0x7f00000000c0)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001300), r5) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r2) sendmsg$IEEE802154_LLSEC_ADD_KEY(r5, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x70, r6, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_KEY_USAGE_FRAME_TYPES={0x5, 0x31, 0x4}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x4}, @IEEE802154_ATTR_LLSEC_KEY_USAGE_COMMANDS={0x24, 0x32, "a6f3a54069807218b5cd61b95159bfca629fc865c73a7bf6f4662fa6761b906d"}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa1}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x2}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}]}, 0x70}, 0x1, 0x0, 0x0, 0x44004}, 0x4000000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r7}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}}, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, 0x0, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x9e017e05b1a42a7}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x68}, 0x1, 0x0, 0x0, 0x3c0589dec38f1efe}, 0x1) 00:21:02 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) clock_gettime(0x1, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x1, 0x5, 0x1, 0x40}, {0x1, 0xe7, 0x1, 0x6839}, {0xfff, 0xef, 0x1, 0x7}]}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x79e1c2265d6ba0e0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4e, 0x3f, 0x80, 0x8}, {0x4, 0x40, 0x7, 0xfff}]}) 00:21:02 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x9378aa40a429289d, 0x0) 00:21:02 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x1fffff, &(0x7f0000000580)) 00:21:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, 0x0, 0xa00, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x4000050) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)={'security\x00', 0xdc, "2685115d966a2ac4a1dded870e42a7e180a07765f08d85e778909e6d3892bb863c028a4e5cf8e2fce7024d658c9c245720c1fdf7bb3d0e87de7a397157aa6d6b8905e235d6c82549e41cddf7b54ca871dae808dfcb3c8a16af7f35192fcf9617e8493b384bed2bd7c75dc8a0ca653fa93f134b21eb5c9f1b5dc4e1cef7ed17eab88d7f1a6e548197fc87e27098faa959a6b80973df4cc69f359c169a00baef571813fc90ecefe49fa7425c9d27a7cbfdb43807992dd27fb6c51636c4fda6e9cd78d0a745de89a9c771e9a47ca07cee26fd52b1d6816d124c90ef2ef5"}, &(0x7f0000000180)=0x100) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000300), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}}, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000440), 0x80000, 0x0) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SPLIT(r4, &(0x7f0000000600)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0x9c, r5, 0x100, 0x70bd25, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0x9, 0x5}}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40800}, 0x4000800) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x58, r1, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}]}, 0x58}}, 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@private2}, &(0x7f0000000000)=0x14) 00:21:02 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @remote, 0x5}, 0x1c) 00:21:02 executing program 0: sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x4}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x50}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x9}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x8050}, 0x24044401) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r0 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040), 0x10) unlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x200) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) r2 = accept$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) getsockname$packet(r2, &(0x7f0000000100), &(0x7f0000000140)=0x14) 00:21:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x3, 0x7, 0x91, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x1, 0x5, 0x9, 0x3, 0x5, 0x6, 0x0, 0x400, 0x0, 0x400}, 0x0, 0x5, 0xffffffffffffffff, 0x8) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)={0x4c, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x4c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'gre0\x00', &(0x7f0000000180)={'ip_vti0\x00', 0x0, 0x700, 0x1, 0x256, 0x7, {{0xc, 0x4, 0x3, 0x9, 0x30, 0x68, 0x0, 0x5, 0x4, 0x0, @multicast2, @multicast1, {[@cipso={0x86, 0x1a, 0x2, [{0x5, 0x10, "f275a878d9e4d17830528452476b"}, {0x5, 0x4, "7f86"}]}]}}}}}) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001540)={&(0x7f00000015c0)={0x1304, r2, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x1184, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xfb, 0x4, "014727224842eab9a716df314e5aada85fe2354c35110a691eeb29815a7dd9396c739851d0b6885b3100e460a1b67ec2b686a33e1ee1259c212f2297c67fe26a9431786a2568cb44b35e5c9244c8fa93babb477caceb84648b783fd36242d6fbf6e8c375666fd563c0243f5050431abe70a5ba3fd55fdfd27476b988d2b7526d5422e8002972afda501bc1553a9b299ae3098dd5a5e47e4129435d7f9e369fdc1dd5df183c126b33fea56da106d1711568b0a9a10eb83e53390e584df425dc89de5abb3231738bc6628752b3dcc04afc55472d0931ef006c79019d58028e2278846ef1b795ffd321ce2763a719498bd996d0f19594b864"}, @ETHTOOL_A_BITSET_VALUE={0x78, 0x4, "d794c21cef2bc775d2b61370250047ee76af418001b37c955fcaae7694fdacef6a51140e9f6e39d76a8a5b74a733a7b273afd2cbb2a4a8c3ecfd8e67a4a8acfa22ef57e28f1a5fb87157f85d2d1beab2b7005d0f513338e29f5584de7b6bf10d5e6cbcd8eb77bba784120ae834f0c060816888c3"}, @ETHTOOL_A_BITSET_MASK={0x1004, 0x5, "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"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x81}]}, @ETHTOOL_A_FEATURES_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}]}, @ETHTOOL_A_FEATURES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0xdc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}, @ETHTOOL_A_BITSET_BITS={0x34, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3aa}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'C\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x47cdd2f4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x6f, 0x4, "d391ee530c769477ea4a093b45258d4cc1e205cc5b38ffbd6ffa51e1311985f0aef0089af3aa26f39dc6cdb8308fc1f634341497fba593273c564faf7d01ca8e243006a6b7061ca5fd97fea58a06708a97ecd00c75cf4e3af477e20c444793a2c3ce80baa539bff9c23221"}, @ETHTOOL_A_BITSET_MASK={0x21, 0x5, "6a341aca433d5ba6b567c761e0a82e7500c7187832b16e976b06000000"}]}]}, 0x1304}, 0x1, 0x0, 0x0, 0x20040004}, 0x8004) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:02 executing program 5: setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x3, 0x4) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) clock_adjtime(0x6, &(0x7f0000000000)={0x2, 0x4, 0xfffffffffffffff7, 0xab8e4ee, 0x9, 0x7, 0x3, 0x8, 0x0, 0x80000000, 0x4, 0x20, 0x5, 0x8, 0x1f8, 0x6, 0x1e2e80000, 0x7, 0xfffffffffffffc01, 0x5, 0x20, 0x2, 0x8, 0x3, 0x4, 0x80000000}) r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000140)) 00:21:02 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="90010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x190}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1000, 0x4, 0x0, 0xffff}, {0x4, 0x1, 0x0, 0x10000}]}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@private}}, &(0x7f00000001c0)=0x50) 00:21:02 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) recvfrom$packet(r0, &(0x7f0000000080)=""/168, 0xa8, 0x2100, 0x0, 0x0) 00:21:02 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x1fffff, &(0x7f0000000580)) 00:21:02 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x1, 0x0) 00:21:02 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) personality(0x410000e) 00:21:02 executing program 2: setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e21, 0x1, @private1, 0x8ca8}, {0xa, 0x4e22, 0xfff, @remote, 0x400}, 0x3, [0x80000000, 0x539, 0x9, 0x3, 0x0, 0xa6, 0x1, 0x5]}, 0x5c) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x40840, 0x0) linkat(r0, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xc960aa981343d65) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) 00:21:02 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x2, 0x1, 0x40, 0x7, 0x5, 0x200, 0x5}, 0x1c) 00:21:02 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x201040, 0x0) r1 = getuid() setuid(r1) fchownat(r0, &(0x7f0000000040)='./file0\x00', r1, 0xee01, 0x1000) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:02 executing program 2: sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@NL802154_ATTR_SEC_DEVICE={0x10, 0x23, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0202}}}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004010}, 0x24000021) prctl$PR_SET_SECCOMP(0x3, 0x1, 0x0) 00:21:02 executing program 0: r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/166}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000140)) r2 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000180)=""/138) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xd, 0x4000010, r1, 0x8000000) 00:21:02 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x1fffff, &(0x7f0000000580)) 00:21:02 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 00:21:02 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0xf7, 0x7, 0x18000}]}, 0x10) 00:21:03 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) 00:21:03 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRESOCT, @ANYRES16=0x0, @ANYRES64=r0], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x40004) 00:21:03 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) 00:21:03 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x400, 0xd, 0xff, 0x6}, {0xff06, 0x6, 0x14, 0xbc23}, {0x0, 0x7, 0x1f, 0x200}, {0x5, 0x7, 0x8, 0x30d3}, {0x1f, 0x4, 0x6, 0x2}]}, 0x10) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xf, 0x1013, 0xffffffffffffffff, 0x8000000) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000100)=@req={0x4, 0xfffffffc, 0x401, 0x80000000}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)="069953bd4bede28fb65d47aac963990951d48f78b430837b6e84471b362a68b23455ede5203adb2e57e0af38efc48473b3367756e50ffbf219ada2294c05e150b2300be0725f7885dfc9f9a8be20b8a2f7eeff42fde1fd3b2da07d96", 0x5c) 00:21:03 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3, 0x20, 0x5, 0x80000000}, {0xa2, 0x5, 0x5}]}) 00:21:03 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f00000000c0)={0x0, 0x1, 0x6, @random="77de5efd8328"}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r1) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)={0x4c, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x4c}}, 0x0) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x14, r3, 0x400, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4050010}, 0x45) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r4, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'gre0\x00', &(0x7f00000001c0)={'gretap0\x00', 0x0, 0x1, 0x1, 0x7ff, 0x8, {{0x12, 0x4, 0x3, 0x2d, 0x48, 0x65, 0x0, 0xc0, 0x4, 0x0, @remote, @empty, {[@cipso={0x86, 0x2f, 0x3, [{0x7, 0xb, "1050d8306b0f4f579b"}, {0x0, 0x7, "8e010e6ca5"}, {0x1, 0x3, 'k'}, {0x1, 0xe, "88fb9a6dda9f56641fd5a27a"}, {0x5, 0x6, "355e2a8a"}]}, @ra={0x94, 0x4, 0x1}]}}}}}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r4, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x8c, r3, 0x300, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7}, @ETHTOOL_A_RINGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}]}, @ETHTOOL_A_RINGS_HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x10d8}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) 00:21:03 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)={[], [], 0x2}) 00:21:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@initdev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, 0x0, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x48000}, 0x20044085) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000240)={0xc1, "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"}) 00:21:03 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x424600, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x4000010, 0x3d1, 0x1ff, 0x10000, 0x0, 0x9a, 0x7}, 0x1c) 00:21:03 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0xda5c, 0x5, 0xc8, 0x4}]}) r0 = syz_open_dev$rtc(&(0x7f0000000000), 0x80000001, 0x2580) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$char_usb(0xffffffffffffffff, &(0x7f0000000140)="2308ba54f4b405fc06b39572dd393d83", 0x10) getcwd(&(0x7f0000000180)=""/115, 0x73) sendmsg$DEVLINK_CMD_PORT_SPLIT(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x14c}, 0x1, 0x0, 0x0, 0x4080}, 0x20000000) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 00:21:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00', 0x7}, 0x1c) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x101002, 0x0) accept$inet6(r2, 0x0, &(0x7f0000000080)) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@mcast2}, &(0x7f0000000100)=0x14) 00:21:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x412200, 0x0) ioctl$TIOCL_GETSHIFTSTATE(r0, 0x541c, &(0x7f0000000080)={0x6, 0x2}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000140)={'nat\x00', 0x0, [0x3, 0xfffffff7, 0xe, 0x3, 0x4]}, &(0x7f0000000040)=0x54) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000540)={@private2}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000000c0)={@mcast1, @local, @local, 0x2, 0xe7c7, 0x3, 0x600, 0xfffffffffffffffe, 0x80000000}) 00:21:03 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in=@dev}}, &(0x7f0000000000)=0xe8) setuid(r0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000280)={@ipv4={""/10, ""/2, @local}, 0x0}, &(0x7f00000002c0)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f00000001c0)="81eae32ed48ea4dce9f51d85a762e5d08be64af4ccd87d635e8022b4f8650c088adebad014596fb71eb3c6395bbb41abc71dedf3195dcf0bdfb428ee2fcba3c5e64df86396261234b9153d2b41029c9b297d2eba952c3bb25aac19c005f6f468f900871dfc01d9a61b5bd63ca7f9c97e80669b5b316e16b4b80228216209bf7a2ca480c348f94c6d8dc9170f8eac0fa5ac826a8da0174af43da4f55a774278", 0x9f, 0x4110, &(0x7f0000000300)={0x11, 0xe3, r1, 0x1, 0xee, 0x6, @broadcast}, 0x14) 00:21:03 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1af00, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x9) write$char_usb(r0, &(0x7f0000000080)="9e135c824babc3cb8a16c6b63b059dc00a5df3c84403143643cbb4c23dc980a40096bba699d8a0f2b174bb61597895ac24dc67cde4555d0f0ae0e946e5909c6841357b79d307462895", 0x49) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) 00:21:03 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@ipv4={""/10, ""/2, @multicast1}, @in=@initdev}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:03 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x2, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x7ff, 0x20, 0x9, 