1userlo\x99systemselinux\x00', 'md5summime_type!vmnet0\x00', '\x00', 'eth1lo/ppp1\x00', '^wlan1&\x00', '\x00', '\t\\vboxnet1\x00']}, 0x82) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) [ 1976.788925][ T3057] dccp_close: ABORT with 1 bytes unread 06:12:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:24 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x9000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:24 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:24 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768096b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) dup3(r3, r2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) 06:12:24 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xfffffffffffffffe) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x7, 0x6, [0x51ff, 0xfffffffffffffff7, 0xfffffffffffffff8, 0x3f, 0x101, 0xff]}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r1, 0x200, 0xfe, 0xfef9, 0x800}, &(0x7f0000000100)=0x14) 06:12:24 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a7680a6b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) [ 1977.352412][ T3072] dccp_close: ABORT with 1 bytes unread 06:12:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) dup3(r3, r2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000010c0), 0x1000) 06:12:24 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="7584f3e85400e61f7bec64b02e0c1ba3", 0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1, 0x3}, 0x20) 06:12:25 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a7680b6b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) [ 1977.584225][ T3100] dccp_close: ABORT with 1 bytes unread 06:12:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, 0x0, 0x0) 06:12:25 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x0, 0x1}, 0x20) ioctl$int_in(r0, 0x5421, &(0x7f00000000c0)=0x6) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x4080) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000080)) 06:12:25 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a7680c6b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x10000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) [ 1978.297032][ T3131] dccp_close: ABORT with 1 bytes unread 06:12:25 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a7680d6b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:25 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, 0x0, 0x0) 06:12:25 executing program 3: r0 = socket$inet6(0xa, 0x100000000000089, 0x20000000000003) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) r1 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x80, 0x20000) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) r2 = dup(r0) getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x40, 0x728}, {0x1, 0x4}], r3}, 0x18, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000002c0)=0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000280)=""/8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x3, 0x0, 0x25, 0x40}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000003c0)={r4, 0xff, "18897d0dfbfc36f466587615c83c4832525d07fdf5a6179b1f7fbd797aadbfe25b16fd235090280394dda398271774afd1a5e1c82e654eec97f772700829e95605fbcb6acb8d2778cc68ad9a896300316de5876f597bd8099d1e8604c528e5f770c022caaa24bc7385cf842a272187092baec6956bcd71dbf2b181d4763050ef67e31f037e8570ca6bce9ca28dee6250852787dda2a633e8d4379a47ebc71e0be3c495786b3bce156e00e03a8f6f9811627f6f8725cabdebfca1b782c0b8206d4a91db113dde4046fb993969d7baa0338bd2f11c9e86e8d0d210da3ed6e69c7fcd3d59e993c6399eb3c253505cb4dac89a833c1d62b931d4afdab23c2047a5"}, &(0x7f0000000500)=0x107) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000540)=0x81) 06:12:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:25 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a7680e6b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) [ 1978.533859][ T3164] dccp_close: ABORT with 1 bytes unread 06:12:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:26 executing program 3: socket$inet_sctp(0x2, 0x1, 0x84) r0 = socket$inet6(0xa, 0x800, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@empty, 0x3, 0x1, 0x0, 0x0, 0x10001}, 0x20) 06:12:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, 0x0, 0x0) 06:12:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:26 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a7680f6b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0xfeffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:26 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768106b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) [ 1979.279824][ T3196] dccp_close: ABORT with 1 bytes unread 06:12:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x01', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:26 executing program 0 (fault-call:26 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000000006, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x88600, 0x1) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080802}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, r2, 0x10, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x100000001}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x9}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x800) 06:12:26 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:26 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x26c, 0x40401) r1 = socket$inet6(0xa, 0x6, 0xfffffffffffffffc) ioctl$PERF_EVENT_IOC_ID(r0, 0x80042407, &(0x7f0000000080)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f00009ff000/0x600000)=nil, 0x600000}, &(0x7f0000000140)=0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1, 0x0, 0x10000}, 0x20) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000000c0)={0x1, 0x9}) [ 1979.487790][ T3232] dccp_close: ABORT with 1 bytes unread 06:12:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:27 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f602c286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:27 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x20) 06:12:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x200020c0) 06:12:27 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0xfffffffe}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:27 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac205da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:27 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e22, 0x0, @loopback, 0x3cef}, 0xffffffffffffffc6) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:27 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:27 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba99018997717020705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:28 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000080)="9c5cd0347dc2d9a37f") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x9, 0xfffffffffffffffe, 0x0, 0x200000004000, 0x0, 0x10dae1}, 0xffffffe3) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) 06:12:28 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0205ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:28 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f00000001c0)) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040), 0x10) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x1000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:28 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e23, 0xffffffffffff7fff, @loopback, 0x5}, {0xa, 0x4e20, 0xa9, @ipv4={[], [], @local}}, 0x8, [0x81, 0x4, 0x8, 0xffffffffffffff80, 0x9, 0xa0d, 0x7ff, 0x258b]}, 0x5c) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x101000, 0x0) 06:12:28 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0305ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) [ 1981.269621][ T3340] net_ratelimit: 3 callbacks suppressed [ 1981.269631][ T3340] dccp_close: ABORT with 1 bytes unread 06:12:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:28 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r1, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x1, 0x2) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:28 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x501000, 0x0) r2 = getuid() getresgid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) write$P9_RSTATu(r1, &(0x7f00000001c0)={0x59, 0x7d, 0x2, {{0x0, 0x42, 0x7, 0x5, {0x18, 0x0, 0x5}, 0x40000, 0x6, 0x100000000, 0x7, 0x6, 'system', 0x1, '*', 0x8, 'ppp0ppp0'}, 0x2, '{\'', r2, r3, r4}}, 0x59) 06:12:28 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0405ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) [ 1981.647250][ T3377] dccp_close: ABORT with 1 bytes unread 06:12:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:29 executing program 3: r0 = socket$inet6(0xa, 0x80000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x9}, 0x8) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xd) 06:12:29 