0xfffffff7}, {0xa8b, 0x2, 0x6, 0xffffff7f}]}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="cd00", @ANYRES16=0x0, @ANYBLOB="02002bbd7000fedbdf25120000000c00060003000000030000000500130001000000050013000100000008000300", @ANYRES32=r0, @ANYBLOB="0c00060001000000010000000500130000000000"], 0x4c}, 0x1, 0x0, 0x0, 0x240000c0}, 0x44001) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000000)={0x4, 0x56, 0x3ff}) 00:21:03 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) 00:21:03 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x200, 0x1) unlinkat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x0) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@reiserfs_3={0xc, 0x3, {0x8, 0x4, 0x3}}, &(0x7f0000000100), 0x1000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) 00:21:03 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x100, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) 00:21:03 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x71, 0x4e24, 0x5, 0x2, 0x0, 0xa0, 0xff, 0x0, r0}, {0xffff, 0x5, 0x0, 0xfffffffffffffffe, 0x4a, 0x7, 0x1, 0x2}, {0x2, 0x80000000, 0xffffffff, 0x1}, 0x4, 0x0, 0x1, 0x1, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x30}, 0x6, 0x2b}, 0xa, @in6=@local, 0x3506, 0x5, 0x2, 0x3f, 0xe6, 0x1, 0x1}}, 0xe8) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@empty, @private1={0xfc, 0x1, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6, 0x40, 0x8000, 0x100, 0xffff, 0x2000280}) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x11, &(0x7f0000000080)=0x5e4, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x6, &(0x7f0000000200)=[{0x9f, 0xff, 0xa0, 0x3ff}, {0x0, 0x4, 0x9, 0x4}, {0x6, 0xc0, 0x40, 0x80}, {0x1, 0x29, 0x3, 0x44f}, {0x401, 0x5, 0x9, 0xdb79}, {0xc97, 0x6, 0x8, 0xffffffff}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000001c0)={0x2, &(0x7f0000000140)=[{0x46c4, 0xcc, 0x3, 0x6}, {0x8002, 0x5, 0x3d}]}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{0x8, 0x0, 0x1, 0x2}, {0x7ff, 0x80, 0x39, 0x7}, {0x5, 0x7, 0x0, 0x8}, {0x9, 0x5, 0x20, 0x8000}]}) 00:21:03 executing program 2: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="70a3afd0fd00000000000000e3ffffff00000000004e701ba9cbed5562a10782fdb368ce460bd074fd3ddca267fd03d84b5e130000000000000000000000000000eb9929abc4d11f1003ef5ba07fd7b73e8d2864404612ab703368e46e37475b19fd3019e410defca7616dbaadea71586c7732c8c7db9b664e68607ff126d6f6067992b7728b62d93cc2fbe5b9dcb3e81cf2c11cf0585c579e3b4362fc218100000000000000951a6011c197a15c5e3ea0e205b545f4661afe0a9dd84be62cb3ff749ff433c45457e688a341dc8b729ff0dedae3858a2cc5bf7c39b2b1edc379076ec336938253c2c65a057a22c88ff63343aec2c30224", @ANYRES16=0x0, @ANYBLOB="000328bd7000fddbdf2507000000080004000100000014000500fe8000000000000000000000000000aa14000600fc000000000000000000000000000000080008000000000008000c00000000000800020003000000140005000000000000000000000000000000000008000c00010000000800020007000000"], 0x80}, 0x1, 0x0, 0x0, 0x10}, 0x8080) 00:21:03 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'tunl0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00207800630a038f00000007440b00d00065000006299078ac1414bbac1414aa880d7abc68b5fecb2e2454791c071358ac141419ac1e0101ffffffffac1414bb865400000002020303060c023edee31bb45833bfb60011b7129ffec8060fc7ee3885293732240102060b873ccddbc523363eb7010e51cf2916a0f0f5a031655ec0000c579ad5617ab22460d88e06076cb13ee6dc864800000000020eda28778dcfc716ba3a5a674e0609fb8bbfc6e8e45107082169bc862271000cc876886b67b1a972ef59010fc7a110d87bc000908675596bc7020892077ef7749e"]}) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000340)={@initdev, 0x0}, &(0x7f0000000380)=0x14) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f0000000580)={&(0x7f0000000080), 0xc, &(0x7f0000000540)={&(0x7f00000003c0)={0x164, 0x0, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x3, &(0x7f00000005c0)=[{0x8, 0x9, 0x4, 0x3f}, {0x7fff, 0x3, 0x7f, 0x8}, {0x4056, 0x1f, 0xfd, 0x200}]}, 0x10) 00:21:03 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) open$dir(&(0x7f0000000000)='./file0\x00', 0x90000, 0x80) 00:21:03 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001300), r0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00', 0x0}) r3 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000001c0)={0x1, 0x1}, 0x4) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r1, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@NL802154_ATTR_TX_POWER={0x8, 0xb, 0xff}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_TX_POWER={0x8, 0xb, 0x32}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4004058}, 0x4000004) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:03 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x9, &(0x7f0000000000)=[{0x400, 0x3f, 0xfd, 0x80000001}, {0x7795, 0x0, 0x1f, 0x7}, {0x7f, 0x5, 0x1, 0x3}, {0x9, 0x80, 0x7f, 0x8f}, {0x7232, 0xfe, 0x2, 0x7}, {0x2, 0x40, 0x6, 0x9}, {0xf000, 0x7f, 0x7, 0x9}, {0xc458, 0x0, 0x1, 0x8000}, {0x0, 0x4, 0x20, 0x7}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x6, &(0x7f00000000c0)=[{0x8, 0x8, 0x8, 0x6}, {0x6, 0xfa, 0x43, 0xfffffc00}, {0x7ff, 0x9, 0x63, 0xfff}, {0x1, 0xf4, 0x8, 0x7}, {0x1, 0x6, 0xbf, 0x5}, {0x6, 0x6, 0x7, 0x7}]}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x3, 0x7, 0x2, 0x7}]}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000200)={0x4, &(0x7f00000001c0)=[{0x6, 0x5, 0x7, 0x3f}, {0x6, 0x8, 0x4d, 0x8000}, {0xa4f9, 0x80, 0x4, 0x4}, {0x7ff, 0x2, 0xff, 0x1c00}]}) 00:21:03 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x2, 0x7, 0x1, 0x9}, {0x6, 0x1f, 0x3f, 0x58}, {0x650, 0x1f, 0x8, 0x101}]}, 0x10) 00:21:03 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x3, 0x9b, 0x20, 0x80000001}, {0x5, 0x1, 0x92, 0x20}, {0x1000, 0x81, 0x6, 0x6}, {0x7f, 0x3d, 0x21, 0x20000000}, {0x1, 0x1f, 0x0, 0x5}]}) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{0xfe00, 0x8, 0xf6, 0x5}, {0x81, 0x80, 0x53, 0x2}, {0x5, 0xff, 0xff, 0xfffffffc}, {0xff01, 0x0, 0xf8, 0x4}]}, 0x10) socket$packet(0x11, 0x3, 0x300) 00:21:03 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) recvfrom$packet(r0, &(0x7f00000000c0)=""/191, 0xbf, 0x21, &(0x7f0000000000)={0x11, 0x9, 0x0, 0x1, 0x5, 0x6, @remote}, 0x14) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) 00:21:03 executing program 0: prctl$PR_SET_THP_DISABLE(0x29, 0xffffffffffffffff) prctl$PR_SET_THP_DISABLE(0x29, 0x80000000001) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) 00:21:03 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x1, 0x0) 00:21:03 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000000c0), 0x4) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 00:21:03 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x2100, 0x0) getsockopt$inet6_buf(r0, 0x29, 0xcc, &(0x7f0000000040)=""/107, &(0x7f00000000c0)=0x6b) 00:21:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000600), r0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), r0) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x70, r1, 0x100, 0x70bd25, 0x25dfdbf7, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x8}}]}, 0x70}, 0x1, 0x0, 0x0, 0x14}, 0xc0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f00000007c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000840)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002140)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000002100)={&(0x7f0000000880)={0x1870, 0x0, 0x300, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_WANTED={0x30, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x27, 0x4, "0e7fedecb830d9c8370b26ed2c417c8d3906141ecf5424bea988ca515abbd63e647bd1"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x1f8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xc8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x75, 0x5, "b87d522364ccf19b4f066919340a2cd5586a8f8b14150412cc4b69713eeb7e9fc202f8138490a20dc78b147ecc74341459ce436e9d3541fa52050e39f45fdaa49adfad010053fb658c27bc12912dc48f6357192186d40ab29417349878dc16400e106759883dbb19a851b43d9a1a3570fb"}, @ETHTOOL_A_BITSET_VALUE={0x85, 0x4, "8909da83e4b91c012f3e5bb20b5f9d61c4aeaf94883777dde5d7e4a04ae9ca46cca93520da214aba1bd659ed7a0d2ef96b581d0c9f27fd0c561a177f3ada4dcd3400330c91081302c9cbeb1ac9d619428802182bd3ac115e85ebe314acf16ad0d48c6983bd3597e513a8ec935bdafaecbcedb08a46f13d4a38b62cfd16bcab14f4"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xde, 0x5, "7d315f5de1dd180cc311ca994574bf302d47d4ac82f83b93e7b649517952607c0d387263edc9ad8149e37eb0d5c962b5f3a4c1b5619530d5160f9fac3e7a71ec2dbd7cd109c5311258464173581246b4abdd045dc495038dd1effacd37fec13eabab3e3ea59410c43db2140c41fcce9d2e8843d38364afd17c9faaaab339c9b4de589e9777eae944472a870cc5bba2ebfa3396c77f071334575cb21584ce68736a09b6637b64f97b6f855433dcf6540afd84656d2179eb67ca8fad2568dc83c893891db5919efc5d93328dea734e75c303bb97e550d66a662c2a"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}, @ETHTOOL_A_FEATURES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @ETHTOOL_A_FEATURES_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_FEATURES_WANTED={0x9c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x98, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '@^-/\'-$,\'&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'netdevsim'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, '0000:00:10.0\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7c}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '.{[-\x00'}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x498, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x72, 0x4, "f670467488bb27bab82bbb7840c2f37217ac959ef12e591315c3cfbe868b25a5371906a35b9d487e8413d2d63d255e24266d93c5dc9d55666dcc726d3f7023340a95931c45566f5f94520fec19d8149def61dc09c622c791a549a8240d39737dcb1f837c6c309b460badb55b3e40"}, @ETHTOOL_A_BITSET_BITS={0x190, 0x3, 0x0, 0x1, [{0x4}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'netdevsim'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffff2d}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xcfc}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xa938}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '$\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ':&@@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, 'netdevsim\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x16}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xed}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'netdevsim'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'pci\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'pci\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x8a, 0x4, "d7c08799090ed1ffd31216be715109642309759ff429d5e1dfa9f95de6ac9b8afac27853f1dc01281180011ca89e7c7b3e69f63c260911a2370d4013844702c3caa8625f1b49be870e9f6a47c4a5b1b756df553f8e80dfef62a391998f64b887839f47f7a811015750d46b91513b620d4b0571401514218b924cc4b7c448d26b84970b274bbb"}, @ETHTOOL_A_BITSET_VALUE={0xd7, 0x4, "41441c16f717b3ca308e54e41f60e6e279996cf2afd89e26cc10bd6a776c5fa3eeb21492c12db31ff49403878d722613a36a861f401c3120cc981cbf8c443290db019a17ea4b0ca08f750e561eae10980e7721da2b5ab51f0fbbfedc398913ae4189508fb296092795e926009bb005f298a1b42ed1fdbb8879872d45b4e54e36bb0589a5428f6a9e97a265a44402e16bb0fcabaeda0e53449738b2281d654b1e6b816207cecc742bc991345af6c89e60a7c8b5565fc0477f593d53510ad7ba10d6bc1adc68c6a249a41e62848140b77e9e7287"}, @ETHTOOL_A_BITSET_BITS={0x128, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'netdevsim'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '{.{\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, '0000:00:10.0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6tnl0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, '0000:00:10.0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff8000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'pci\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ']\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x1010, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}]}]}, 0x1870}, 0x1, 0x0, 0x0, 0x24008054}, 0x8041) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000002300)={@mcast1, 0x0}, &(0x7f0000002340)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000023c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002400)={@remote, 0x0}, &(0x7f0000002440)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000024c0)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f00000029c0)={&(0x7f0000002180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000002980)={&(0x7f0000002500)={0x468, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x12}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}]}, @ETHTOOL_A_FEATURES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_FEATURES_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_FEATURES_WANTED={0x84, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x1d, 0x4, "3e6e59f53497ce4efee03de5c5b1d348e0a4782af3350f319a"}, @ETHTOOL_A_BITSET_MASK={0x59, 0x5, "20fa69aed7c3ade805d9aec03d770efe7e723036119128fdcf45a27f63240c68f7cef76bf32e9ba470671cc2f5f180771e09741205018dea85d41dddb22f87865a98de23b0cf4db71215bf092b08b8b1e801b63508"}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_FEATURES_WANTED={0x20c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xcc, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '@\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-]\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\\\x91*,\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ':&@@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ']\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'devlink\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff9}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\\,\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x13c, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '[-})]^]#\'\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '.%@.:*\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xeabf}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4d65e643}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xe9\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, 'bridge_slave_1\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '-}@-\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ':&@@\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ':&@@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffb}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x582}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '\x86.}.