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0805ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:29 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) getpgid(0xffffffffffffffff) gettid() ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) perf_event_open(0x0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) r3 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000240)={r4, @in6={{0xa, 0x4e22, 0x9, @mcast2, 0x4}}}, &(0x7f0000000300)=0x84) r5 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, 0x0, 0xfffffffffffffe3d) pread64(r2, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0xfe95) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r5, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r5, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r6 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r6, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r5, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r7, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r7, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000006695d7e1b49a845f14466b7b2c25d95d766192b355e8eca085e9d3259b78331dbe64e7c2d6d56757e5e9c978e0af554488a123e3ed86a234a8470deb27321628fcd43f9cac5cb4484c3c4d6de7472c4aaac13c0b786aabe5cdb444c046545a4e3bf5ee0dea1d909f33f7527ad67b1c6bf80593e8dbc01bda3429a462bf1e362cf1a457d21e47efebe5da80ec44651c46c448b182bbea146359f8ac1d398ce9cfd2d1da91e1bf1050b2b02de63e03b469837c765483eb46adb727ad514de7256f69206c236b2656799c39200dda173d9cf7f0902be87ffa89ebc66d095530dd60629b"], 0x8) connect(r7, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r8 = dup3(r7, r6, 0x0) fstat(r5, &(0x7f00000001c0)) read$FUSE(r8, &(0x7f00000010c0), 0x1000) 06:12:29 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x100000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:29 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0905ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01`', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:29 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x263) pread64(r1, &(0x7f0000000040)=""/43, 0xfffffffffffffc7e, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x7f, @local, 0x8001}}, [0x80000001, 0xffff, 0x20, 0x200, 0x10000, 0xffffffffffff0001, 0x4, 0xff, 0x4, 0x1, 0xfffffffffffffffb, 0x200, 0xdd, 0x6, 0x9]}, &(0x7f00000000c0)=0x100) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000100)={r4, 0xffffffffffffff00}, 0x8) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r3, 0x1, 0x1, 0x0, 0x0) sendmmsg(r6, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r6, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r7 = dup3(r6, r5, 0x0) read$FUSE(r7, &(0x7f00000010c0), 0x1000) 06:12:29 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) write$9p(r1, &(0x7f00000000c0)="78c0f85f0c39c7b27e63be9d9831c6", 0xf) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x408000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000180)=0x0) fcntl$lock(r1, 0x6, &(0x7f00000001c0)={0x1, 0x1, 0x7, 0x8e4, r2}) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0x3e}, 0x4) socket$rxrpc(0x21, 0x2, 0xa) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000200)=0x5) ustat(0xb880000000000000, &(0x7f0000000100)) 06:12:29 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0c05ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) ustat(0x3, &(0x7f0000000040)) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'hsr0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="3a0000000100000000000000000000000000000000000000a513589cc8b9d9ca63ad8981e039598ade13ff6c5637842bb05c8b15d981e96e2b7da12236072470ef22a813679304b85d60636a71ecd83e836835608e5d66ed7f888ac4e68b40a2c0a002316742a164643d5e9d876caeca78fabf4b2ff4a995cb199d4dec907e0c51ee31e28f03b7b177612737f7c79413e48ce1"]}) r1 = socket$inet6(0xa, 0x6, 0x3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:30 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0703ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:30 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x800000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:30 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0709ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:30 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000100)=0x8) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="000807291f00692e00000000f4ffffffffffffff0000"], 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x8000) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:30 executing program 3: r0 = socket$inet6(0xa, 0x800, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:31 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba03966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) ioctl$RTC_AIE_OFF(r1, 0x7002) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:31 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x800000000000000, 0x1, 0x0, 0x0, 0x4}, 0x20) 06:12:31 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d066ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x900000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:31 executing program 3: r0 = socket$inet6(0xa, 0x4, 0x0) gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:31 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d116ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000000078fb970de4156a38528cdefed4af62c28a619bc8ce50398740d3ee40744e339a9109a516b700000000000000c3cac42cce0a47158936e777dec0f5838982ff8cbe7127"], 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:31 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d2c6ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:32 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x7, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000040)=ANY=[@ANYBLOB="000000000000000077441b02797acfa62cda220b422a953933d22501f7d46a799d0c34e5f73ce6a5fb9d236776ae5e6f332c696ebb607de5ddca128fda"], 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x83, "0280784c7a789c24096ee6dd3792561f331a73f68737e72c294031e2f147e545e1c8c6926a6626adae62997197dc006b3369220da60c10a7928ab1c581f77b844fbd8968ca75aa38284717e09dbf6f5350c7bea7460dd99375c8c0cfbd5e503fc5c1fe61da3165eba8e237d472403ccfe3613d5d27a86f901b5efd9326a4ce0fda6094"}, &(0x7f0000000000)=0x8b) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000100)={r6, 0x17, "c00067be574672bcdeb46083a5b90d84886907938f55b8"}, &(0x7f0000000280)=0x1f) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:32 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x6, 0x10000) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x4616, @loopback, 0x40000000000000}, 0x1c) r1 = socket$inet6(0xa, 0x80802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:32 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d2f6ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:32 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x1000000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:32 executing program 3: r0 = semget$private(0x0, 0x0, 0x20) semctl$GETZCNT(r0, 0x3dbd0a805b360e33, 0xf, &(0x7f0000000040)=""/129) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:32 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d336ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:32 executing program 3: sched_yield() sync() r0 = socket$inet6(0xa, 0x5, 0x0) r1 = dup2(r0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r2, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, @ib={0x1b, 0x7, 0x1, {"2a3a0cbb8e42cdd342ddd67a70ff42a2"}, 0xffff, 0xffffffffffff0000, 0x10001}}}, 0x118) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000200)={0x34, 0x3, 0x0, {0x0, 0x13, 0x0, ',*-ppp1eth0system(/'}}, 0x34) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1, 0x4}, 0x20) 06:12:32 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(r0, 0x0, 0xcd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) r2 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f00000001c0)=0xc) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000240), 0x4) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef", 0x11) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) kcmp(r4, r6, 0x5, r3, r1) pread64(r1, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000040)=0x100000000) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r3, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r7 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r7, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4(r3, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) 06:12:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:32 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d3a6ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:33 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0xc2, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x7fffffff) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x6, 0x4000) ioctl$VIDIOC_ENUMOUTPUT(r2, 