[\x19&\x00'}]}]}]}, @ETHTOOL_A_FEATURES_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @ETHTOOL_A_FEATURES_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}, @ETHTOOL_A_FEATURES_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x468}, 0x1, 0x0, 0x0, 0x40000}, 0x40) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0x84, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x850}, 0x20000000) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1008004}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x74, r10, 0x200, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0xff}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x5}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x2079}, @ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x3ff}, @ETHTOOL_A_RINGS_TX={0x8}, @ETHTOOL_A_RINGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x6}, @ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x81}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x4}]}, 0x74}, 0x1, 0x0, 0x0, 0x20000080}, 0x40000) prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000000)) 00:21:03 executing program 4: setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000040)={0x0, 0x1, 0x6, @local}, 0x10) prctl$PR_SET_SECCOMP(0x7, 0x2, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001300), r0) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x88000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x8000) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x401, 0x8, 0x80, 0x7ff, 0x3, "06e4267e5b160728"}) 00:21:03 executing program 1: ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000000)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x1f}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) 00:21:03 executing program 3: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x141000, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x4c000, 0x0) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1f3bcf9bdacba1bfcb2648052f096ec3507dd8297dc758ceae9d60ee4a1b9338bf3737996f5791fd7f3bd787101c7ea58dffff28387e5fa296edb5254edaf616962d38ab16b842beec5b3501068b3174a6bcc2299eb75793c17cd8e2671b17ebaa047247a3d8dd1bbeacf559e5a39741513c6d2064a818dbe86ab04ccd070bf69515e9362d628c840770147b0913b39b592af6015acf17cec0fac6f1ac34eab5c0d92b024e26a097aa213870931f7b1697bcd4e5dd5e15f9e4f2a3fec6850c1ff56bef", @ANYRES16=0x0, @ANYBLOB="100025bd7000fcdbdf250100000008000600ac1e010105000300020000000500020002000000"], 0x2c}, 0x1, 0x0, 0x0, 0xc1}, 0x4004) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) 00:21:03 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x26, 0x0, 0x1fffff, &(0x7f0000000580)) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000100)=[{&(0x7f00000005c0)="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", 0x1000, 0x1f}], 0x2, &(0x7f0000000140)={[{'.'}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, '\'-)-./'}}, {@subj_user={'subj_user', 0x3d, 'tmpfs\x00'}}, {@subj_type={'subj_type', 0x3d, '!J!#[)@@!'}}]}) 00:21:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:03 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x2, 0x0) 00:21:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in=@dev, @in6=@mcast2, 0x0, 0x5, 0x0, 0x0, 0x2, 0xa0}, {0x0, 0xffffffff, 0x0, 0x75a}, {}, 0x0, 0x0, 0x0, 0x0, 0x1}, {{@in6=@remote}, 0x0, @in6=@private1}}, 0x23) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 00:21:03 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x204000, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x9, 0x6, 0xba, 0x1}]}, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x40002, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000180)=@req={0x4, 0x5, 0x6}, 0x10) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{0x6, 0xff, 0x96, 0x7ff}, {0x6, 0x0, 0x0, 0xa4f4}, {0x8, 0xc8, 0x7f, 0x7c}, {0x6, 0x5, 0x0, 0x1}, {0x6, 0x0, 0x7, 0x9}]}, 0x10) 00:21:03 executing program 0: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000000c0)={0x9, 0x1ff, 0x4bb, 0xa3, 0x3, "a9af772383d912f8"}) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0xa, &(0x7f0000000000)=[{0x1, 0xff, 0x3f, 0x2}, {0x8, 0x6, 0x40, 0x3}, {0x100, 0x80, 0x9, 0x3}, {0xe4c4, 0x3, 0x1, 0x3}, {0x7fff, 0x2, 0x8, 0x2}, {0x400, 0x0, 0x2, 0x8}, {0xffff, 0x1, 0x1f, 0x2}, {0x1ff, 0x3, 0x2, 0x7}, {0x4, 0x0, 0x2, 0x4}, {0x3ff, 0x2, 0x1f, 0x3}]}) 00:21:03 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14, 0x800) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x104, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x1}, 0x20000009) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 00:21:03 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x5, 0xf1, 0x5, 0x10c}, {0x2d19, 0x8, 0x5, 0x80}]}, 0x10) 00:21:03 executing program 3: ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:03 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) [ 702.983831][ T7114] loop1: detected capacity change from 0 to 8 [ 703.018451][ T7114] nfs: Unknown parameter '.' 00:21:03 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) r1 = getuid() syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xc1, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="8443bd38855515cf1899ce14596e43e5c182fccc04d9d428aa1a9bfa9b570e0d37b5ab8850e18393338b460a1ca04ecb01abebe976baa859df3635c7b3c7667238b7f9c199c0e00aeaf54360d476acf863b183e8d29eef9ecc805843691e8b7761", 0x61, 0x8}], 0xe0b98fa52654ec81, &(0x7f0000000280)={[{'#!-\'%]!#.'}, {'{['}, {'--'}, {'-/*\x90'}, {'-^:-!#\'%$('}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@uid_eq={'uid', 0x3d, r1}}, {@measure}, {@smackfshat={'smackfshat', 0x3d, '#+.]'}}]}) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 00:21:03 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) faccessat(r0, &(0x7f0000000680)='./file0\x00', 0x100) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x43, &(0x7f00000005c0), &(0x7f0000000600)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f00000006c0)={0x2d2, {{0xa, 0x4e22, 0x8, @mcast1, 0xffffcbb5}}, {{0xa, 0x4e23, 0xf352, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xffffffff}}}, 0x108) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000640), 0x101000, 0x0) r1 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x4, 0x5, &(0x7f0000000440)=[{&(0x7f0000000100)="8ae24e2b2aface80e129fa545d04be34cf567eace41910e047edaec684b4067e26436cce97fbbdca6076a2439521cc5584421603360b1ee74d178d1273ccb71bb89bc9fd9c3de8e17c03e95d95aa7f53ac85949b12f39725", 0x58, 0x8}, {&(0x7f0000000180)="426417404e530182f9604ba6a44cb718afdfbcd7dc6142225ae92a2bf1b5d187f9a9613f8bdf81d61912936001ca4e4b539fd08017ed3efd4af47cf1edcc5755580d45b84ce5e88edce301cbde6bb3c2f8791a22b06219d9d72df82af8117fb425fb79c2012ec053941b84abed8e", 0x6e, 0x9}, {&(0x7f0000000200)="8ad8e89306fba76dc5a48afd0b4cbe5c996df6bca0197e901d8b634c7ef411a321732ef51f1eb594710a4ad26a4bb4f36e72e3d1162dd6200adfb928462e20f226080b7500376e1a47dcdce2b47b62db390f7968076d0a60930cea431f067cf854", 0x61, 0x2}, {&(0x7f0000000280)="4c0c9f334ae757b63fe75c3d1dcecec52cc99e22e6329174042de8db5aef52a42494ccc09a59765b661a1bd7f0f0482d0fe29c547385ffd486db8a8f30bcedd518466bdb99da57f42c7810736b2040d13103df3526c727c12ed3f41772af8d7e3a044078a761b45a3c31ee99890b7607084a5b40a9e5e22560f3904f05496ef6a23542032d21a1ad5811c86f3b99f13b8f1d04cad913e4511d2007bc74bc06e4e6026df36c302fc2201df96169a0fc70208111e83bc3009e05b5308369c5d8bd19b90e", 0xc3, 0x100000001}, {&(0x7f0000000380)="4d93f61a7e7a480fc33c75d247c69a549128f93a86b1cf595c1320f2df06ac953df30a38d692e22fd276b6703993b082e251a5b3cd6c48cd4574657f27ca5d823fb5632e4a798740e0d37cd577877aef0a23f8f9288b212804355dbb6fd3adc9045544b0a9e2c99b1619065b7576fb63c49fb7cce11660c397e05396cf44a5ea06d3ff83f6e59bf01eafdd8dff4a5f5d8af832b49de81e98d1f0c4c4fe16b4701b5b0d2329ba57edfd3cfdc64ed35761858fa0c6fc768dbf58", 0xb9, 0x9}], 0x2101400, &(0x7f00000004c0)={[{'tmpfs\x00'}, {}], [{@uid_eq}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@measure}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@dont_appraise}, {@uid_gt}, {@appraise}]}) unlinkat(r1, &(0x7f0000000540)='./file0\x00', 0x0) 00:21:03 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x80001, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x4000, 0x0) r2 = io_uring_setup(0x32a2, 0x0) syz_io_uring_setup(0x5943, &(0x7f0000000680)={0x0, 0xdb6b, 0x8, 0x3, 0x109, 0x0, r2}, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000700), &(0x7f0000000740)) syz_io_uring_setup(0x7d3e, &(0x7f00000002c0)={0x0, 0xc78, 0x8, 0x3, 0x25e, 0x0, r2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000380)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000040)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@private}}, &(0x7f0000000280)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@ipv4={'\x00', '\xff\xff', @remote}, @in=@multicast2, 0x4e23, 0x0, 0x4e20, 0x248, 0x2, 0x0, 0x80, 0x8, 0x0, r3}, {0x7, 0x4, 0x5, 0x3, 0x8, 0x1f, 0x4, 0x5}, {0x7, 0x10000, 0xd72, 0x1f}, 0x0, 0x6e6bbb, 0x2, 0x1, 0x2, 0x3}, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x4d4, 0x32}, 0xa, @in6=@empty, 0x3502, 0x3, 0x1, 0x1, 0xc0b, 0x7f, 0x81}}, 0xe8) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000400)={0x4, &(0x7f00000003c0)=[{0x3480, 0x2, 0x42, 0x1}, {0x5, 0x8, 0x5, 0x791eb842}, {0x7, 0x4, 0x1, 0x4}, {0x9, 0x8, 0x80}]}) 00:21:03 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 00:21:03 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 00:21:03 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xa, 0x0, 0x3, 0x5}, {0x5, 0x3f, 0x5, 0x7ff}, {0x2, 0x4, 0xf0, 0xffff0001}]}) 00:21:03 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x80, 0x0, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @remote}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1b}]}, 0x80}, 0x1, 0x0, 0x0, 0x4c1}, 0x40000) 00:21:03 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r0 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000140)={0x9, &(0x7f00000000c0)=[{0x9, 0x87, 0x7, 0x9}, {0x5, 0x3, 0x9, 0x3}, {0x8, 0x2, 0x0, 0x7f}, {0x1806, 0x1, 0x37, 0x7}, {0x1, 0x9, 0x3d, 0xb90}, {0x28a4, 0x7, 0xe6, 0x2}, {0x0, 0x81, 0x9, 0x7}, {0x5, 0x7, 0x8, 0x1000}, {0xfffd, 0x6, 0x2, 0x4}]}, 0x10) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x1a, &(0x7f0000000000)="c406ac2fab9f60935ab163e7c783a2d5170de6917a16680cfca4fda01ca3e3e2c2490a3c341e84f5b6f3a8f37351db67a267bac2c2301d73984b6045a54e95567fbc2669736c8208c3646877b1dc1f", 0x4f) 00:21:03 executing program 2: r0 = io_uring_setup(0x6dba, &(0x7f0000000000)={0x0, 0x63c7, 0x2, 0x4000003, 0x21b}) mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x8, 0x50, r0, 0x8000000) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) [ 703.132507][ T7163] loop1: detected capacity change from 0 to 264192 00:21:03 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_KEY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xb0, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_KEY_USAGE_FRAME_TYPES={0x5, 0x31, 0x2}, @IEEE802154_ATTR_LLSEC_KEY_USAGE_COMMANDS={0x24, 0x32, "8043c410cebc989b9760f7de0bc2dd8d4243b56f99967ab3fb7cc17768bb31a0"}, @IEEE802154_ATTR_LLSEC_KEY_USAGE_COMMANDS={0x24, 0x32, "293ef4056dfe930b4e05d3d33e885fcbfc28832d20d158b09b18a2937cf7595f"}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_USAGE_COMMANDS={0x24, 0x32, "b9ea92ad0e5d653d08fa68121b6e500d6435f57e17289f9a9a8e44e9b193e441"}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x80000000}, @IEEE802154_ATTR_LLSEC_KEY_BYTES={0x14, 0x30, "49124dd11aa88dd4ab16f921b2939ea3"}]}, 0xb0}, 0x1, 0x0, 0x0, 0x40000}, 0x800) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) 00:21:03 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:03 executing program 1: r0 = getuid() setuid(r0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="687567653d6164766973652c6d6f64653d30303030303030303030303030303070303030323030312c6e725f696e6f6465733d2d2c7569643d2812bf80a85d9e86eaa5fa27752fc0842e75f1780dae599f23d410d984834231b50fb727b5fb63934b5d663f0c4daed849c01a223863f690f076e7e9397f8faeddd205ad82304c6c35515f6befbc141b4d1ae470f374f32c5e566f7b3313c0b60a9502bf7e5409bbb19134128d815866bfb4e4fd3e3576709d08a18ff8b022754fab75", @ANYRESHEX=r0, @ANYBLOB=',\x00']) 00:21:03 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x2, 0x0) [ 703.232050][ T25] audit: type=1326 audit(1622679663.908:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7183 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:03 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) getpeername$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) getpeername$packet(r1, 0x0, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[{0x7f, 0x15, 0x6, 0xa8}, {0x9, 0x7c, 0x5, 0x9}, {0x7f, 0x4, 0x1, 0x80}, {0x3, 0x95, 0x7, 0x1}, {0xfffb, 0x4, 0x7, 0x4}, {0xff, 0x0, 0x5, 0x7ff}, {0x2, 0xe0, 0x1f, 0x3}, {0x3ff, 0x0, 0x9, 0x4}]}, 0x10) 00:21:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000240)={0x21, 0x3, '\x00', [@pad1, @jumbo, @generic={0x0, 0x10, "100eabbf2e2d16a30f684e281bd73dd6"}]}, 0x28) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x4, 0x7f, 0xf8, 0xcf, 0x0, 0x40, 0x0, 0xd, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x7, 0x6}, 0x40000, 0x8, 0x3, 0x8d4e4170af066a39, 0x6, 0x1, 0x8000, 0x0, 0x6, 0x0, 0x3f}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x6) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000180)='devices.allow\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x1e, 0x2, 0x0, 0x0, 0xf0, 0x70800, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000000), 0x3}, 0x10000, 0x1000, 0x8, 0xb, 0x6, 0x7, 0x3, 0x0, 0xb1, 0x0, 0x8}, 0x0, 0xe, r1, 0x0) 00:21:04 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3, 0x8, 0x3f, 0x9}, {0x1000, 0x8, 0x2, 0x2}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x80, 0x9b, 0x7}]}, 0x10) 00:21:04 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x1, 0x0) 00:21:04 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:04 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000140)=ANY=[@ANYBLOB="96a143781f840b22be1d49d1178303d702855785de7c5a836a36cd71cbdbf002911a57f4f648c7403dd209e4e60f0033dd28e06511013fd528c7afe8ea009621fa12cc1617644aab7e"]) r0 = socket$inet6(0xa, 0xa, 0x9) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x220001, 0x0) accept4$inet6(r1, 0x0, &(0x7f0000000200), 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={@empty, 0x4c, r2}) 00:21:04 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0xa, &(0x7f0000000000)=[{0x7, 0xff}, {0xfb78, 0x42, 0x9b, 0x2}, {0x8d, 0x40, 0x0, 0x2}, {0xed, 0x50, 0x8, 0x1d0}, {0x7, 0x3f, 0xfa, 0x2}, {0xa, 0x4, 0x3, 0x9}, {0x2, 0x7, 0x80, 0x7fffffff}, {0x800, 0x6, 0x2}, {0x9e, 0x1, 0x1, 0x27}, {0x0, 0x81, 0x8, 0x7fff}]}) 00:21:04 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x23) r1 = accept4$packet(r0, 0x0, &(0x7f0000000100), 0x80000) accept$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) r2 = accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000080)=0x1c) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r2, 0x29, 0x37, &(0x7f00000000c0)={0x2b}, 0x8) 00:21:04 executing program 2: pkey_alloc(0x0, 0x3) prctl$PR_SET_SECCOMP(0x3, 0x1, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0xffff, 0x1, 0xf9, 0x8000}, {0xe90e, 0x8, 0x9a, 0x5}, {0x2000, 0x6, 0x3, 0x3e000000}, {0xfff7, 0x20, 0x7f, 0xfae}]}, 0x10) 00:21:04 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:04 executing program 0: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r0, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@NL802154_ATTR_PAN_ID={0x6, 0x9, 0xffff}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) 00:21:04 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x4f1a3dc38a535ad2, 0x0) 00:21:04 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 00:21:04 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3, 0xee, 0xa0, 0x24}, {0x445, 0x7, 0x4, 0x2}]}, 0x10) 00:21:04 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x2, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) 00:21:04 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000140)=ANY=[@ANYBLOB='gid=', @ANYRESHEX, @ANYBLOB="2c00b784f81e34966a5ce0f639aac9288126de62dc6ab0bdfd164530577aaf3efe65d659d7e7905a5daf4a41d2dd779ca4752d43f5aabdf5e7c6a7478d841d3cffa1027b703f14ba5c41e708d1cf9feae81265c0a80ab2df8d3d175cae4926473b2b0749e68ed3351c8ce3996ded0ed3f9a224858bbc00e9b8a4a9697a599f66d59587710ec73276619e64d8e6feaad8ee38e0a43a015f46cff01e2b0b95f40efe4ddf5be87675df417017c0f266a9a6be1294e668d68dff60b1a1cba16d6f883fd619d95ad84681b9428b17c3f93cd33680ea309776c611b47285c4f35ab58e995a4800e09c01926da23459181e55ed79239a385f77c457f6f3f7aa835065809184c28a"]) 00:21:04 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r0, 0x10, 0x70bd2c, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}, @IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x810) 00:21:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @remote}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_buf(r1, 0x29, 0x1c, &(0x7f0000000100)="7216e7d5e7d9e5a690dcf1360e8963b1986c38bda446bf900db5de9ef7563df0d4ed5ece02db69b4149d", 0x2a) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000540)={@private2}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r4, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r6, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000280)=ANY=[@ANYRES32=r3, @ANYRES16=r0, @ANYRESHEX=r0, @ANYRESOCT, @ANYRES16=r6], &(0x7f0000000300)=0xa3) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000140)="bddde2cb6a68ae255a724405e1a2232cdf04f1f184c41fbb115f447e14b8fbe63046f10c5eb6ac068498c8bd5efe2615f86d924234622ee275a54f3fd7dc465c6726f8bf510adab9be67ad5da17f63adcc941e530edb5a24287d71fdd5c14d89443ddcf1996010569c99e8c643060c5263a9c1ba2cb0b06b4c1644b735447cd9be29c273f11f7169da0f78cf0a84094a9c251951de156db564e5eb4cd1c7fb8075277d0409b4ce19b701453988de3e706b0f54b46a265ce522b75a76e0b56a51efd93c5e187e453f61b48eb72af27da01f2da8d312bbc144fa61da0ef55fe0e3bf138bbce7dd3a13a21ff1000000", 0xee}, 0x68) 00:21:04 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x1, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x4, 0x6, 0xffff}]}, 0x10) 00:21:04 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) 00:21:04 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) accept4$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0xffffffe6, 0x40000) r2 = socket$packet(0x11, 0x2, 0x300) r3 = accept$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000000)=0x14) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x4, 0x40, 0x9, 0xd0}, {0x0, 0x2, 0x1f, 0x80}]}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000100), &(0x7f0000000180)=0x4) 00:21:04 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x1000) r0 = socket$nl_generic(0x10, 0x3, 0x10) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fff7f, &(0x7f0000000000)=ANY=[@ANYRES16=r0]) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) getsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f0000000040)=""/39, &(0x7f0000000100)=0x27) 00:21:04 executing program 3: sendmsg$NL802154_CMD_GET_SEC_DEVKEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x40) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x1) prctl$PR_SET_TSC(0x1a, 0x0) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:04 executing program 4: syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff7000/0x8000)=nil, &(0x7f0000000000)="1a65fb62e7111a411d315325fc0e8ab3a5648777f6d5585a1b4ed9b0b8e817a757d1d1ba222f97c5b46d651e6fa8d6f5b87b2611e86be99ba570ad4df9500105d7944aeff9031b42cb6aad8cc78a9debc9e7644fcd2071d66846506fc6602f6788cc87ec7acbfb904f0203e92aec449abb10b05cc4", 0x75}, 0x68) prctl$PR_SET_SECCOMP(0x7, 0x1, 0x0) 00:21:04 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r0 = syz_open_pts(0xffffffffffffffff, 0x610900) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x3, 0x2c}) 00:21:05 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x20000, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000000c0)={0x6, "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"}) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000340)) io_uring_setup(0x2067, &(0x7f0000000000)={0x0, 0x9bec, 0x4, 0x3, 0x12f}) 00:21:05 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0xd51622ec6141c5aa, 0x0) getpeername$packet(r1, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f00000000c0), 0x2, 0x0) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:05 executing program 2: ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000000)=0xb5a) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x4, 0x0, 0xfe, 0x7}, {0x80, 0x6d, 0x80, 0xff7}]}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000100)=0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x9, 0x1, 0x200}]}) 00:21:05 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf2503000000050002001f000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x68000) 00:21:05 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) setsockopt$packet_buf(r2, 0x107, 0x0, &(0x7f0000000100)="ecea349fa06afc823b745f95604eba0b0abc4162c3f3a21833abd184ae51dd30ae1683565e3ed4e4bbf25d6e7213f123c8dfc912f95fb32a22767ec82ab79caee1d4489c41edec75f70a2b7102f01e20837b0f2d8ee1b8f53ed10f62f2601fb00fe8001324980b814c53c5ff55b721001d3c708185562147e2f3db", 0x7b) accept$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) 00:21:05 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) 00:21:05 executing program 3: ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) [ 704.364861][ T25] audit: type=1326 audit(1622679665.038:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7308 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 00:21:05 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 00:21:05 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 00:21:05 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) syz_open_dev$ttys(0xc, 0x2, 0x1) 00:21:05 executing program 3: mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x20010, 0xffffffffffffffff, 0x20060000) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x7, 0x0, 0xdb, 0x304, 0xb, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0aa, 0x0, @perf_bp, 0x44500, 0x9, 0x23a7, 0x8, 0xf80, 0x4, 0x0, 0x0, 0x100, 0x0, 0x5}, 0x0, 0xa, 0xffffffffffffffff, 0x1) 00:21:05 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@local, 0x72}) 00:21:05 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r0, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400}, 0x40044) 00:21:05 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) 00:21:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@multicast1, 0x4e21, 0x7, 0x4e23, 0x0, 0x2, 0xa0, 0x80, 0x0, r1, r2}, {0x6, 0x5c, 0x5, 0x7, 0x0, 0x5, 0x7, 0x37d}, {0x5, 0xa2, 0x2, 0x9}, 0x8, 0x6e6bb8, 0x1, 0x1, 0x1, 0x3}, {{@in6=@loopback, 0x4d2, 0x2b}, 0xa, @in=@empty, 0x3502, 0x2, 0x0, 0x0, 0x1, 0x6, 0x6a0}}, 0xe8) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)={0x7fff4, 0x81, 0x4, 0x2, 0x0, 0x7f, 0x40000000000006}) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={""/10, ""/2, @dev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e20, 0x4, 0x4e20, 0x1, 0xa, 0x80, 0xe0, 0x32, r1, r4}, {0x6, 0x7, 0x400, 0x4, 0x1ff, 0x5, 0x1, 0x6}, {0xdfa4, 0x5, 0x1, 0x7}, 0x7ff, 0x6e6bbf, 0x1, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d5, 0xff}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0xf8, 0x3, 0x7, 0x100}}, 0xe8) 00:21:05 executing program 1: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000100)={r0, 0x1, 0x6, @remote}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000180)={[{@size={'size', 0x3d, [0x35]}}, {@huge_never}, {@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0x37, 0x32, 0x67]}}, {@mpol={'mpol', 0x3d, {'default', '=relative', @void}}}, {@nr_blocks={'nr_blocks', 0x3d, [0x32, 0x78]}}], [{@dont_measure}, {@pcr={'pcr', 0x3d, 0x21}}, {@smackfsroot={'smackfsroot', 0x3d, ')]-'}}, {@measure}, {@obj_type={'obj_type', 0x3d, '+\x96\'(,/}\x19#@)[\\/{%'}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x62, 0x66, 0x62, 0x62, 0x22, 0x61, 0x65], 0x2d, [0x39, 0x30, 0x38, 0x31], 0x2d, [0x30, 0x65, 0x38, 0x31], 0x2d, [0x35, 0x37, 0x63, 0x64], 0x2d, [0x61, 0x62, 0x32, 0x31, 0x37, 0x31, 0x61, 0x62]}}}]}) 00:21:05 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:05 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8001, 0x8, 0x8, 0x5}, {0xfff, 0xf6, 0x0, 0x7f}, {0x0, 0x0, 0x6, 0xdd}, {0x7, 0x6, 0x4, 0x400}]}) syz_open_dev$char_usb(0xc, 0xb4, 0x5) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x20, 0xe3, 0x2, 0x5}]}, 0x10) 00:21:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000000000), 0x0, r0}, 0x68) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast1}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @loopback}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000d0}, 0x24000000) 00:21:05 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x6, 0x7, 0x7, 0xff}, {0x2, 0xff, 0x1, 0x9}, {0x2, 0x1, 0xb, 0x8000}, {0xc1, 0x6c, 0x80, 0x1ff}, {0xfc01, 0xf7, 0x7, 0xa12c}, {0x2, 0x6, 0x9a, 0x1}]}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) 00:21:05 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) pkey_alloc(0x0, 0x3) prctl$PR_GET_THP_DISABLE(0x2a) 00:21:05 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11, 0x0, r2}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r3, 0x0, 0x0) sendto$packet(r3, &(0x7f00000008c0)="27b276943e1da78576c280d4791d71a76b7819932e121e416163e9051efda80f45c466d9b91bca287c91f307738af12969ca6b0f6e1ee4a21cfb2fbd40a49cd37555b67792e99ab08f0e0bd44313119b7c31217448da55600f5eb2e020ed206e64825804ecf075b01c768a37432d7fdf10cabe81edcd1148f168252d0892aed8a64b5e5b2406db0f730fe235439836e93797f8900a05f0f761ab0bee0c3acf6d6225db8d71b5c74090b612999bd4f56ceb88808982c8998e2132e6a37c75182e5598996346040dcb995a8abe2730a5560a75b3dcb2b83785387516e0b8d8dcafdd0ac503be15b600a27ac31e1a992d8f67dc26892221827a214657c55c7654668ed56eb73a69f6387f2922453cd792c871a03f52b2d8a08d512a3309c016d6f215514c27be705ae6020057306e5a83952b32271d5e1bd4b825bd2f3eaaa320ab4a34379b05a2a84b30d3b4edfac9444f94add2e317b66909089063dbb356eefc24d6983adcb5a71b0190f7d20ee1b0c4a0b9a190d69777f230d6c28fa2664241707e6f495b1e02684158ddc2b60c60b11cab832fdb2b49ac7beda85433a509bca82ba01bc19f56c3cef24f264798ac0dd03346614b3360bf0462b9341bb0d1beb64eaf250c8cf467791f0414d99a512d8d7f8c592711e0e3a44d49108297257976f3ffe76d5df6e444473486905b240681f29404cad1bb18b51143bed67b060a6acedf81c795fa96435422c2519b666e6ee1c7f4e3aa3f0e1e8388da426fd094ffda938719adee22b4f36fa4d35377261d144943ac94cd17b8ca4f7af96fa0fa14828a56c590c502608f6c5c03d5757c40281440cc67fe5d1be2d48d21a08f6b010a421001bf3cdfcc8965ddf825fe59753d69c64cfaf6087eea9616cfb7f1f58807935aaca0c0f38423dd35199390ac0bdb8ede683fc11e6370151d6753dfd506d223161876dbd9bb87c1ec67454085eec9a0e8f61600652180d370136707109028383251c0e37d368f99fc619b8fe28875cf9df21ed5e5d09f4c0da78772f779ecdab05f022054f387828ca8b8805c116e830aed5d5457904f3641c05fc9872c5c8006b992114bcec7abde92cce8f293ea58624a61241cc92af79f3769cabc0607450ef8f175d869a941af0ae8c5da09b3b6453f50332697cad3277db0025531e2170859629570927be9691427ff08d63a0bac77470be749b755c9d2583c0452afe04eaac3a07e863d281065b469000c415df5e9a14c8d0aff9325f3cf1713aac2642737a6e1f808d61a0471534d1d28af24f2768059e5b1b36288d8393fdae042779380108bf2f2175d0fe6aba27383d8b63acd817fe4691f6274425641655b86037c9d9e3201f51953e252c42ca8ca31b90ecac8b31453f81e3b63a3dc0061f7bf2abbf586163dad62031907388fa3fd1bb5dba8af9b419cdbb531b2752888b18a45aa43212249e0757dda6d6d99bb72bdcb39195216ad87fbc78f648a9e40431064ef3ec89d3cce3fd03a8997583b92606c1fd9d51a26b2b9c4472f623bcd099b23a33535776ecc516483a2b68347c5e7e1d9147b4a81d63ac0e51a3169d7b6bcd34172de4f3b6b79a66439c6aae51aa3c4f9ead2be010e176b7f354869daa0c877a2d7c3008079a466786bf53427f40511bc05be99c358501473124d619fb205e9823b83b9751d0f665e4eb67f03f48344fb7f6da6d4c6a57fb07517a37ec6e9b7fa09614b6dcffc5a9940afb7a2c54d507793a6b0eb8b30239943b9b4af5e8c65af8bbc3738302e37cff350e8dbefd6276a7c14ea8752cac956f8dd3e61c613342bb7816a23028843fa723764f1289a805baaa943a31c5089e4e17efdc2f3a50f8c1d9789a547845d621e4713140fe00282c423993c88dbe658ad8110451543c06f3f2ec8a1a83f627dc78c73aa51148881f78dc5c7a40e12c34c29e3e0c8cba174eb604a112db4cc8dcd0cc4542f190634668ea779330ab10f2ff5ccb12b289cb56fc33b6743be22544510521c90e508c8d5fe5bcb54a022167bc026173ffc5e7351755115adc2643b721a249cab5f7d318d23cc70cae7e1be9a52082ee4432e089bfdf4e3fdd60a331a7524e5dcbbd35846976c4b01f4ef29b1545a7907ec84f7588caf870690a176e760e163d45002e508716eea9bb906700ecd302b53835638f56e0601e562b174f96c60171701e1b6ab9beb898577cb993cd793ebf5a5371f8dac9f5cf6ffa34e108a482f7b026fd83f31ea82c482e7013f1ea80ad33a9bf709db61479e8cf4ed903c240e60ca1e681edb6f657c5e7115f3f014253496becba21ad6a53d21e87f31e6e4569e9405bbc6010ed10df44331176c4d0764930844fd03ca75b804453ba787305f129848768a89e9ee21070552b681de5cb8b3893dfd4d6c281db824c4cdfe08ecff20d673ef9cf7274f6ea77f6ddcf1db587ea0ef10dc5f37ea714c1b84443822d1a93c18da5aff02fb6956407c834fc4ae545daa1c4718e5f0676d5b1fe67c4e7f19a989b6f15007d71a03b3c448009469bdd23e68c1e68cfa011754278ed124ae977ed6a69c43cca76413268c9deb2601cffbea17f609ba85e0110c49f3795838451ccbc53e972b8c1a98e607c539a7bbe1b1fb95766a1bb0fb52da5127fa98e1fba5180cf363b41168e2eccbcf9deb2295f5d5ea89fe72edc059e34c57e23dbfb5f26874e5bdf3f6c705cafe2fa8d7fbad2022524fa755566a5762782a805de76716cd68964053509e5cf2bcb8cc45a2d20787a4532a912e8485cdde2a2b2f70403480cac31410362f7c71edb0ded0b7a095c2d339ae24db1bfb758c323021f55eb3077eb75693429c807b1051f6634b6e5eacdb16c242c01dbd9b50ce9fe0aab61c33a878136d86127ee81b46febb4bdd8dfafe0707fdc93c5676cee9e5acf3e7ef60613432b173dcbfb1a72fbcb668dda01ad39a8041a2b1972d9cb082c7e2d428428283420baf750ac260a36d8145bd3d755775