0xc0485630, &(0x7f0000000080)={0x6b9347cd, "200b4d37f8185219152535fb4c1825a777c6dc4d840cefa0826d29b7f30212af", 0x3, 0xf42e, 0x6, 0xf9ff, 0x2}) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) ioctl$TIOCCONS(r2, 0x541d) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:33 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00', 0xf8, "918acf77bddbf5e59164051b84bd488da07550d13fb08b84e3f3f7aeb1a5fb792aae7d3330e31e4991a9ea684c98b068353b85979b8b0845a15d71c30d742d4f08c210952444ad1006098a864c4c74da468d047fa629d83a74c29f8cb05adddae8d3c066c2bf1c36c486ef4a450ecb13ca3149a132cc1700d4feb2f833f654bb3d8864a8424cf3059b58b71769e0895439c2233dc79521daf576f31f34ec14c369d2385a10473076539d96a4ca3e65e0ee943d4edeeab0d4371fa6fcfd02706f184d790171ee53269c0a5090704c89484cef80e17e639db1856ce5ef8bb1265a5fd1da401fda3d6ef67b53c8d619660dc8fb543aa92e5db7"}, &(0x7f0000000040)=0x11c) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:33 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d3b6ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:33 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0xfeffffff00000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:33 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x800}}, 0xffffffff, 0xffff, 0x6, 0x4, 0x7}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e21, 0xffffffffffffffff, @loopback, 0x6}}}, 0x84) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000480)={r1, &(0x7f00000007c0)="f1e23ddc9f49c0b55eb552a2835cbef5bc1898f725a8c7c3f542f810af26caadb094e4a9b8d04f76fa4f371930bedaf584a1c71d66c5836f85244ca534e98286b6d51a8f9dbf40dc2e01e83f3a7d1ceb5eeba0587e18090043ee9275f2b6f49d3e37ac653ebafd422d981e2d1536aa7b016a7457d063441f10601086d348a30c4bace4bd375d4b6ad8e28cbf4631651a05fddd1fafac065e5d936ffde322", &(0x7f0000000a40)=""/241}, 0xc) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) r3 = gettid() r4 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) r6 = gettid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() sendmsg$netlink(r1, &(0x7f0000000780)={&(0x7f00000004c0)=@proc={0x10, 0x0, 0x25dfdbff, 0x240}, 0xc, &(0x7f0000000580)=[{&(0x7f0000000880)=ANY=[@ANYBLOB="abe2036c9beb8e8e5f45d4abb7b8274ffffdbbc5fc3a644d6f016bdb9b3276a520a9b05d2ebd2e0ef744511273b8d02d394c5521966f234e47e8c185be86fc3c46e451a2968d247478226a5da66da8c5c48d50bdc0ca4e376c6ee49141d291617ec5694dd598a7b796b99ddd83713bc7116e9d6bce5fdf75a9032d50c4798d7becc42a884cfe20f09091352852889d6b367d1c8f26"], 0x18}, {&(0x7f0000000540)={0x38, 0x31, 0x9, 0x70bd2c, 0x25dfdbfd, "", [@typed={0x4, 0x52}, @typed={0x14, 0x91, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @nested={0x8, 0x5b, [@typed={0x4, 0x58}]}, @typed={0x8, 0x4c, @fd=r1}]}, 0x38}], 0x2, &(0x7f0000000700)=[@rights={0x18, 0x1, 0x1, [r0, r1, r1]}, @cred={0x18, 0x1, 0x2, r3, r4, r5}, @rights={0x1c, 0x1, 0x1, [r0, r0, r1, r0]}, @cred={0x18, 0x1, 0x2, r6, r7, r8}], 0x64}, 0x4000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'team_slave_1\x00', {0x2, 0x4e20, @empty}}) 06:12:33 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(r0, 0x0, 0x293) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) r2 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000a00)=ANY=[@ANYBLOB="080000000000000002000000000000007000000000000000", @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/112], @ANYBLOB="000000000000000001000000000000000e00000000000000", @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/14], @ANYBLOB="000000000000000000100000000000004900000000000000", @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/73], @ANYBLOB="00000000000000000440000000000000f800000000000000", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/248], @ANYBLOB="00000000000000000060f0df1c210000fe00000000000000252dac3945762833ddde634ef46132dbe789a4b8a0f6", @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000400"/254], @ANYBLOB="00000000000000000050000000000000cb00000000000000", @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00'/203], @ANYBLOB="000000000000000002100000000000003700000000000000", @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/55], @ANYBLOB="000000000000000004300000000000000010000000000000", @ANYPTR64=&(0x7f00000020c0)=ANY=[@ANYBLOB='\x00'/4096], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r1, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r3, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r3, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r6, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f00000008c0)=ANY=[@ANYBLOB="36ddd7f878a417d3ec66b23e00007d6277ab80906440d1f15168da53e77b55f6e982eaebec98a068b35ca0e1810100000000000000cd7c23d803e62868cd1b7ddf4a740fed4ae1cef0f2f486cebb19c0c64c9a9da4a93b265ef94353df778086b353c5e00b9234d39d34e9c2b940137e185c9e6f835e552a6ae5273f809d3ec1ce0fba6ea827668a5cd88d0574f4116aa16ad9507ab4cac4912bb08425c3c1af4bda9e89587afe983e"], 0x8) connect(r6, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r7 = dup3(r6, r5, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000040)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000b40)={{{@in6=@local, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) r10 = getgid() setsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000880)={r8, r9, r10}, 0xc) read$FUSE(r7, &(0x7f00000010c0), 0x1000) 06:12:33 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d3c6ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:33 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'cpu'}, {0x2f, 'memory'}, {0x2b, 'cpu'}, {0x2d, 'cpu'}, {0x2d, 'rdma'}, {0x2d, 'pids'}]}, 0x23) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f00000000c0)={0xb29, 0x4, [0x7ff]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:33 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44039a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:34 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x7ffffffffffffe, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f0000000000)=""/43, 0x14, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0x2c) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f00000006c0)=0x2, 0x0, 0x2, &(0x7f00000004c0)={0x0, 0x989680}, 0x0, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$can_raw(r5, &(0x7f0000000140), 0x10) fcntl$setpipe(r4, 0x407, 0xd9ca) setsockopt(r5, 0x65, 0x1, &(0x7f0000000700)="3b3561ac00814a4548c78d250bdd795fd74ffc69a3565b45f64e53148f3f1ba2f9ef4cd9bc9accca5a9e66aa66083c540e1c390ef3733d2d4aa8d18ac54b2a11459a84cd69778e626bf2180598cf27123f9e627bf4e0467e04f91dd4c9824be1fec0ce58dd168688e6c45a2d8381f4c9a4dfa0fdbb9c9f9e0ffe482aabc46830685fd52c4413cd4d9929999530dec36e01bfcd34099fbe33339b575ff07af0ec8c1a3c4470c103362070b6230923b6a576f83bd964cdafeaeec9e341d82f90054773b4bb1886feeab2b03ec217b9c7e1caba03da6c718f16cbf30431abe8bb25295fb02cdf4fe3a04f89cf9cc5152d48d92b3f8c9e53beb90474488822da8c6ff25760c06fa435f9d0854024945f872c2d61c78c2db8a5d40e8acbd8c00e008aa50d36c09ac673fb47850a7bf8c3394a2e8112c10c10b5c9a7ee6d364ca52a1e1422e433bb020f2e74eb600033d1af7f5e2bd98ba21417e6daa73284c958ac353dc9add51e9b3ce7558cd3f47417d148444ac3a4012a393f87f3edfe83a68f9c5c80fa3e3605150e199f0443b908f11934f96745dcdf9079b275908bdfa7f470c6583c2f17d00f865afa83a0161d65624de63dfa09e359e1eb0000000100000000b8726651fba34a330eb4d117571008a9634576a1d3e245355788c524a072e1dd361370769a3250291fbb1c0015bbe190d93320e4cf2bfe640f9082a4a33524291403c723ff866b37e651eb32b16803511b5e4ca7afa48ff5dba1559deb21413bee6d818b648d60e299d9ef9e39846d771f4eb6e2fbefac6290fc2cbb1af648451675a870b77b956db74420005e9393520c971741bb4529", 0x258) fgetxattr(r3, 0x0, &(0x7f0000000e80)=""/214, 0x319) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'icmp6\x00'}, 0x0) pwrite64(r4, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000100)={0x0, 0x80000, r1}) write$eventfd(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9) 06:12:34 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0106434, &(0x7f00000000c0)={0x401, 0x0, 0x10001, 0x4}) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000040), 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@rand_addr=0x3f, 0x4e21, 0x1, 0x4e22, 0x484, 0xa, 0x20, 0xa0, 0x8d, r2, r3}, {0x0, 0xa0, 0x4000000000000000, 0xffffffff, 0x8, 0x5, 0x3, 0xb4e}, {0xfff, 0x6, 0x5, 0x8}, 0x8, 0x6e6bbd, 0x1, 0x1, 0x2, 0x3}, {{@in6=@ipv4={[], [], @local}, 0x4d6, 0x32}, 0xa, @in=@broadcast, 0x3502, 0x7, 0x0, 0x3f, 0x5, 0x5}}, 0xe8) getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', r4}) accept4$inet6(r1, 0x0, &(0x7f00000001c0), 0x80800) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) 06:12:34 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44049a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:34 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x8}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:34 executing program 3: r0 = socket$inet6(0xa, 0x7fffd, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100)=0xff, 