c59dbb2e918047e9290df7bec6b96c036105d4b76c60a881524d1b38339a8712f54816c3dcdc582be6b5ec034ba071d61384eab95a95badf42d7e2f6d480141342b4f299151654475f24d96b8660543cd26bd83d6c968021355497835f1fa9c9dddfdf448ced2ee1c62d10c13b266314b8a7ef9f9978bef3505fc62e0cd79aa16952311eafae57d2077d65bc5b5cc4e10bbb191f4d12e1d93995b4fda3b00a492d0e9787d7280340b108fb93e4e935c405e34ac66f741d2e2a579333f31a8115a03025aad64ce62432fddc22517c96f52e566b71bbc353bfc53d2a94d6ff3dc16c1d23bff744f6e0528e5fa5f67b74d39d7baaf9f113b0ec74301b3f7e448a9b6932731cd129a9ddf2ec9aee46f367a77c9db8bfe155c8477e92cbcafc2f7b528f5c06eb0b93ee7aa601e59a0eda37cadf9cac2ae968794352e884e8ed63977b919864fbc5a38933387b1dffc29abeac3ecfcf8b801ddb8eee1b058b661bd7be5782672a18bdbd7bb9164f3c9c6b130c7def47c23157bdcbcce8c2069726b06286a6674882e5d0a0300f15b89780bc5895601937e9aedd00aa022b85dfadac6b3761267082c53d623621fccbcb0c464b9d7dadf47994e0d08654da031b883d5f563368cf934d9e495e9b98c8b4bede9625d660a21cc4fdc5f4ea9d71e424b5441a0a7167e647f583e0ba9cdd9b55b79354aebaa43b0796ec439efcbe51d29136155e98689542e250cc1ee6387327bd9d08f044f105ec70a7993dc927e945fa6ea546d90e35af3fadf3727abb2a5e63ae040239c69db3c3ab300edf85b4e175b70c824e44578619fb0b34bcac2a70e6da86400e6fbd2647f6b57d385b75190f834afafd600cc707049ce5d9cc45d21e39c32b39d48ac03f10c9d54f83d7237d085594b3239e8a83a380b8eb0ea709fcc3e7705fc2de3cc512781306e938ac94ff0d88f92f4e3df53c25846eb1e633e97ed70f9e920602e773b6cda55beb74d5242a7dc23ae2a775a6fd9715162a7f9df60646d201485141efa924caa49f4f6047e857f50f507397044359a7f8cea806c0003329bf7ac8212f1895b7408ea69fe4a2ec3691cc3e4848f53f31e1a78697971a5f2408dcb2700da86052da52f43c5dcd2e9a1b3eec10a2a475601ba37f3b28c411b795d1886f04eb1e0651bb681fd0cc27c2300b939316398fb3d50029b51232b67b405808728d2c27743bf1b50b500cf95ddf9966043ae24f6b7f4eddc18c2002b9dfb5d40f859768afd6fbc125ae95ca174567793ae512ae705d5d0eee5ca501be9d8c18cdd68c05a0d9713f848d5b4c6b25666770fd8e9613c883f659d3cedc147a4c2acce3572b0fd4cdbdf141013f39b650c47ea18a050a41c6fe8053147140f3929f73418ec09dac3cdae1239c6e8f55e718f272febedc62255ca7f6a7018fdebd2e7441076edf86a67a143d2126a3ac84b72b57511561824cd5f13c6250e1af26ac0ecf9cd0434d6ae5e5edcb822fb8567bfbcea940290699318a62342ed0b6e03bb2058d42e7443f59c4563236789eddc70c50be87fca2a672fc747e86cbfd38a280d7b4364d05a7925fca70cb1e10823b583fac135fe862ae52144051eb62cc090e9d77ac7754c5484b67d3fa11ef8ff48203f71123da345f6f2ab1ce90b4f82b246af4f134243fd2c5fadef3461623a614d90b48b2cb4a57190bce6abb294bad5e257bc6f188e2937aa4cdcc3c2042532f68c931f755a7ecf6b46c3a13c4778fd54776d989e2654407d5e8c895df7d1543f4f97ace45b5389dc894fc306d91ad2b6b8505a8150eb95bb47fa130dd1cb36a99c6751fc5ba8ff8ec4dc0b9aaae6c2ae125f7704cf722f91cb9248ac4579b520c66b1e66ecc07dbec339e83770a976aa4f273e5c955f97873b92a3d202a773ff55f353ab5ed4619c4895cf5f266fef725e676c88a4945579f61b518983b81ea7616e518f58b3e2a792a95d3fbc2f248019ffeedb2dd9f0c2042db6d294eddacb312d8c71bd4007110788b8fe278fef96e21fe62de43542f3b5273ff9c488c415efaa8c7354ef4e5f8b15a339f1e963340007f83a38155a825052b4a54904fe74075e7463f65a41f9ba686abf2f551d9c6d07907f316cd9a8c7f84807a3db275e7f6e636e6f053a1acd7a66522f74beccff99a543f843ac5f914002196d502aab90199cd2b0b688d2a90931c7d07e897c2c4d54aec83abd1f92b86770a6f2d0db5e73038374b78760e8dfa181c63cadce1cd045e2248ad2b785ac3f36a8ffd096863cfd50a25fcef20754909fb4e9eb947633fbce02f01833beb2d087aaa9256483a47f9145f3a82b9ef42653e444a5086465a3282da712cf5fb5a4e2976bec1f141c80487e36802414e12924d6500e23af5fa1c07749956a447f1296caa844fb7f61ea0095140c8aec21e71373ec963f59547ad6ec8adbf55c3d06ab5da76d5df546067e652d36ae877f08d165e9eec5feded3c0b88b10bf295b7763ae77855d1d8f3543b5385f74b5b103879a6621c69d92a0b76b9b64e7f9f1ebd88c80b25f717ab669e979d469364d02a6d4433282680f321b0be860c5af6cdb45ed1365060f3bc2af1d879603e343e4bef994474848e70129e7b534e5ed723d99631a7bed65c9c49145ae676bf748b308518bb688f6d0be4e4c481b16fc1a52625afb9387fbc8305767028edd0fba5d7b7e6d5737c3fab94f03759573cde7907bcd99757b7382cc8fe8ab65d60937fd158c1e063b465279159805cdbbc6c8c33bcc5a5f5426f30b0094d8d5ee0013ce4906ba1aa352e", 0x1000, 0x4000000, &(0x7f0000000380)={0x11, 0xc, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}}, 0x14) ioctl$RTC_UIE_ON(r0, 0x7003) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="58010000", @ANYRES16=r4, @ANYBLOB="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"], 0x158}, 0x1, 0x0, 0x0, 0x800}, 0x40) 00:21:05 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000000)={[{@mode={'mode', 0x3d, 0x9}}]}) 00:21:05 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x7f, 0xb6, 0x9, 0x4, 0x0, 0x8, 0x4, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_config_ext={0x100000000}, 0x4c094, 0xa0e5, 0x8, 0x5, 0xdc, 0x23e455f, 0x8, 0x0, 0x1, 0x0, 0xcc5}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x49, 0x6, 0x0, 0xa0, 0x0, 0x401, 0x2004, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, r0, 0x9) 00:21:05 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 00:21:05 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x0, 0x87, 0x4}, {0xfbff, 0x9, 0x0, 0x1}, {0x401, 0xae, 0x38, 0x851}, {0x8, 0xb4, 0x1, 0x3}, {0x1, 0xd1, 0x5, 0x3}]}) 00:21:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) syz_genetlink_get_family_id$devlink(&(0x7f0000000180), r0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x9efff7, &(0x7f00000000c0)=ANY=[@ANYBLOB="ef95687349e0e6e72b73aa312c026010834bec08b2bfb70086ab6eee4f7bcc645fba69ab8646c335bb82574b5deae007369d65f60d28b0a29deb5fd3d2ac3ce3b29e834078815e16f03f888bee6a3c754c540bfff8a1022b383bf35b33921e9f2b0cf9eeacd3a61391b4e4a0c6293f7951651516138d53eca1cc2fb135d360fb156b02994961"]) faccessat(r1, &(0x7f0000000000)='\x00', 0x1) 00:21:05 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x2, 0x2, 0x7, 0x400}, {0x8, 0xeb, 0x5, 0x3f}, {0x3, 0x9, 0x80, 0x7f}, {0xca20, 0x0, 0x7, 0x8}, {0xfff8, 0x40, 0x5, 0x1}, {0xe4cf, 0x73, 0x5, 0x7}]}, 0x10) 00:21:05 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x40800, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x400) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:05 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0xffff, 0xff, 0x7, 0x163}]}, 0x10) 00:21:05 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 00:21:05 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x2, 0x0) 00:21:05 executing program 0: getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)={'nat\x00', 0x25, "343dcdf120ae2a9edb176ef79ccbcd3bccfd1ab0d42420dd88a6d2e48693e15a614bcb886e"}, &(0x7f0000000080)=0x49) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 00:21:05 executing program 3: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f00000008c0)=""/4096, &(0x7f0000000180)=0x1000) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r2) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="13000000", @ANYRES16=r4, @ANYBLOB="10002bbd7000ffdbdf251900000014000180080003000200000008000100", @ANYRES32=0x0, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x24000084}, 0x4010) ioctl$KDSKBLED(r1, 0x4b65, 0x1) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r5, 0x0, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f0000000080)=""/140, &(0x7f0000000140)=0x8c) 00:21:05 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x7db, 0x1, 0x2, 0x6}, {0x3, 0x0, 0x4, 0xfffffc00}, {0x7fff, 0xe3, 0x2, 0x80000001}, {0x7fff, 0xbd, 0xf3, 0x8001}]}, 0x10) 00:21:05 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x1, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7, 0x7b, 0x20, 0x6}, {0xfff, 0x3f, 0x1, 0x101}]}, 0x10) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000001c0)=0x14, 0x1000) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x0, 0x19, 0x7f, 0xffff4ad6}]}, 0x10) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/217, 0xd9, 0x103, 0x0, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000500)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000540), r1) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000300)={@remote, 0x0}, &(0x7f0000000340)=0x14) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x6c, r2, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e23}, @FOU_ATTR_TYPE={0x5, 0x4, 0x3}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast1}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_TYPE={0x5, 0x4, 0x3}]}, 0x6c}}, 0x44800) 00:21:05 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x1, 0x0) 00:21:05 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:05 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) r0 = getuid() syz_mount_image$nfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x9, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="e488c64b25b8f38c57492a4eff639b68160adc4ec73654e4acb1010166f366650912424b7d33351775eac47a40a026ab2716b99890c0e8b31e901f10911505ff3bca71bd36caa015", 0x48, 0x31}], 0x0, &(0x7f00000001c0)={[{'\x94,'}, {'tmpfs\x00'}, {'tmpfs\x00'}, {'tmpfs\x00'}, {'./.,+'}], [{@obj_role={'obj_role', 0x3d, 'tmpfs\x00'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@dont_measure}]}) syz_mount_image$nfs(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x5, 0x3, &(0x7f0000000400)=[{&(0x7f00000002c0)="f4e76b85b6677806e0c2136a574fe3b698b3c6d7f252c486517f667f3b9cc5a8888a44f84a06", 0x26, 0x401}, {&(0x7f0000000300)="92e7f0ee65549cd27240cfbf4b735412e60d386699c24ea70ebd68bc194510d0", 0x20, 0x3f}, {&(0x7f0000000340)="113db504082564c54b957994040b373b0638e29925a3e325484baf76036a67abc4bf7f0f27c3dd042ae9b7653de96c70da0539be690543b49ba132a3c6734daefefee9d16146cc8678b3592b38cab9b846baec45cd77ce1491559a699bdecf13739125c36b2f587b55dc8e3eedf4fc585144b48244bad5ee04f0a533316bff3b8718963e697988", 0x87, 0xfffffffffffffffa}], 0x0, &(0x7f0000000480)={[{'!'}, {'fowner'}, {'tmpfs\x00'}], [{@permit_directio}, {@euid_eq={'euid', 0x3d, r0}}, {@dont_hash}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@smackfsfloor={'smackfsfloor', 0x3d, 'fowner'}}]}) 00:21:05 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) write$char_usb(0xffffffffffffffff, &(0x7f0000000200)="e35d688eb8956b8b3d1771b1a6baa01f7e82e8e582b1df5b63ddef7b938054e81a59dd6ca3e81efba91ff7defbeefd63f500acd776cf14d965776dc043c4005e252e8046acf55997a1421b08986d17848d5924d6ccb195d4ab68ffdfe93b648dbb3934497827e9389ad33b48c403e8a4c1d6641065ee0420e11cadeb6ba1f17094dcc0a005486755322bfa04ba260a01f3505bddc63de7aa395b30a6ea7e907dbe8632260509ed2098da378755ff34b9f98b3b069838f9060272ef14e7568a37afc024e1cc38f0b085341c68498e3b61dd62c6bf5dbac1844a94323c82adddc0b0d6b257f04a693a662ad409186b3fed0e7b2b3c4fcc67354428e99dfc66d50fe4acf52c15f0a174", 0x108) 00:21:05 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) syz_open_dev$usbmon(&(0x7f0000000340), 0x4dd, 0x80002) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0xff) write$char_usb(r1, &(0x7f0000000380)="389f444dd0b6dc659abbb84d862e456ffb99f4488c199133b38b8baf6ec5a295f2ab945d366fdaa163e9c4e0081cdd8ba24a3b9623924f2deec625af45e3171ade4a33f94a98c605af06f67b21154b01ffb1a755ab60aae9fcb33bb34921ff855546d14318596594ac54f55d5f37bd9ff99248073798fd5e430dcc57905bdf63193ace54edd0080b0cba6d7b93322cb877fb8ad68c554ac8d277a62076ccbc333f50ff2a7f79bc943d72ac2322962ebcdf3d7b67f4ef6db331ae3ea8c03bfe73b9c413f136f11da936efbe0bac9ca997a81702ebd881", 0xd6) getpeername$packet(r0, 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) r2 = accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14, 0x800) syz_genetlink_get_family_id$fou(&(0x7f0000000100), r0) syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r0) r4 = socket$nl_generic(0x10, 0x3, 0x10) connect$packet(r2, &(0x7f00000001c0)={0x11, 0xf7, r3, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x39}}, 0x14) socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r5) sendmsg$ETHTOOL_MSG_COALESCE_GET(r4, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="a8002a5a099d71265c9db5ed7f215c0225", @ANYRES16=r6, @ANYBLOB="010028bd7000fddbdf25130000007400018008000100", @ANYRES32=r3, @ANYBLOB="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"], 0xa8}, 0x1, 0x0, 0x0, 0x4000}, 0x40) getsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 704.880157][ T7437] nfs: Unknown parameter '”' 00:21:05 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x1, 0x0) 00:21:05 executing program 3: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2080303a}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r0, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7fffffff}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x2}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x9fcbbde2c38791e3}, 0x400c040) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:05 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r0 = syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}}, 0x0) sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r0, 0x800, 0x4, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x1}]}, 0x30}}, 0x44) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x0, 0x8c, 0x5, 0xfff}, {0x8000, 0xc, 0x2, 0x8}, {0x6a31, 0x8, 0xcc, 0x7}, {0x7ff, 0x81, 0x4, 0x1}]}, 0x10) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000000c0)={'filter\x00', 0x39, "e48abd8e4c02f5809f1bf510427d8625518e815cb8e9d0b0e977bb26e609514083181804dfa35f043ad34e57ca38cc46d54f92111343867d37"}, &(0x7f0000000140)=0x5d) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r4, 0x0, 0x0) accept$packet(r4, 0x0, &(0x7f0000000080)) 00:21:05 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x9, 0x6, 0x8}, {0x0, 0x1, 0x40, 0x19e2}, {0x9, 0x27, 0x1, 0x5}, {0x4, 0x72, 0x5, 0xc3e}]}, 0x10) 00:21:05 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x48bf, 0xff, 0x9}, {0x100, 0x0, 0x80, 0x7f}]}) [ 704.916802][ T7437] loop1: detected capacity change from 0 to 16383 [ 704.927750][ T7437] nfs: Unknown parameter '!' 00:21:05 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x9, &(0x7f0000000180)=[{0x401, 0x8, 0xe3, 0xfffffffc}, {0x0, 0x81, 0x4, 0xedbb}, {0x1f, 0x40, 0x0, 0x7ff}, {0xfa, 0x9, 0x3, 0x66}, {0x8, 0x6, 0x5, 0x7f}, {0x7f, 0x3, 0x4f, 0xf74b}, {0x8001, 0x4d, 0x7f, 0x3ff}, {0x7ff, 0x2, 0xac, 0xcaf}, {0x80, 0x8, 0x5}]}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, &(0x7f0000000240)={0x6, 0x6}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@private1, 0x1a, r1}) 00:21:05 executing program 2: openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x40, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x14}}, 0x0) 00:21:05 executing program 0: sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c001f00", @ANYRES16=0x0, @ANYBLOB="0002baadca12fcdbdf251626060000000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40000) prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{0x5, 0x9, 0x1f, 0xfffffffc}, {0x101, 0x3, 0x43, 0x20}, {0x5, 0xa0, 0x80}, {0x4, 0x2, 0x1, 0x9}]}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r0}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x40}}, 0x4) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}}, 0x0) sendmsg$NL802154_CMD_SET_PAN_ID(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x44, 0x0, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@NL802154_ATTR_PAN_ID={0x6, 0x9, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x44}, 0x1, 0x0, 0x0, 0x4008080}, 0x4004080) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440), r1) sendmsg$NL802154_CMD_SET_TX_POWER(r2, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, r4, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@NL802154_ATTR_TX_POWER={0x8, 0xb, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r0}]}, 0x24}}, 0x4001) 00:21:05 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) [ 705.012388][ T7472] nfs: Unknown parameter '”' 00:21:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x370}}], 0x1, 0x4010) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000340)={@remote, r1}, 0xfffffffffffffc99) socket$inet6_udplite(0xa, 0x2, 0x88) 00:21:05 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r0 = syz_open_dev$rtc(&(0x7f0000000000), 0xdbd5, 0x10000) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0c40dd080000c6c0cf4afed7fe5200dfcfcc92ab3ddf708175c4f1125a86048000"], &(0x7f00000000c0), 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = syz_open_dev$rtc(&(0x7f0000000100), 0x7, 0x280000) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000140)={0x0, 0x0, {0x13, 0x12, 0x17, 0x19, 0x8, 0x7ff, 0x2, 0x104, 0xffffffffffffffff}}) 00:21:05 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff3000/0xd000)=nil, 0xd000}, &(0x7f0000000080)=0x10) bind$packet(r0, &(0x7f0000000000)={0x11, 0xf6, 0x0, 0x1, 0xff, 0x6, @local}, 0x14) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:05 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x2, 0x0) 00:21:05 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) 00:21:05 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) 00:21:05 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x2, 0x0) 00:21:05 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x6, 0x3, 0x9, 0x10000}, {0x3f, 0x69, 0x2, 0x9}, {0x3ff, 0x70, 0x0, 0x2}, {0x2, 0x3, 0x4, 0x8001}]}) 00:21:05 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) name_to_handle_at(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@ceph_nfs_confh={0x10, 0x2, {0xc7d2b0f, 0x9a5}}, &(0x7f0000000140), 0x1000) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0x2, 0x6, 0x7f, 0x9}, {0x6, 0x7, 0x5, 0x8}, {0x866d, 0x4, 0x7, 0xfffeffff}, {0x4, 0x1, 0x80, 0x1}, {0x100, 0x1, 0x0, 0x7c0f}, {0x2, 0x7, 0x0, 0x3450}, {0x401, 0xae, 0x63, 0x7}, {0x5, 0x1, 0x1f, 0x20}]}, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}}}, &(0x7f0000000280)=0xe8) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r4, 0x0, 0x0) ioctl$VT_ACTIVATE(r4, 0x5606, 0x6) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @local}, @in=@rand_addr=0x64010100, 0x4e20, 0x1, 0x4e20, 0x0, 0x0, 0xa0, 0x0, 0x3a, 0x0, r3}, {0x6, 0x1, 0x10001, 0x0, 0x2e38, 0x1, 0x9, 0x1000}, {0x9, 0x50, 0x0, 0x2}, 0x38, 0x6e6bb0, 0x0, 0x1, 0xd8b5baf330800c7b, 0x1}, {{@in6=@loopback, 0x4d5, 0x33}, 0x2, @in6=@local, 0x3505, 0x2, 0x0, 0x40, 0xfffffff7, 0x9, 0xa2b}}, 0xe8) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x200) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000003c0)={'mangle\x00', 0x47, "2e2b3371b68283820bfb645bef5c9d3d7029e9bbb4f3b672e62301aa8db4863fea848c8747908c54b5f1945781d23a0420229288eb08dcf89cb0fa226edb6018b342758852dc49"}, &(0x7f0000000440)=0x6b) 00:21:05 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 00:21:05 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 00:21:05 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) 00:21:05 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000280)=ANY=[@ANYBLOB="7990e015da94758954cb13c3605db652028a0859b4201eb65e61dc61dd919b082ca69cdac81395dc4aeb45f333be3bcf268bc31063ec4fa100ce7b2d055745eec09bec439f813e64da1efd2630e2a8a22f98f810f60307421a720c72ab6b593619fe0b375c7c0195dc12ff709d4582c9a4cb208da36a57a5c3b78eb39bad3be2d6fb082743dd0a10c718d9723437e578095cf53b47dbf1891ac7ee17132fbacf"]) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_PAUSE_TX={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x4c80) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x200000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), r1) getpeername$packet(r0, 0x0, 0x0) r2 = openat$cgroup(r0, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000240)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)={0x3, 0x7f, 0x6, 0xffff, 0x16, "79cdeec5d7e18e7b"}) 00:21:05 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x10, 0x1f, 0x3, 0x11, 0x5, 0x6, 0x0, 0x60}}) 00:21:05 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@private1}, 0x0, @in6=@private0}}, &(0x7f0000000100)=0xe8) 00:21:05 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) 00:21:05 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 00:21:05 executing program 4: r0 = getegid() fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, r0, 0x1000) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 00:21:05 executing program 3: r0 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) recvfrom$packet(r0, &(0x7f0000000040)=""/93, 0x5d, 0x2000, &(0x7f00000000c0)={0x11, 0xf6, 0x0, 0x1, 0x9, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x25}}, 0x14) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:05 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7775adac54090b8dd8291a29d4040531c4d95c43e4cdd8e079594ec130369dec437bec5532457f465900c34b79c97ba58f59d8a2cb7cdfeeb7c60adca61d210000000000000000000000610f02ba7a70a2392a4e724bf0df615909474e0558d588c2ed504210d96c356933eb005e8f7676a322db0e8ec2b3875ac1459b16312a91746b09000000000000005353a83faed7c7a747ce0be27129bfb20fba0544475f3121913c3a05c0bff6993813218d6fe3d8"]) 00:21:06 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) 00:21:06 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0xa00, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) 00:21:06 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x224102, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) 00:21:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000080}, 0x2000c001) prctl$PR_SET_SECCOMP(0x7, 0x1, 0x0) 00:21:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in=@private, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@private}}, &(0x7f0000000140)=0xe8) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, 0x0, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}]}]}, 0x44}, 0x1, 0x0, 0x0, 0xc080}, 0x0) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) 00:21:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) accept$inet6(r0, &(0x7f0000000000), &(0x7f0000000040)=0x1c) 00:21:06 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x1a1400, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x12b380, 0x0) r1 = accept4$packet(r0, &(0x7f0000000180), &(0x7f00000001c0)=0x14, 0xea7aaf700075a2af) getpeername$packet(r1, 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000100)) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x200000000000000c, &(0x7f0000000000)=[{0x87, 0x9, 0x81, 0xde39}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) r2 = syz_open_dev$rtc(&(0x7f0000000200), 0x10000, 0x40000) ioctl$RTC_UIE_OFF(r2, 0x7004) 00:21:06 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x1e}, @in=@dev={0xac, 0x14, 0x14, 0x17}, 0x4e24, 0x7ff, 0x4e24, 0xfff7, 0x2, 0x20, 0x30, 0x8, 0x0, 0xffffffffffffffff}, {0x0, 0xfc8, 0x80, 0x0, 0x2, 0x7f, 0x3f, 0x8}, {0x7f, 0x7, 0x8000, 0x2}, 0x3, 0x6e6bbf, 0x2, 0x1, 0x1}, {{@in=@loopback, 0x4d6, 0xff}, 0xa, @in6=@local, 0x3502, 0x4, 0x3, 0xf0, 0x7, 0x0, 0x3f}}, 0xe8) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0xffffffe0, 0x0, 0x6, 0x1, 0x0, 0x4d, 0x7ff0}, 0x1c) 00:21:06 executing program 4: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x88280, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req3={0x6, 0x45f, 0x14000000, 0x2, 0x40000000, 0x8, 0x2}, 0x1c) 00:21:06 executing program 3: sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x130}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x64, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_MGMT_A_DOMAIN={0x6, 0x1, '[\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_DOMAIN={0x6, 0x1, '{\x00'}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2b}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private1}, @NLBL_MGMT_A_DOMAIN={0x9, 0x1, '^[\xfa{\x00'}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x22}]}, 0x64}}, 0x8000) sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1e}]}, 0x24}, 0x1, 0x0, 0x0, 0x4048800}, 0x4024000) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:06 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)=ANY=[@ANYBLOB="a7"]) r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) read$char_usb(r1, &(0x7f0000000100)=""/58, 0x3a) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0xc3, 0x8000}) 00:21:06 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/67, 0x43, 0x100, &(0x7f0000000080)={0xa, 0x4e24, 0x586, @private1, 0x9}, 0x1c) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000001c0)={0x3, &(0x7f0000000180)=[{0x7, 0x0, 0xf7, 0xe5f3}, {0x0, 0x1, 0x69, 0x87}, {0xb4, 0x8, 0x9, 0x7}]}, 0x10) getrusage(0x0, &(0x7f00000000c0)) 00:21:06 executing program 5: getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ff7000/0x7000)=nil, 0x7000}, &(0x7f0000000040)=0x10) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 00:21:06 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x2, 0x0) mlock2(&(0x7f00003ff000/0xc00000)=nil, 0xc00000, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e23, 0x8001, @private2, 0x8}, {0xa, 0x4e22, 0x8291, @remote, 0xffff}, 0x8, [0x0, 0xc45, 0x9, 0x4, 0x1, 0x64e7, 0x8001, 0x3]}, 0x5c) 00:21:06 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)=ANY=[@ANYBLOB='C']) 00:21:06 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14, 0x80800) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:06 executing program 0: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000000)={0xad, 0x8, 0x0, 0x89, 0xb4, "4329ec46adcb5528dfa8c7a09628238bc688c0", 0x0, 0x7}) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 00:21:06 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x4) 00:21:06 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x0) 00:21:06 executing program 5: syz_genetlink_get_family_id$fou(&(0x7f0000000000), 0xffffffffffffffff) prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e24}, @FOU_ATTR_AF={0x5, 0x2, 0x2}]}, 0x24}}, 0x800) 00:21:06 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x8001, 0x3f, 0x7f, 0x6}, {0x3, 0x1, 0x9, 0x19d}, {0x8, 0x5, 0x3, 0x1}, {0x6, 0x7, 0x3f, 0x7}, {0x3, 0x14, 0x1, 0x1}, {0x81, 0x8, 0x4b, 0x14000}, {0x6, 0x80, 0x7, 0xd7}]}) 00:21:06 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x10e, 0x9, 0x8, 0x6}]}, 0x10) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:21:06 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001300), r0) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x78, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_LBT_MODE={0x5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x78}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0xa002, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="4cf0c2ab03e328428d6de300000500727de6a18f09f84b001400010000000300010000000800"/53], 0x30}, 0x1, 0x0, 0x0, 0x4004000}, 0x8000) setuid(0xee01) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@broadcast, @in=@multicast1, 0x4e22, 0x8000, 0x4e21, 0x0, 0x2, 0x20, 0x0, 0x11}, {0x1ff, 0x8503, 0x100, 0x5, 0x80000000, 0x6, 0x7, 0x9}, {0x6, 0xa74, 0x7, 0x8}, 0x0, 0x6e6bbd, 0x1, 0x0, 0x3, 0x3}, {{@in6=@dev={0xfe, 0x80, '\x00', 0x42}, 0x4d5, 0x5e}, 0x2, @in=@private=0xa010100, 0x34ff, 0x4, 0x0, 0x5, 0x81, 0x8, 0x400}}, 0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000440)={r2, 0x1, 0x6, @multicast}, 0x10) sendmsg$DEVLINK_CMD_PORT_SPLIT(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000004c0)={&(0x7f00000006c0)={0x190, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x3}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x4}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x7}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0x9, 0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x8}}]}, 0x190}, 0x1, 0x0, 0x0, 0x840}, 0x4048000) r3 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@remote, @in6=@private2, 0x4e22, 0x2, 0x4e20, 0x7f, 0x2, 0x80, 0xa0, 0x6, r2, r3}, {0x0, 0x10000, 0x3, 0xfff, 0x22, 0x9d9b, 0x1, 0x59}, {0xfffffffffffffffd, 0x3, 0x80000000, 0x31598000}, 0x4a40, 0x6e6bb9, 0x0, 0x0, 0x2, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x28}, 0x4d4, 0x33}, 0x2, @in=@multicast1, 0x3506, 0x2, 0x3, 0x7f, 0x225, 0x40000100, 0x9}}, 0xe8) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000009c0)={@empty, 0x5, r2}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000540)={@private2}) getpeername$inet6(r4, &(0x7f0000000540)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x5d, 0xe0, 0x2, 0x59, 0x0, 0x4, 0x20000, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x40000, 0xfffffffffffffff8, 0x3, 0x9, 0x4, 0x28000000, 0x800, 0x0, 0x0, 0x0, 0x9}, r1, 0xc, 0xffffffffffffffff, 0x6) 00:21:06 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) 00:21:06 executing program 0: r0 = syz_open_dev$rtc(&(0x7f0000000000), 0x1782, 0x2000) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) r1 = shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r1, &(0x7f0000c00000/0x400000)=nil, 0x4000) 00:21:06 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x7, &(0x7f0000000080)=[{0x7, 0x7f, 0x9, 0x32}, {0x8, 0x9, 0x7, 0x7}, {0x7fff, 0x73, 0x8, 0x8001}, {0x0, 0x85, 0x3, 0x5}, {0x5, 0x6, 0x8, 0x6}, {0xcb, 0x7f, 0x48, 0x7}, {0x7, 0x1, 0x5}]}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000180)) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) 00:21:06 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 00:21:06 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000ffb000/0x3000)=nil) 00:21:06 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x3, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x40, 0x2, 0x68, 0x2}, {0x85, 0x24, 0x1f, 0x2}, {0x0, 0x7f, 0x7, 0x7fffffff}, {0x9, 0x8, 0x7}, {0x0, 0x1f, 0x3, 0x1}]}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x80ff, 0x5, 0x1, 0xfc92}, {0x5, 0x3f, 0x6, 0x6}, {0x8001, 0x3, 0x4, 0x10001}, {0x1, 0x2, 0x3, 0x200}]}) 00:21:06 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000000)=ANY=[@ANYBLOB="011f194ad15763b0cc587ad207183ad61f309cba7e5d872e15e8d54e30c3"]) 