0x4) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000080)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1, 0x0, 0x1}, 0x20) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={r2, 0x6}, &(0x7f00000001c0)=0x8) 06:12:34 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44099a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:34 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) getsockopt$inet6_buf(r0, 0x29, 0x2b, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) [ 1987.488720][ T3692] IPVS: ftp: loaded support on port[0] = 21 06:12:35 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a02f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:35 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) [ 1988.089204][ T3731] IPVS: ftp: loaded support on port[0] = 21 06:12:35 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e1f, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:35 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="00dfe2a9363a9f4b6b6130fe2808c65e", 0x3, 0x1}, 0x20) 06:12:35 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a03f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:35 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:35 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x14000, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x9, 0xfffffffffffff001, 0x3, 0x9}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e22, 0x8, @loopback, 0x3}}, [0x1, 0x2, 0x6, 0x7, 0x80000000, 0xffffffffffff31c2, 0x1, 0x37bcabff, 0xb26, 0x6, 0x6, 0x1, 0x3, 0x1f, 0x1a]}, &(0x7f0000000200)=0x100) r2 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000340)={@mcast2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40000000000}, 0x8) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000380)=""/160) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) creat(&(0x7f0000000500)='./file0\x00', 0x174) bind$unix(r2, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) r7 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$set_timeout(0xf, r7, 0x7) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000004c0)=@req={0x20, &(0x7f0000000480)={'nlmon0\x00', @ifru_flags=0x7200}}) write$evdev(r0, &(0x7f00000002c0)=[{{0x77359400}, 0x3, 0x596bb040, 0x100000001}, {{0x0, 0x2710}, 0x1f, 0x5, 0x1}, {{0x77359400}, 0x15, 0x26a4}, {{r3, r4/1000+30000}, 0x1f, 0x2, 0x4d2b}, {{}, 0x11, 0x200, 0x7ff}, {{r5, r6/1000+10000}, 0x3, 0x101, 0x7}, {{0x0, 0x2710}, 0x16, 0x2, 0x7fff}], 0x70) 06:12:35 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a04f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:35 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r1, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl(r0, 0x4, &(0x7f00000001c0)="87af8ff3b1e7a1a933f9c64ef2c4545c4fb2798d0178c305f9ed289a03dc1b44f971ff9aff3280de4749130abd73e442760602bc6375aa1beeb93d58b3a31bfd8fa29aa35f3630797f44b17916730a0b9b63616cbbd4fd6c8b6f971e460935a4d08000f5f35464d25dbd2bd9bf46a22692d60c975bacc3d00f71d455200cbd6b5f0a5e1894be73d1a98ac30d4aae49328d21625ad059fa6261108e4df1a01a8ba379716296c075d158f9e4bb80b800b4de5bb98588eeb6a8347b456fd74692b632746cdff93e6c1d1ada022f") listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r1, 0x1, 0x13f, 0xc5f4, 0x5edd}) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000000040)={0x93, 0x7554, 0x8, 0x4, 0xd17}) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:35 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x40, 0x5) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000100)=0x80000000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @local}, 0x0, 0x1}, 0x20) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000080)={0x375, 0x2, 0x3}) 06:12:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:36 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a05f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:36 executing program 3 (fault-call:6 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) sendfile(r2, r5, &(0x7f0000000040), 0xfffffffffffffc01) 06:12:36 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x10}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:36 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a07f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x622000, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) r2 = syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x1f6) pread64(r1, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r3, 0x20000003) ioctl$BLKROTATIONAL(r2, 0x127e, 0x0) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r2, 0x0, 0x0, 0x80000) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r6, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="000079e4d5a3f2ddff15f20000004793373c24332554ea000085e969"], 0x8) connect(r6, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r7 = dup3(r6, r5, 0x0) read$FUSE(r7, &(0x7f00000010c0), 0x1000) 06:12:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:36 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a09f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000040), 0x4) r5 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r5, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) write$P9_RREAD(r1, &(0x7f00000001c0)={0x4c, 0x75, 0x2, {0x41, "9dde710c1c0a3717e5040eb257201764629e33d59c07c1a12d0cc91c30abf1891e0ac7a2e99ea917d3fd21815440f4c275810154912fc82592884c57f978483206"}}, 0x4c) setsockopt$inet6_opts(r5, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r5, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r6 = dup3(r5, r4, 0x0) read$FUSE(r6, &(0x7f00000010c0), 0x1000) 06:12:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:37 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a0af46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) [ 1989.917060][ T3797] FAULT_INJECTION: forcing a failure. [ 1989.917060][ T3797] name failslab, interval 1, probability 0, space 0, times 0 [ 1989.937583][ T3797] CPU: 0 PID: 3797 Comm: syz-executor.3 Not tainted 5.1.0+ #3 [ 1989.945080][ T3797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1989.955130][ T3797] Call Trace: [ 1989.958509][ T3797] dump_stack+0x172/0x1f0 [ 1989.962929][ T3797] should_fail.cold+0xa/0x15 [ 1989.967521][ T3797] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1989.973328][ T3797] ? ___might_sleep+0x163/0x280 [ 1989.978183][ T3797] __should_failslab+0x121/0x190 [ 1989.983120][ T3797] should_failslab+0x9/0x14 [ 1989.987619][ T3797] kmem_cache_alloc+0x2b2/0x6f0 [ 1989.992470][ T3797] ? kasan_check_write+0x14/0x20 [ 1989.997411][ T3797] taskstats_exit+0x6c8/0xcf0 [ 1990.002089][ T3797] ? taskstats_user_cmd+0xce0/0xce0 [ 1990.007293][ T3797] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1990.012493][ T3797] ? acct_collect+0x699/0x860 [ 1990.017175][ T3797] do_exit+0x3d4/0x2fa0 [ 1990.021329][ T3797] ? find_held_lock+0x35/0x130 [ 1990.026098][ T3797] ? get_signal+0x331/0x1d50 [ 1990.030692][ T3797] ? find_held_lock+0x35/0x130 [ 1990.035468][ T3797] ? mm_update_next_owner+0x640/0x640 [ 1990.040843][ T3797] ? kasan_check_write+0x14/0x20 [ 1990.045783][ T3797] ? _raw_spin_unlock_irq+0x28/0x90 [ 1990.050985][ T3797] ? get_signal+0x331/0x1d50 [ 1990.055576][ T3797] ? _raw_spin_unlock_irq+0x28/0x90 [ 1990.060783][ T3797] do_group_exit+0x135/0x370 [ 1990.065379][ T3797] get_signal+0x399/0x1d50 [ 1990.069799][ T3797] ? poll_freewait+0x260/0x260 [ 1990.074566][ T3797] ? lock_downgrade+0x880/0x880 [ 1990.079864][ T3797] do_signal+0x87/0x1900 [ 1990.084111][ T3797] ? do_compat_pselect+0x183/0x270 [ 1990.089227][ T3797] ? setup_sigcontext+0x7d0/0x7d0 [ 1990.094250][ T3797] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1990.100585][ T3797] ? fput_many+0x12c/0x1a0 [ 1990.105180][ T3797] ? ksys_write+0x1cf/0x290 [ 1990.109682][ T3797] ? exit_to_usermode_loop+0x43/0x2c0 [ 1990.115058][ T3797] ? do_fast_syscall_32+0xb30/0xd54 [ 1990.120253][ T3797] ? exit_to_usermode_loop+0x43/0x2c0 [ 1990.125626][ T3797] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1990.130913][ T3797] ? trace_hardirqs_on+0x67/0x230 [ 1990.135938][ T3797] exit_to_usermode_loop+0x244/0x2c0 [ 1990.141229][ T3797] do_fast_syscall_32+0xb30/0xd54 [ 1990.146262][ T3797] entry_SYSENTER_compat+0x70/0x7f [ 1990.151370][ T3797] RIP: 0023:0xf7f7c849 [ 1990.155438][ T3797] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1990.175843][ T3797] RSP: 002b:00000000f5d570cc EFLAGS: 00000296 ORIG_RAX: 0000000000000134 [ 1990.184248][ T3797] RAX: fffffffffffffdfe RBX: 0000000000000040 RCX: 00000000200000c0 [ 1990.192212][ T3797] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000000 [ 1990.200181][ T3797] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1990.208159][ T3797] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1990.216131][ T3797] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 06:12:37 