00:21:06 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001300), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xe4, 0x0, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NL802154_ATTR_SEC_LEVEL={0x24, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x1}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}]}, @NL802154_ATTR_SEC_LEVEL={0x34, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x4}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x8}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x1}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}]}, @NL802154_ATTR_SEC_LEVEL={0x24, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_FRAME={0x8}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_SEC_LEVEL={0x34, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x3}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x6}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x7}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x1}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000) 00:21:06 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0xf9f7, 0x0, 0x8, 0x81}, {0x0, 0x8, 0x0, 0x6}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000080)={0x4000, {{0xa, 0x4e22, 0x1ff, @dev={0xfe, 0x80, '\x00', 0x26}, 0x7f}}}, 0x88) 00:21:06 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000)=""/136, &(0x7f00000000c0)=0x88) [ 705.790463][ T25] audit: type=1326 audit(1622679666.468:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7651 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:06 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x9, &(0x7f0000000000)=[{0x5, 0x3f, 0x4}, {0x5, 0x7, 0xe, 0x6f2}, {0x3, 0x0, 0x1, 0x8000}, {0xffff, 0x20, 0x7}, {0x7fff, 0x5, 0x2f, 0x200}, {0x9d5, 0x7f, 0x80, 0x9}, {0x80, 0x5, 0xf0, 0xfffffeff}, {0x5287, 0x5, 0x3, 0x1}, {0x1, 0xe1, 0x9, 0xfff}]}) 00:21:06 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x6, 0x0) 00:21:06 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 00:21:06 executing program 1: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x280d1004}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x84, r0, 0x2, 0x70bd29, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x200}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x7fffffff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x49}}]}, 0x84}, 0x1, 0x0, 0x0, 0x84d4}, 0xda9ba2b8d1bedc65) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x1fffdf, &(0x7f0000000580)) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) utimensat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x0, 0xea60}, {0x77359400}}, 0x100) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000080)={@desc={0x1, 0x0, @desc2}}) accept4$inet6(r1, 0x0, &(0x7f0000000140), 0x800) 00:21:06 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)={0x8, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, '\x00', 0x24}}}, 0x0, 0x5, [{{0xa, 0x4e24, 0xab5, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}}, {{0xa, 0x4e21, 0x725, @private2}}, {{0xa, 0x4e24, 0xffffffff, @ipv4={'\x00', '\xff\xff', @loopback}, 0x7}}, {{0xa, 0x4e21, 0x23, @private2, 0x7ff}}, {{0xa, 0x4e20, 0x1, @private0, 0x2}}]}, 0x310) 00:21:06 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0xbb6d, 0x2, 0x5, 0x9}, {0x4, 0xff, 0x5, 0x5}, {0x8000, 0x7, 0x40, 0x8000}, {0x1, 0x5, 0x3d, 0x7f}, {0x30, 0x6, 0x26, 0xfffffff8}, {0x8, 0x3d, 0x3, 0xffffffff}, {0x800, 0x77, 0x5d, 0x1}]}) 00:21:06 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7, 0xa3, 0x40, 0x6}, {0x4, 0x4, 0x5, 0x7fffffff}]}, 0x10) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='dJ=s5\x00\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000126bd7000fbdbdf250300000014000900fe8000000000000000000000000000bb08000800e000000106000a004e210000"], 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x20008084) syz_open_dev$char_usb(0xc, 0xb4, 0x10000) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000001c0)={0x1, &(0x7f0000000100)=[{0x6, 0x49, 0x3, 0x3ff}]}, 0x10) 00:21:07 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x2, 0x5, 0x0, 0xe6e}, {0xc0, 0x5e, 0x9, 0x5}, {0xfff, 0x7, 0x10, 0x200}, {0x5a10, 0x6d, 0x80, 0x1}, {0x3f, 0x7, 0x6, 0x3ff}]}, 0x10) 00:21:07 executing program 3: getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@local, 0x0}, &(0x7f0000000100)=0x14) r2 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x14) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000005c0)={r3, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, 0x0, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x77b7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000080}, 0x20040091) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, 0x0, 0x20, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44000}, 0x0) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r4, 0x20, 0x70bd25, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x801}, 0x14) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r5, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x600000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r4, 0x800, 0x6, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x3}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0x3}]}, 0x30}, 0x1, 0x0, 0x0, 0x20008010}, 0x20004000) 00:21:07 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) mmap$usbmon(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000009, 0x2010, r0, 0xfffffffffffffff9) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r1, 0x29, 0x1c, &(0x7f00000008c0)="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", 0x1000) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000000)=0x77, 0x4) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 00:21:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$net_dm(&(0x7f0000000080), r0) prctl$PR_SET_SECCOMP(0x3, 0x1, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x6, 0x80, 0xf4, 0x762c}, {0x7ff, 0xff, 0x6, 0xc3b}, {0x418, 0x1, 0x20, 0xff}, {0x400, 0x6, 0x3c, 0x7}, {0x8001, 0xf3, 0x1, 0x87fe}]}, 0x10) 00:21:07 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x10080, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3000007, 0x1010, r0, 0x5c948000) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x3d, &(0x7f0000000100)="024346218ba48a425e7c3ddc837140d0d1ec4d97317232b9580b039072d7", 0x1e) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f00000000c0)={0x3, 0x9, 0x1}) 00:21:07 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) [ 706.619311][ T25] audit: type=1326 audit(1622679667.298:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7651 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:07 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r0 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x2, 0xb5, 0x1, 0x3}, {0x2, 0x1f, 0x7, 0x6ddd}, {0x0, 0x7, 0x8, 0x535d}, {0x8, 0x7f, 0x7, 0x2}, {0x8, 0xeb, 0x7, 0x9}, {0x0, 0x1f, 0x6, 0x6}, {0xfff, 0x80, 0xc1, 0x7ff}, {0x7, 0x8, 0x1, 0x1}, {0x800, 0x4, 0xbc, 0x81}]}, 0x10) 00:21:07 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) 00:21:07 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{0x9, 0x80, 0x3, 0x3}, {0x69a, 0x5, 0xff, 0xbef7}, {0x3, 0x4, 0x50, 0x4}, {0xc9, 0x1f, 0xff, 0x73}]}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000140)={0x0, 0xffffffffffffffff}, 0x10) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x5, 0xffc, 0x1ff, 0x3ff, 0x2, 0x64ee, 0x712}, 0x1c) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x400, 0xcb, 0x6a, 0x2}, {0x9, 0x2, 0xff, 0x7}, {0x0, 0x1, 0x8}]}, 0x10) 00:21:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in=@multicast1, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000180), 0x2, 0x0) 00:21:07 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x1, 0x7, 0x5, 0x5}]}, 0x10) 00:21:07 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:07 executing program 4: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x64, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 00:21:07 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0x16}, 0x3a}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x40, 0x0, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x2fd28d4a42e7221c}, 0x4008800) connect$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x15, 0x0, 0x1, 0x81, 0x6, @random="9aaa5681aca8"}, 0x14) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x58e7, 0x0, 0x1, 0x2}, {0x401, 0xcf, 0x4, 0xeac}]}) 00:21:07 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) 00:21:07 executing program 2: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x3, 0x1, 0x0) 00:21:07 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), 0xffffffffffffffff) 00:21:07 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000100)=ANY=[@ANYBLOB="0064f06fb9306c924f43de086f308478e631d958b2bcb369770c7fb8c8bcc097d4faa3e13384dc880d00311ac49dd2b6d96f4f183c8f9f"]) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1c480, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@private0={0xfc, 0x0, '\x00', 0x1}}, 0x14) 00:21:07 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xb4, 0x0, 0x20, 0x4070bd26, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x2423}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7fffffff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x41}, 0x0) 00:21:07 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x208382, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r1) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x101, 0x1, 0x3, 0x8}, {0x8, 0x2, 0x0, 0x820}, {0x0, 0x1, 0x3, 0x7ff}, {0x5, 0x2, 0x9, 0xfffffff7}, {0x478, 0x4, 0x7, 0x5}, {0x200, 0x20, 0x3, 0x80000000}]}, 0x10) 00:21:07 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:07 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000200)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4815}, 0x24004801) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@ipv4={""/10, ""/2, @local}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14, 0x80000) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042dbd7000ffdbdf250c0000002400018008000100245891e5b13d73cccc094e8613448b60f723a34e96eb8c1f8a354e5a00e257221b59bf66b118793d3c102b2ee489261ea15d5e0320a8d3688ef3fcdfe09726eeb1c4c31bf762f55bc31d8473da3bb990d3d68d868588d594b232e2998dd0f6e1d5a6ba4ad6789cc76dd6d5531f08fb2dd996d46e223c682d7a", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800f9ffffff0f0091d00100a4f308000100dd9872840f24e895081aa1b57a3b1e2862d63b905990d97cf17c2c3ba9f6d37072d1c290800726c8c7a8529dba5eb1225c05d5ec53b1802cf476fb9aa89752f5eee7b0bbd750226d4ccc59d5899def3776f33c2c8bf3ab4d4f266e139b2d05838a8e8442b82aca03fa53d242df037f29f95b964fba69f2928ea409b50674ea1a9a935a5872", @ANYRES32=r2, @ANYBLOB], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x24008040) 00:21:07 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000000)=0x604) 00:21:07 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:07 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000000c0)={@empty, 0x0}, &(0x7f0000000100)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000001c0)={'gretap0\x00', &(0x7f0000000140)={'tunl0\x00', 0x0, 0x40, 0x80, 0x10001, 0x10000, {{0x12, 0x4, 0x3, 0x8, 0x48, 0x66, 0x0, 0x7f, 0x29, 0x0, @loopback, @local, {[@end, @noop, @ssrr={0x89, 0x17, 0x62, [@rand_addr=0x64010101, @multicast1, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}]}, @ra={0x94, 0x4}, @ra={0x94, 0x4}, @noop, @timestamp_addr={0x44, 0xc, 0x62, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}]}, @noop, @noop, @end]}}}}}) accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0}, &(0x7f0000000240)=0x14, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000002700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000026c0)={&(0x7f0000000280)={0x2434, r1, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x12c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x128, 0x3, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9d}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%+\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '(\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '^\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd386}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.#\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '*-\x1a[)\xe4\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '&)*\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ',.]%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '##\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '/-*\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '.#[\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*\xa1{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_FEATURES_WANTED={0xf4, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xf0, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '/i)/#\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '$##.[@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '[\\{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '6$,+-},\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '^\xfd\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\x8a.