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000340)={'vcan0\x00', r5}) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000c0b8be88af47a39ba79b606fff06db50000062be0000e4218b7fb5aab0273df70e3e2c30efc7b382930a3bc67cff5c024af7b6ece83d3cfa6da1069f8da4767dd148266ebd877a89abe84e8131cf99c428f8"], 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r6 = dup3(r4, r3, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r6, 0xc0084320, &(0x7f0000000040)={0x2, &(0x7f0000000000)="21104f4b096c7dc1d66bac3bf8fe7a688d3bb6fdda494cd29240d2789c0c2dd7f8756d7d"}) read$FUSE(r6, &(0x7f00000010c0), 0x1000) 06:12:37 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x900}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:37 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380373c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:37 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:37 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(0x0, r1, 0x0, r0, 0x0) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r2, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r3, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept4(r3, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r5, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r5, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r5, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r6 = dup3(r5, r4, 0x0) read$FUSE(r6, &(0x7f00000010c0), 0x1000) 06:12:37 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a381073c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:38 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0x10, 0x100080000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60f00000a84302910000003900090023000c00020000000d000500ff0000000000c78b80082314e9030b9d566885b16732009b84e7b1df136ef75afb0000000004000000", 0x55}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r1, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) futex(&(0x7f0000000100)=0x1, 0x8c, 0x0, &(0x7f0000000200)={0x0, 0x989680}, &(0x7f0000000240), 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:38 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x207a8080) 06:12:38 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:38 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write(r2, &(0x7f00000001c0)="ab6997822c4003024bce5ac1feb9e444c9e4b424ab4dde76e21c571eb84baef655832e9f974b4084fd6f0dabef06d67cc23146e63de8d2350899829241505714089ec4e7e7b11fe2b28d1749986096fe3dcb7d6ed8167f513c0cfeb0890765edca3087a07ea524f4f0361b98b68cc68ccd8ba235044dc389589c57beaf1a24cfae52e7bdb9b4a917abebad27fd9cef0a3c702541cfa18b3c193f5af931f9ce4f7744e31879b54111f6a5d119905ac66e43a61cb57d215794d76b869c791ab4b7847973bfe1a2e063729c7a7fe4ae2a63707efaf4d1c7962045583e5991b6555d86be2ad4eaf0f2cc403f97a9bbb2a79ebf115b96fa", 0xf5) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="1d00000003000000"], 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:38 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x1000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:38 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) chroot(&(0x7f0000000000)='./file0\x00') listen(r0, 0x20000003) socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback, 0x200000000000}, 0x1c) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, 0x0, 0x0) connect(r1, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:38 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:38 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00V'], 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:38 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2200, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000100)=0x8000) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000080)={r4, 0x100000001}, 0x8) 06:12:38 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0x1, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0xfffffffffffffe57) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000200000000"], 0xfffffffffffffebe) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:39 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:39 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000040)=0x7) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r2 = socket$inet6(0xa, 0x400000000006, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000080)=0x0) getpgid(r3) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$tipc(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x80000) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, 0x0, 0x0) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:39 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x2) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xa0, 0x40800) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="0008000000000000ef63c5320249f1bea232c625326bed1798e920fb0008987826231c18ee5dcf5911d3953e26a547edb2616a5300785a2018e9321a16adc213255f225d74783264ee8e37c06882740cdfbd9f379ccd7d1a1da916b43c918589f5e58335fe26fa5669685421aeac714c429d26a6ed"], 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) ioctl$PPPIOCATTACH(r5, 0x4004743d, &(0x7f0000000040)=0x3) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:39 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x8000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:39 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:39 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="000000000001000028283e72c2e68b3e9cf1812aa98047c4160663370a414ea1524defedfe11fa5e1954ce1881163206ac98dfb12c82e192c097cf3b7f399f48cc65088dd26d821dbc06cdf42fedb83230b41d470ae8b5a589e3e608e4f905613049b6f9542316e6ff399c692a6acd099bdafb2cf1d5cf8d30078e48f0af75b9ce76f8a6e43999351cbd83923ddb2e37853d23359310d9897cc7ce77ce49219f2f00de9873308dc443"], 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:39 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x20000003) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, 0x0, 0x0) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:40 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x3, 0x800000000002) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000040)={0x1b, 0x7, 0x1, {{0xe, '/dev/snapshot\x00'}, 0x7f}}, 0x1b) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:40 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x234401}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r2, 0x8, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x14, 0x13, @l2={'eth', 0x3a, 'syzkaller0\x00'}}}, ["", "", "", "", ""]}, 0x30}}, 0x10) listen(r0, 0x300000001) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, 0x0, 0x0) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:40 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x9000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0xf, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) r2 = msgget(0x3, 0x40) msgctl$MSG_INFO(r2, 0xc, &(0x7f00000001c0)=""/140) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:40 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:40 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in=@rand_addr=0xfffffffffffffffc, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e22, 0x7f0000000, 0x4e21, 0x6, 0xa, 0x0, 0x20, 0xaf, r1, r2}, {0x5, 0x20, 0xffffffff, 0xd1c, 0x3, 0x5, 0x0, 0x7fff}, {0x40000000000000, 0x7, 0x2, 0x4}, 0xd5c, 0x6e6bb3, 0x1, 0x1, 0x2}, {{@in=@remote, 0x4d4, 0x3c}, 0x0, @in6=@empty, 0x3504, 0x5, 0x2, 0x0, 0x80000001, 0x9, 0x80000000}}, 0xe8) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, 0x0, 0x0) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:41 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = open(&(0x7f0000000000)='./file0\x00', 0x80400, 0x70) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000040)={0x1, 0xfc9}, 0x2) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000080)=0x40) r3 = accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0xbd, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, 0x0, 0x0) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="4000100000000000"], 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x80000) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:41 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x6f4, 0x4ec, 0x130, 0x3b8, 0x264, 0x3b8, 0x628, 0x628, 0x628, 0x628, 0x628, 0x6, &(0x7f0000000000), {[{{@ipv6={@ipv4={[], [], @broadcast}, @local, [0xff, 0xffffff00], [], '\x00', 'bridge0\x00', {0xff}, {0xff}, 0x21, 0x8001, 0x4, 0x48}, 0x0, 0xec, 0x130, 0x0, {}, [@inet=@rpfilter={0x24, 'rpfilter\x00', 0x0, {0x496a7e123c3c30c9}}]}, @common=@inet=@TEE={0x44, 'TEE\x00', 0x1, {@ipv6=@rand_addr="1c165ac442ba082a21400d3b7d3012bf", 'rose0\x00', 0x80000000}}}, {{@uncond, 0x0, 0x110, 0x134, 0x0, {}, [@common=@hl={0x24, 'hl\x00', 0x0, {0x3, 0x8}}, @inet=@rpfilter={0x24, 'rpfilter\x00', 0x0, {0x3}}]}, @common=@inet=@SYNPROXY={0x24, 'SYNPROXY\x00', 0x0, {0x4, 0x2, 0x2}}}, {{@ipv6={@remote, @mcast2, [0xffffffff, 0xffffff00, 0xffffffff, 0xff], [0xffffff00, 0xffffff00, 0xffffffff], 'veth1_to_bridge\x00', 'tunl0\x00', {0xff}, {0xff}, 0x6f, 0x100, 0x1, 0x24}, 0x0, 0x110, 0x154, 0x0, {}, [@inet=@rpfilter={0x24, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x24, 'rpfilter\x00'}]}, @SNPT={0x44, 'SNPT\x00', 0x0, {@ipv4=@multicast1, @ipv6=@ipv4={[], [], @multicast1}, 0x9, 0x38, 0x4}}}, {{@ipv6={@ipv4={[], [], @local}, @local, [0xffffff00, 0xff000000, 0xff, 0xff000000], [0xffffffff, 0xff, 0xffffffff, 0xff000000], 'veth1_to_team\x00', 'ip_vti0\x00', {}, {}, 0x2e, 0x9, 0x0, 0x21}, 0x0, 0x110, 0x134, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x1, 0x1, 0x1, [0x5, 0x3, 0x8, 0x9, 0xffffffffffffffff, 0x100000001, 0x3, 0x1, 0x5, 0x1, 0x46, 0x5, 0x9, 0x8, 0xa469, 0xffff], 0x10}}]}, @HL={0x24, 'HL\x00', 0x0, {0x0, 0x100}}}, {{@ipv6={@local, @mcast2, [0xffffffff, 0xffffff00, 0xff, 0xffffff00], [0xffffffff, 0xffffffff, 0xffffffff], 'ip_vti0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x0, 0x9, 0x0, 0x38}, 0x0, 0x118, 0x13c, 0x0, {}, [@common=@srh={0x2c, 'srh\x00', 0x0, {0x33, 0xecb, 0x7ff, 0x2, 0x8, 0x10, 0x2000}}, @inet=@rpfilter={0x24, 'rpfilter\x00', 0x0, {0x2}}]}, @common=@unspec=@NFQUEUE1={0x24, 'NFQUEUE\x00', 0x1, {0xc9a2, 0x2}}}], {{[], 0x0, 0xa8, 0xcc}, {0x24}}}}, 0x750) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x10000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/43, 0x2b, 0x2) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:41 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:41 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:42 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000e3ea"], 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:42 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) ioctl$sock_proto_private(r0, 0x89e8, &(0x7f0000000000)="ce7e5995e2cae8c9e1e28e14566e5f61da39efab187d66b789d101b74fa99c13bffb8c2f0393cb51c2568f2c4511a2f6ee7f78378f697cf5730c8af81aa30301f83b58f9a55db6c27c86080313a91ee00a1905b1dbcb183782529a8c840053b6748edbb198752aad49bec02a56fd6405a901258e2a8a4fd6e7a2eebb4e32dc91131b0fa0b1c721815c7a3858dad5ff41037163eb8b72") bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$KVM_SET_TSC_KHZ(r3, 0xaea2, 0x1f) 06:12:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x8, 0x800) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = dup2(r0, r3) recvmmsg(r4, &(0x7f0000000d00)=[{{&(0x7f0000000380)=@rc, 0x80, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000080)=""/62, 0x3e}], 0x2, &(0x7f0000000580)=""/110, 0x6e}, 0x3ff}, {{&(0x7f0000000600)=@nfc_llcp, 0x80, 0x0}, 0x5}], 0x2, 0x2100, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000240)=0x6, 0x4) sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x1) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2120200}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)={0xc4, 0x0, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x13c7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcee2}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x40080}, 0x44000) dup2(r3, r2) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r5, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r6, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r6, 0x20000003) 06:12:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:42 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0xfeffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:42 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0xa223) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:42 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) r2 = getpgid(0x0) r3 = perf_event_open(0x0, r2, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0xaf) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r4, 0x20000003) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r6 = socket$inet6(0xa, 0x5, 0xffdffffffffffff9) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback, 0x4}, 0xffffffffffffff0d) clock_nanosleep(0x0, 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000100)) r7 = accept4(r6, 0x0, 0x0, 0x800) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r7, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r7, 0x29, 0x37, &(0x7f0000000240)=ANY=[@ANYRES64=r3], 0x1) connect(r7, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r8 = dup3(r7, r6, 0x0) read$FUSE(r8, &(0x7f00000010c0), 0x1000) 06:12:42 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x900, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:42 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x78, r3, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x20}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x200}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x101}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x1) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, 0x0, 0x0) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:42 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x7704, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000040)=ANY=[], 0x0) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:43 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) flistxattr(r1, &(0x7f0000000000)=""/8, 0x8) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x36, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x100, @mcast2}}, 0x80000001, 0x7de, 0x0, 0x7, 0x10}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r3, 0x8}, 0x8) 06:12:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:43 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x4e20, 0x2, @loopback, 0xffffffffffffffff}, 0x1c) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) connect(r1, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0xfffffffe}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0x101000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000129bd7000fcdbdf250b00000008000400040400004400030008000500ffffffff140065e80600fffffffffffffffff80000000000000114000600ff01000000000000000000000000cab3ebcc99be7694ae72e2eab9ef93b100010800040046000000080004000800000004000300080005002f006d2edbe491a270c4047fca0ecaec458f"], 0x6c}, 0x1, 0x0, 0x0, 0x44}, 0x10) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r2, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r3, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept4(r3, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r5, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r5, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r5, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r6 = dup3(r5, r4, 0x0) read$FUSE(r6, &(0x7f00000010c0), 0x1000) 06:12:43 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:43 executing program 2: r0 = socket$inet6(0xa, 0x8000a, 0x4) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000100)=[r0, r0, r0, r0, r0], 0x5) listen(r0, 0x20000003) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, 0x0, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5, 0x42) ioctl$TIOCLINUX7(r4, 0x541c, &(0x7f0000000080)={0x7, 0xe3}) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'sit0\x00', {0x2, 0x4e21, @multicast1}}) 06:12:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:43 executing program 0: modify_ldt$write(0x1, &(0x7f0000000100)={0xfffffffffffffffe, 0x20000800, 0x0, 0x1, 0x2, 0x7, 0x200, 0x8, 0x5, 0x1ff}, 0x10) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r1, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="0000b50000000000"], 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000040)={0x25, 0x497e7f5b, 0x2, @stepwise={0x0, 0x8, 0x3, 0xffff, 0x164bf8af}}) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:43 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x4, 0xfffffffffffffffc) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3f, 0x0, 0x9c) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4, 0x1f}}, 0x10) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000140)={'nr0\x00', 0x5}) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000180)=""/14) 06:12:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x800, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24, 0x2, @dev={0xfe, 0x80, [], 0x29}, 0x2}, 0x1c) r2 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r3, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept4(r3, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r5, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r5, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='$cgroup:vmnet1vmnet0-#eth1\x00', r2}, 0x10) connect(r5, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r6 = dup3(r5, r4, 0x0) read$FUSE(r6, &(0x7f00000010c0), 0x1000) 06:12:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:44 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:44 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r1, &(0x7f0000000080)=@in={0x2, 0x0, @local}, &(0x7f0000000100)=0x80, 0x800) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x8) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e22, 0x6, @mcast1, 0x8}, {0xa, 0x4e24, 0x7f, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, 0xa51a, [0x10001, 0x8, 0x3, 0x1000, 0x7, 0x8000, 0x10000, 0x7]}, 0x5c) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, 0x0, 0x0) connect(r3, &(0x7f00000001c0)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x1000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, 0x0, 0x0, 0x0) ioctl$KDDELIO(r2, 0x4b35, 0x10001) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x0) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:44 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20400, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:44 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x40, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:45 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r1, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r5, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r5, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="00499f4760ccd2ff"], 0x8) connect(r5, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f00000001c0)={{0x3a, @local, 0x4e24, 0x4, 'rr\x00', 0x10, 0x3, 0x33}, {@broadcast, 0x4e20, 0x1, 0x44, 0x4, 0x1}}, 0x44) dup3(r0, r4, 0x0) read$FUSE(r3, &(0x7f00000010c0), 0x1000) 06:12:45 executing program 2: prctl$PR_GET_NAME(0x10, &(0x7f0000000040)=""/103) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x1) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000100)) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000040)={0x7, 0x0, 0x7e}) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f0000000000)={0x9, 0x80000001}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000001c0)={0x110000, 0x1000}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102], 0x1f004}) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = accept4(r0, 0x0, 0x0, 0x800) setsockopt$inet6_opts(r6, 0x29, 0x37, 0x0, 0x0) connect(r6, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x100000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:45 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x34e) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:45 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, 0x0, 0x38) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:45 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:45 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x400) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x304, 0x0, 0x130, 0x130, 0x0, 0x0, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, &(0x7f0000000080), {[{{@uncond, 0x0, 0x110, 0x130, 0x0, {}, [@inet=@rpfilter={0x24, 'rpfilter\x00', 0x0, {0x9}}, @inet=@rpfilter={0x24, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0xc8, 0x108}, @unspec=@CT0={0x40, 'CT\x00', 0x0, {0x1, 0x1, 0x54, 0x8000, 'snmp_trap\x00', 0x3}}}], {{[], 0x0, 0xa8, 0xcc}, {0x24}}}}, 0x360) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000040)={0xe, 0xa, 0x6, 0x4c, 0x6, "ac2b5286ef67"}, 0x12) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, 0x0, 0x0) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:46 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:46 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f0000000000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0xfffffffffffffe9f) 06:12:46 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x9000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:46 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000000)=""/146, &(0x7f00000000c0)=0x92) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x56, 0x10001, 0x8000}, 0x8) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x800000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:46 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(r0, 0x0, 0xfffffffffffffe7a) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r1, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000000000c00eb88bf75b1b3d2ea43340f315ec46aceea7d9cae66439dc2081750685cee00000b1bc1af3c304e477c5fcf90300e9ad9c285f6c9cc35bd4b9ce19acaf821adca274af6ebbb7fb7734e1473f1e22b048c70a6a1dfbe2227d05cdcee5a9728abb3a2d158dacc038302680ed204a14b9a45a9a190eec197245cd85cced7a84ceff5df40fb9657dbdd2c5b2ff19814e0e0f07643e226820c9716601c6aab05399c4e4b3682fb421f000"/197], 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:46 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8002, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000040)) 06:12:46 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f00000001c0)) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r1, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) ioctl$UI_DEV_DESTROY(r2, 0x5502) prctl$PR_GET_TIMERSLACK(0x1e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:47 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0xc15fbf24abf8c713) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x2000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(r2, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000000000000004e9c9f872a276f5073f83f34246df3a938fea4c16724628e05bc8bdff650352cc840895bcdbbde40efadc3b9751ed1a8d120aefdc51a57409d292c665de84319bcf1f3c087647b79c15f73a5184206836c87c80c9f9538b26b2afad5532c417d2ba2a8d0ea73e2139b4d49c6bb795bc33830f9e9ef44f2cba0c7569862db00b8b991e5a553b73933ca7b03d106eadc43b038b1a31c840c69dcf3739783b0"], 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:47 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, 0x0, 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06055c8, &(0x7f00000001c0)={0x0, 0x3, {0x0, 0x4c3, 0x0, {0x30, 0x4}, {0x1, 0x8}, @cond=[{0x8000, 0xce9, 0x3, 0x800, 0x2, 0x6}, {0x100, 0x8000, 0x1000, 0x20, 0x12, 0x7}]}, {0x53, 0x7fff, 0x0, {0x374, 0x5}, {0x6, 0x100}, @period={0x5b, 0x0, 0x100000001, 0x7f, 0x1b23, {0x100000001, 0x2c, 0x0, 0x2}, 0x7, &(0x7f0000000040)=[0x3, 0x80000001, 0xf0bd, 0xfed, 0x61c, 0x1, 0xffffffffffffffc0]}}}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="9f5ba5af8c88cbf3"], 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x900000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x100000000) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xffff, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000040)={0x6, 0x0, 0x401}) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) socket$inet6(0xa, 0x8000b, 0xfc0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000140)={@in6={0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, {&(0x7f0000000080)=""/73, 0x49}, &(0x7f0000000100)}, 0x9c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x30, 0x0) r1 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x10004) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0xfffffffffffffd6a) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000001c0)={0x0, 0x80000000}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000240)={r4, @in6={{0xa, 0x4e22, 0x3ff, @dev={0xfe, 0x80, [], 0x1c}, 0x2}}, 0x2, 0x4, 0x80000001, 0x10001, 0x68}, &(0x7f0000000300)=0x98) r5 = socket$inet6(0xa, 0x6, 0x0) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000340)={0x5, 0x3ff}) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000100)={0x0, 0x3, 0x2, &(0x7f0000000000)=0xfffffffffffffffa}) r6 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r6, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f0000000040)=ANY=[@ANYBLOB="000000000000d6819c65a1074bcae72bfddffc9f2a9cc3"], 0x8) connect(r6, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r7 = dup3(r6, r5, 0x0) read$FUSE(r7, &(0x7f00000010c0), 0x1000) 06:12:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r1, &(0x7f00000003c0)=@ipx={0x4, 0x8001, 0x100, "96002d307f1a", 0x4}, 0xffffffffffffff1d) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:47 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:48 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) r2 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) dup2(r2, r0) pread64(r1, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r4, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r5, 0xc038563b, &(0x7f0000000040)={0x0, 0x0, {0x7c6, 0x4, 0x6, 0xffff}}) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r6, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000df00a6cf4d7070a22f2e520c2bfc112096303736fc92727c5da4c9d245d4e391cf4f125972af3f00aeeac59505ade820bf71c75bb89b59252ed9bc1bdeb4a2c7ae339a25aedc91f222f76d30fd1a6979596518f54a7867bb5e2934f4d2b60ec03d078026a99b1fa33f1ad5db2a1c9d88b8f74a9eef93cb338ff2715758b6832de1cba2634096dd45e3996e871ba9dc135577229ebf7ea4b67eec0d929bc0565499d355"], 0x8) connect(r6, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r7 = dup3(r6, r3, 0x200000000) read$FUSE(r7, &(0x7f00000010c0), 0x1000) 06:12:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x1000000000000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(r2, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x1, &(0x7f0000000100)=0x4) 06:12:48 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0x6, 0x4) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x124) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000080)=""/45) 06:12:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='bond_slave_0\x00') bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r2, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r4, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = dup3(r4, r3, 0x0) read$FUSE(r5, &(0x7f00000010c0), 0x1000) 06:12:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0x7, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:48 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000080)={{r2, r3/1000+30000}, 0x17, 0x5, 0x5}, 0x10) listen(r0, 0x20000003) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r5, 0x29, 0x37, 0x0, 0x0) connect(r5, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:48 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:48 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000f8ff"], 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:49 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) waitid(0x2, r1, &(0x7f0000000040), 0x40000000, &(0x7f00000000c0)) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000140)) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r2, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x94, r3, 0x0, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xea8}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff80000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x415}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x80}, 0x0) listen(r0, 0x20000003) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r5, 0x29, 0x37, 0x0, 0x0) connect(r5, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) 06:12:49 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0xfeffffff00000000}, 0x0, &(0x7f0000000140)={0x1b5}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac9b}], 0x1, 0x0) 06:12:49 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/43, 0x2b, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) listen(r1, 0x20000003) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x80800) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000180)="19", 0x1}], 0x1, 0x0, 0x0, 0x4000001}}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r4 = dup3(r3, r2, 0x0) read$FUSE(r4, &(0x7f00000010c0), 0x1000) 06:12:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@nat={'nat\x00', 0x19, 0x6, 0x360, [0x20000100, 0x0, 0x0, 0x20000130, 0x200003a4], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x11, 0x10, 0x1, 'dummy0\x00', 'netdevsim0\x00', 'lapb0\x00', 'erspan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff], @random="18ef5b299d88", [0x0, 0x15f2b7f6901dc95f, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@snat={'snat\x00', 0x25, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xfffffffffffffffc}}}, @snat={'snat\x00', 0xc, {{@dev={[], 0x22}}}}]}, @snat={'snat\x00', 0xc, {{@random="7c619543c4c6"}}}}, {{{0x3, 0x36, 0x88f5, 'irlan0\x00', 'ip6gretap0\x00', 'syzkaller0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0xd8, 0x108, 0x138, [@state={'state\x00', 0x4, {{0x7f}}}, @ip={'ip\x00', 0x1c, {{@multicast1, @dev={0xac, 0x14, 0x14, 0xb}, 0xff0000ff, 0xffffffff, 0x6, 0xff, 0x8, 0x10, 0x4e21, 0x4e21, 0x4e24, 0x4e21}}}]}, [@snat={'snat\x00', 0xc, {{@local, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0xc, {{@broadcast, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'vlan0\x00', 'veth0_to_bridge\x00', @empty, [], @local, [], 0x70, 0x70, 0x98}}, @common=@redirect={'redirect\x00', 0x4}}]}]}, 0x3b0) 06:12:49 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1000000020000003) r1 = socket$inet6(0xa, 0x5, 0x8040007) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vfio/vfio\x00', 0xa080, 0x0) connect$l2tp(r2, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x23}}, 0x3, 0x1, 0x0, 0x4}}, 0x2e) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000380)={0xa, 0x4, 0xfa00, {r3}}, 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/114, 0x72}], 0x1, &(0x7f0000000140)=""/173, 0xad}, 0x160) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'irlan0\x00', r4}) r5 = accept4(r0, 0x0, 0x0, 0x80800) setsockopt$inet6_opts(r5, 0x29, 0x37, 0x0, 0x0) connect(r5, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) [ 2002.119341][ T4536] WARNING: CPU: 1 PID: 4536 at net/bridge/netfilter/ebtables.c:2156 compat_copy_entries+0x1148/0x1390 [ 2002.130649][ T4536] Kernel panic - not syncing: panic_on_warn set ... [ 2002.137268][ T4536] CPU: 1 PID: 4536 Comm: syz-executor.5 Not tainted 5.1.0+ #3 [ 2002.144734][ T4536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2002.154797][ T4536] Call Trace: [ 2002.158098][ T4536] dump_stack+0x172/0x1f0 [ 2002.162446][ T4536] ? compat_copy_entries+0x1140/0x1390 [ 2002.167913][ T4536] panic+0x2cb/0x65c [ 2002.171813][ T4536] ? __warn_printk+0xf3/0xf3 [ 2002.176418][ T4536] ? compat_copy_entries+0x1148/0x1390 [ 2002.181882][ T4536] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2002.188138][ T4536] ? __warn.cold+0x5/0x45 [ 2002.192481][ T4536] ? compat_copy_entries+0x1148/0x1390 [ 2002.197948][ T4536] __warn.cold+0x20/0x45 [ 2002.202200][ T4536] ? compat_copy_entries+0x1148/0x1390 [ 2002.207679][ T4536] report_bug+0x263/0x2b0 [ 2002.212042][ T4536] do_error_trap+0x11b/0x200 [ 2002.216667][ T4536] do_invalid_op+0x37/0x50 [ 2002.221093][ T4536] ? compat_copy_entries+0x1148/0x1390 [ 2002.226571][ T4536] invalid_op+0x14/0x20 [ 2002.230746][ T4536] RIP: 0010:compat_copy_entries+0x1148/0x1390 [ 2002.236822][ T4536] Code: 31 f4 ff ff e8 29 21 2f fb 0f 0b bb ea ff ff ff e9 20 f4 ff ff e8 18 21 2f fb 31 f6 31 ff e8 8f 22 2f fb eb a1 e8 08 21 2f fb <0f> 0b eb 98 48 89 cf e8 ec 94 67 fb e9 9e f7 ff ff 48 8b bd 20 ff [ 2002.256438][ T4536] RSP: 0018:ffff8880656ef918 EFLAGS: 00010216 [ 2002.262514][ T4536] RAX: 0000000000040000 RBX: 0000000000000017 RCX: ffffc9001413f000 [ 2002.270489][ T4536] RDX: 0000000000000ffd RSI: ffffffff86416808 RDI: 0000000000000005 [ 2002.278469][ T4536] RBP: ffff8880656efa90 R08: ffff88806bf8c3c0 R09: ffffed10136d6227 [ 2002.286453][ T4536] R10: ffffed10136d6226 R11: ffff88809b6b1137 R12: ffff8880656efaf0 [ 2002.294434][ T4536] R13: 0000000000000000 R14: 0000000000000360 R15: 0000000000000360 [ 2002.302441][ T4536] ? compat_copy_entries+0x1148/0x1390 [ 2002.307912][ T4536] ? compat_copy_entries+0x1148/0x1390 [ 2002.313416][ T4536] ? compat_table_info+0x670/0x670 [ 2002.318548][ T4536] ? vmalloc+0x6b/0x90 [ 2002.322629][ T4536] ? xt_compat_init_offsets+0x111/0x260 [ 2002.328195][ T4536] ? xt_compat_init_offsets+0x1d9/0x260 [ 2002.333756][ T4536] compat_do_replace+0x3b3/0x680 [ 2002.338702][ T4536] ? refcount_dec_not_one+0x1f0/0x1f0 [ 2002.344086][ T4536] ? do_ebt_set_ctl+0x110/0x110 [ 2002.348953][ T4536] ? refcount_dec_and_test_checked+0x1b/0x20 [ 2002.354947][ T4536] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2002.361208][ T4536] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2002.369290][ T4536] ? ns_capable_common+0x93/0x100 [ 2002.374599][ T4536] compat_do_ebt_set_ctl+0x229/0x278 [ 2002.380603][ T4536] ? compat_do_replace+0x680/0x680 [ 2002.385726][ T4536] ? wait_for_completion+0x440/0x440 [ 2002.391026][ T4536] ? mutex_unlock+0xd/0x10 [ 2002.395445][ T4536] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 2002.401441][ T4536] compat_nf_setsockopt+0x9b/0x140 [ 2002.406551][ T4536] ? compat_do_replace+0x680/0x680 [ 2002.411680][ T4536] compat_ip_setsockopt+0x106/0x140 [ 2002.416904][ T4536] compat_udp_setsockopt+0x68/0xb0 [ 2002.422018][ T4536] compat_sock_common_setsockopt+0xb4/0x150 [ 2002.428110][ T4536] ? udp_lib_setsockopt+0x9c0/0x9c0 [ 2002.433313][ T4536] __compat_sys_setsockopt+0x187/0x390 [ 2002.438771][ T4536] ? sock_common_setsockopt+0xe0/0xe0 [ 2002.444149][ T4536] ? __compat_sys_getsockopt+0x2c0/0x2c0 [ 2002.449788][ T4536] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2002.455251][ T4536] ? do_fast_syscall_32+0xd1/0xd54 [ 2002.460365][ T4536] ? entry_SYSENTER_compat+0x70/0x7f [ 2002.465665][ T4536] ? do_fast_syscall_32+0xd1/0xd54 [ 2002.470789][ T4536] __ia32_compat_sys_setsockopt+0xbd/0x150 [ 2002.476603][ T4536] do_fast_syscall_32+0x281/0xd54 [ 2002.481659][ T4536] entry_SYSENTER_compat+0x70/0x7f [ 2002.486767][ T4536] RIP: 0023:0xf7f62849 [ 2002.490836][ T4536] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2002.510535][ T4536] RSP: 002b:00000000f5d5e0cc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 2002.518957][ T4536] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 2002.526930][ T4536] RDX: 0000000000000080 RSI: 0000000020000900 RDI: 00000000000003b0 [ 2002.534918][ T4536] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2002.542901][ T4536] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2002.550874][ T4536] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2002.560647][ T4536] Kernel Offset: disabled [ 2002.565138][ T4536] Rebooting in 86400 seconds..