^+\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ']@\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x2160, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x9, 0x4, "4b4118063f"}, @ETHTOOL_A_BITSET_BITS={0x38, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_MASK={0x1004, 0x5, "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"}, @ETHTOOL_A_BITSET_MASK={0x5f, 0x5, "f8e832b7b5612e0f5ed3c5e9bbd351ceee7510eb491b75b7ee551b1d0ba8b81f2980e2e6fb7b62f0ab0184b3829483d6258c388dcd1537de2aa66374c03ab7ec69bea781992b02c883b66dbd92718e508571440793420af74b12bf"}, @ETHTOOL_A_BITSET_VALUE={0xae, 0x4, "6ddfa3430bef429540c24c1c5ca4835350b2befd4d7b2277cabb4c60f8a4667b013948fc415ec4f52b282ca8f7f8a9e4a6df4192fee115b2defb9485e535f595d6d897c3c67909849a35f55a115ab5c533a4a00a885fa80c5459a092980e90e36e12ab9cc1a5397d1f9ae6e4bf5f4146514248bfe8b2ce0d96cc6f427b912a1bf55e50b06d7b9f9c70008195eaa0c9c3a18368c1a7a3a6593048ce4d1f585c403aab50a4331829d68c06"}, @ETHTOOL_A_BITSET_MASK={0x1004, 0x5, "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"}]}, @ETHTOOL_A_FEATURES_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x2434}, 0x1, 0x0, 0x0, 0x4010}, 0x8000) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000000)) 00:21:07 executing program 1: ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000140)={0x6, &(0x7f0000000100)=[{0x3}, {0x7, 0x5188}, {0x5, 0x9}, {0x8cd, 0x9}, {0x5, 0x9}, {0x1f, 0xfff8}]}) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x80, 0x52, 0x1f, 0x0, 0x9, 0x0, 0x1, 0x400, 0xa, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp, 0x201, 0x7, 0x7f, 0x6, 0x3, 0x5, 0x200, 0x0, 0x0, 0x0, 0x5}, r0, 0x3, 0xffffffffffffffff, 0x0) 00:21:07 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@ipv4={""/10, ""/2, @local}}}, &(0x7f00000001c0)=0xe8) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x7, 0x8, 0xfffffff9, 0x400, {{0xc, 0x4, 0x0, 0x3b, 0x30, 0x68, 0x0, 0x5, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x21}, @empty, {[@timestamp_prespec={0x44, 0xc, 0x65, 0x3, 0x8, [{@private=0xa010100, 0x8ab000}]}, @generic={0x88, 0x4, "164c"}, @generic={0x94, 0xa, "7b8836a7ce9a7e1a"}]}}}}}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x84, r0, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4040}, 0x4000) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) 00:21:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="ff0c00b2f723cb71d05b09c569ddb145beb17f0c00ae49c2d3f4c6c24aa5231497336d4a64e5", @ANYRES16=r1, @ANYBLOB="000425bd7000ffdbdf25090000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000300020000000800090004000000080001007063690011000200303030303a30303a31302e3000000000080003000200000008000900000000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000300030000000800090005000000"], 0xa0}, 0x1, 0x0, 0x0, 0x400c0}, 0x28000845) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:07 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x7, 0x1f, 0x20}, {0x2, 0x1, 0x3, 0x400}, {0x22e, 0x7f, 0x9, 0x3ff}, {0x3f, 0x82, 0x7, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{0x1f, 0x80, 0x1, 0x2df}, {0x9f1, 0x5, 0x3f, 0x101}, {0x5, 0x3f, 0x48, 0x9}, {0x7fff, 0xb7, 0x8, 0x3ff}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{0x72, 0x55, 0x80, 0xee}, {0x101, 0x1f, 0x4, 0xffff}, {0x6, 0x0, 0x5, 0x8}, {0x6, 0x7, 0x8, 0x9}, {0x1, 0x0, 0x7}, {0xfffe, 0x51, 0x9a, 0x3a5f}, {0x3, 0x0, 0x9, 0x8}, {0xc3, 0x2, 0x9, 0x10001}, {0xfdd0, 0x2, 0x8}]}, 0x10) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x7f, 0x6}, {0x2b, 0x3ff}]}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x82, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000480)={0x0, 0x0, {0x38, 0x19, 0x10, 0x1c, 0x2, 0xd8, 0x6, 0xbe, 0x1}}) r2 = accept$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000440)={0x8, &(0x7f0000000400)=[{0x1, 0x0, 0x1, 0x3}, {0x2, 0x40, 0x2, 0x8}, {0x8, 0x7c, 0x7, 0x1}, {0x2, 0x4, 0x81, 0x3}, {0x5, 0x5, 0x1, 0x10000}, {0x4, 0x20, 0x40, 0xfff}, {0xbd7e, 0x2, 0x1, 0x5}, {0x4, 0x9, 0x3f, 0x7f}]}, 0x10) getsockopt$packet_buf(r1, 0x107, 0x18, &(0x7f0000000300)=""/58, &(0x7f0000000340)=0x3a) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) 00:21:07 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x3, 0x8, 0x7, 0x7}]}, 0xfffffffffffffdfb) ioctl$RTC_UIE_OFF(r0, 0x7004) 00:21:07 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x50100, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000001c0)={'erspan0\x00', &(0x7f0000000100)={'tunl0\x00', 0x0, 0x40, 0x7800, 0x10001, 0x7992bb5e, {{0x24, 0x4, 0x0, 0x4, 0x90, 0x65, 0x0, 0x5d, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x10}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@noop, @timestamp={0x44, 0x24, 0x65, 0x0, 0x6, [0x5, 0x9, 0x2, 0x9, 0x7, 0x6, 0x6, 0x1e1572f8]}, @lsrr={0x83, 0x3, 0xc0}, @noop, @noop, @cipso={0x86, 0x46, 0x2, [{0x7e73ed7b71a09b1b, 0x2}, {0x0, 0xb, "9e99f324ebcea8d2b0"}, {0x7, 0x10, "67c1d7a3e2668fe51f0ef7de2d0f"}, {0x5, 0x2}, {0x5, 0xf, "7c4da9546c035071e8135396c6"}, {0x4, 0x8, "897e4a2d25fb"}, {0x5, 0xa, "f15caaaed77e4880"}]}, @ssrr={0x89, 0xb, 0x8a, [@remote, @multicast1]}]}}}}}) accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14, 0x80000) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x110, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x2400c0e4}, 0x24040085) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) 00:21:07 executing program 4: sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xe5a37c743b9b0102}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x30, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa2}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xffff}]}, 0x30}, 0x1, 0x0, 0x0, 0x20008140}, 0x800) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 00:21:07 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x4, &(0x7f0000000200)=[{0x499, 0x3, 0x7d, 0x6}, {0x8, 0xa7, 0x81, 0x1}, {0x3, 0xff, 0x6, 0x3}, {0xa8, 0x6, 0x0, 0x200}]}) sendmsg$IEEE802154_LLSEC_ADD_KEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000826bd7000fcdbdf250100000006000400000000000a0007914a06601cd3f7000400000000000000000000000000000000e8160c70ede198126f0f8ba97e95fb6f22f75e58bae0365757e7b782f7305603ee1fddf0af18dacf9c904eabda5923c116af415acf2268602b202892203eac33e47db24d43d0fbd8cac044ef5dcf5953e3fbb3d919baf7cd19d37f73b1a6"], 0x38}, 0x1, 0x0, 0x0, 0x48080}, 0x4050) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000001c0)={0x4, &(0x7f0000000040)=[{0xdb, 0x0, 0x8, 0xfffffffe}, {0x3, 0x9, 0x82}, {0x3, 0x8, 0x0, 0x3}, {0x4, 0x81, 0x2, 0x6}]}) 00:21:07 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000000), 0x7, 0xc01) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) prctl$PR_SET_SECCOMP(0x7, 0x2, 0x0) 00:21:07 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'gretap0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="07000001000003ff000000064c110030006600000404907864010102ac1ebbac1414aa00000000000000007f00000100"]}) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000004c0)={&(0x7f00000002c0)={0x1e0, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x17c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x101}, @ETHTOOL_A_BITSET_VALUE={0x50, 0x4, "4b016ef0b8d2cc9286212a7f2320329bf3daf2004f1db5fb3075e55089789fc7c47e6c790bf076b9a580d04b18756c10a4cee9ccfdb882bf64433f890f7c87395285182155c98ccac37543ef"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x6e, 0x4, "2933198c2b61263154d099db959097c2f9a8060557dae83792042ccbf68048751fcba20dd3732147fc3ba28570a8a78bc5d0d64bb7625b23c5c00421239b5a9a5d0559b12dc48b0c939881888fba1835e1fe6409793d76c0382afaef3e0bc33c201102e18d1952a047c9"}, @ETHTOOL_A_BITSET_VALUE={0xa4, 0x4, "5787e5ccc21b934c6c6ac67dbccb1fea39aec79e8a50f1eda41c1bb34003836385f85fe6fb08a384a15c25960c93d0e34cd3a05a6d5c09ed79bd042b788ef3b6e61eb573faa7f1f0d1af5cdc40ca1e20217ee528189e85dc1238a74665c0ef53f3238ba3250eaf701214caf6cac50f81ceb81e18cb26de6dfd3927fd4f1b14625a231ba8271094e8a5c114374adad08688b4936c2a1a42cfa6dea3e2637b2614"}]}, @ETHTOOL_A_DEBUG_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x20000040}, 0x1) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x74, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000}, 0x40004) syz_io_uring_setup(0x6420, &(0x7f00000005c0)={0x0, 0x45aa, 0x8, 0x2, 0x3a8}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000540), &(0x7f0000000640)) [ 707.121078][ T25] audit: type=1326 audit(1622679667.798:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7814 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:07 executing program 5: ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x6, 0x80}) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:07 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="d8010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x1d8}, 0x1, 0x0, 0x0, 0x20040019}, 0x4040010) 00:21:07 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x4, 0x3f, 0x3, 0x7fffffff}]}) 00:21:07 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = getuid() setuid(r1) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@remote, @in6=@rand_addr=' \x01\x00', 0x4e23, 0x8, 0x4e24, 0x5ce6, 0xa, 0x20, 0x0, 0x5d, 0x0, r1}, {0x8000, 0xfffffffffffffffc, 0x7, 0x100000001, 0xfffffffffffffff8, 0x1, 0x7, 0x4ae}, {0xfffffffffffffffd, 0x98, 0x635, 0x40}, 0x0, 0x6e6bb1, 0x2, 0x1, 0x1, 0x1}, {{@in=@remote, 0x4d2, 0x33}, 0xa, @in6=@local, 0x3500, 0x0, 0x0, 0x0, 0x2, 0x7f, 0x62c}}, 0xe8) 00:21:07 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x80, 0xf001, 0x7, 0x7, 0x12, "51c8fd88346a5a3c"}) [ 707.941434][ T25] audit: type=1326 audit(1622679668.618:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7814 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:08 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 00:21:08 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x14) getpeername$packet(r0, 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000000)) 00:21:08 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x125220, 0x1) name_to_handle_at(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@FILEID_UDF_WITH_PARENT={0x14, 0x52, {{0xafcd, 0x100, 0xd0, 0x8001}, 0x8, 0x6}}, &(0x7f0000000140), 0x1000) 00:21:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x2, 0x4) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0x6, 0x3f, 0x6, 0xd8}, {0x400, 0x1, 0xfe, 0x7}, {0x100, 0x93, 0x81, 0xfffffffc}, {0x8000, 0x81, 0x3f, 0xff}, {0x8001, 0x20, 0x3, 0xf2b}, {0x7, 0x7, 0x1f}, {0xa8fc, 0x1f, 0x5, 0x8}, {0x6, 0x4, 0x4, 0x9}]}, 0x10) 00:21:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r1) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="080003000000000018000180140002006d6163766c616e3100000000000000000c0001800800030004000000"], 0x4c}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000040)={@loopback, 0x0}, &(0x7f0000000080)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xe0, r3, 0x20, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}, @ETHTOOL_A_PAUSE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_AUTONEG={0x5}]}, 0xe0}}, 0x24000000) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) 00:21:08 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x41000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="900000e0d12f2c865b", @ANYRES32, @ANYBLOB="00042dbd7000fbdbdf251b000000100023800c000400000000000000000008000300", @ANYRES32=r0, @ANYBLOB="0c0006000000000000000000100023000c0004000200aaaaaaaaaaaa100023800c0004000200aaaaaaaaaaaa08000300", @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="714bacf07051fe4ec324956b07f6144e2b615b0ffb898aabee4664831e749245ced4ec6fd4c526e3e8a8f36ce23ed9604e5a97094159ff3eda33f200755cb7d748e21973f42fc3f64dcc0ba4089b3d9d92eae90504d24dbce4bc39ed157927fd1d306243e8545419261ae7bd37f40cab0a09a39e2127d0ca4de8b6432e84f763ce600a2ceac0a56337fa520188c53523521554b672b865f1874694d5dac57553de24912e61bbcd804d8d27ac689afb337653d0569e554e445a385edac4ff12eaca75805237dff0cc4b77ecc2a4233013e07258848c7ad0733e97bffb195011b6142b4774c826a7e3fecfdada1f6a4e8c80910fde17354818bcefbab3f452cd2b8c2edc57263c220658d2b761c16cf5ad94f3baef65dba2e63ab292b0ef161d0c3a991c733f2ce3dae2a06859614a3d0624c1e09cdecff4b6f71b4fd11950b9f768580c729c02a490cb1b38ed4d299aaef7a3016e5d9665a8f2517eaabdf3620a1ff3cf18410a8f285a5b4143c9a46bc12f0693334c630e348ab2fd7740dc2e15e6d07b15bf120ce7769db6ee8bd963c469d4077c744280188a73c10418b72c52777b2e68d5a8872870d01684da873d1cd4ea3bb0eb3ec78256dc13428396026057747427ee6afd141f782970e829ca491b127456c8aa23cbdbf9ecb2945df778f782c4ffbfc444d3f961eff2023d70e9204308905d4e251d40eed14eb493f02d826a92ec7b6c46b2a8d9736eea03cb2c7fed85ad3c1e7612e65cc23248aab12bf09c333773ec283d58a4b1c0d0dcb3cdbccdbffd417337a1da9107d2aa79f84847be07beb84fc105b06577f0da764368713e8c9b82cf2b49c0dcd736c6392b0bfaa39371bf5ce529cc87bd86a1d1418d6c7b03cba2cbb67d6fbfde5fb85bea3a951b7568f97246f7dd7e1edfb6193c7d707edabc6ebf51e71b689d2b4b43b1aba68248fbab3839cde59518ca9f5654be3c6181323b23646be4a9bd2cfe02855b4d372e23054057ee9c3d9a4b3690420d69fa12954ebe354afcd6bb58f4e08c98aa253e5e166d0e5bc62efb7578ca80498e4c3937b724b6cc198e37c9b777914e0eb271694c2bcf73aa679a39e8b0c7668053c03042c9b1a1ea07b3386dfcee95a1003fbc8c2cebc289d31f665579be929d4921c0b2445f66d5189fcb10e192c8f903428824e8563671b56c273df80678d9569c1ff401677df46a196b43a8a1d0974d95b3d7a4d5831b783e98a3bbe6c0feb592f94d62421fdb5f37ad9dbede7c2789ee42f786a6981dd81940a9f5620efc76b75437ed293d122d4f382f6f11a4d67df076be124f1c025356eb55e5f1a84fa7f0a59211e02b1f6440d5bd016173b20c79c23dca4cbfc625ed87d06ac3b461e16b7a871475e2a09ab5da2765a629dde40fd2a75ba6abe8b2c5473158a5f56db1a2b3a1968698ce8832142ca41cf8c5bcb50ee03f4c269c30121251f59465394a635da814ad254fbeaa1ed0ea101edaf47aaf9b40ddd01914779c61374609a816560867b0f8c6bc7685b3c34df1b5146248e085f61759c8c40aa10981cab30c01949fd749069624420320ba2d2589e36c43188b3bb4105768d9046e0ed421bd1cfad2d14eb6bce0ddaa874355e6d75c32ec06e575a09ac48d1f0789518b9a49e6862fb52e27812a25aac3baa23ea9cd033570a3f8f2d9a38a1d29ae73d782e262187346ea5c10f9d98a1c2480f0ec4be319b001783bacb2dceae1a6ff8eceeeb5d71c8ef348bb7ea585a5e2bba459cfd64964edce0b5360bf796bf463e317a7b7a17e91f842c11486de108ae2034b78b5ad4eebda646b2ee652d16a8163595946eff03244aa31d0595c1014d650e29d686e689e00024963e909e0ae13f77a18ed8ac96dd18bdaa7d56c6c7cedd0f02fe7756c76750bbef5b8ebfd7e44967f024d9a00043cc331e7008ec2199ad0d9657e6be0caa7bcb0fdbf7cecd18193a6dca49d85e23cdc9f170ba046005da47521fcd987ffbd11408fff44000001e784207df29e4a44dc76b3635930e81b1a859e8b6faa180b649937964de8bcc01a17ff6a2229720b76e744bdf660d150436ecf7815f0171c6e778838722dd70b40efa1dddc66124498170bea89879f847bb657ddf7cfa2358c669397e62f9b45c9a0cf862b8152170c1e80aff7a9da0508b994982e6090e01544146a7133f67c8a53f3695b4060cc0684cf6ebb10d2ccf41566d2092cbb7e037156bde02d7ad88ab1c308e3f57c14e2a2e318c43046553cd55f28bf3224137c738d6c1d9dc421e33da2d29a1603fc0dd94627cc17a29a3c5b3cb75c7a3f51625f61f913dfb7ae000923c8dc13f477cc0c6fa8dd4dd6e2a06e9a575338c5c00df6b38fa7027e47674c8b77054037f884ceb615b3084df2b7fbe6685d7895629da53abe0562b2b3cf2686332a46f41ea189dc3bb70815e149fe834282ae65261ccd501dc2656fa571018bca4be73fced94e5532bfb582bee29d218de3c1dcb3df5ca42bf212d92b1fc49cde0dadfdcab6b68c3e5ba0d1d9ee97a404f7cf7945f0b0a89ed8a51db287ea1cad0b754aedf00e1e9e8696b4e768d6360d195db89b78b960ba4f620f619ae3cb3eef9720033a8217dc63c3e81f3159880d6dd0c4876743625d83b8942a6ce38d00a6512b67d591f96c7da780c86d5cf3502086f167673cbf99f8379805f395a22ba78ebeea8233b8be0a28b508909d7191307a14f6c12ff678898c60ce5cb85c2520c009509ab4cc1ffb24f04f38963301e47bb542b67986a113314ce472b949816962b4589385a5c9801ffd828d35a4f213f5edb1cf9f485927888aa98725a221c865ea41c533d8f164c2c2131b92fd64524aa4510f694e9933c0b66a42021a142c2e06b82992c0fe5cdb2ef3b0be500c8925b86263ee4dd9271760ecf0ee01c72e69dbef2c356e9effaaf660215763329e2391b864794690cc5ea1f4d609b312732ca150b284a3ea42efe78b17f2c1c30d91cdac69ce1afd0bfe09b2c001e0b48ebfe7d0a5e8f259065dbe9ce4017bbb61373140ace9fb6ba073240b1b61c54f908053f7eb37aa7ba9ca038d1b5968ab58620dc25cd9f099ec850040ba54a55487ad8ef699a448bba9cfe29ca4bbe11b5745d486c42820e9bdbf46d48cda68ce17e777c31cfda053b9b6cc8840ae70a5fba8b316b8f47eb8a938cefd8bb0fd8006086dbabe3e4826a6fe6a2a18227cf5598e25f73879c280f3e30a295fa70903a58a42291fc57e02a281b26e66296b788cc290a35d6450c6600e8ffe1937f17b537e445aec3f2904e13df9aaea743184759390f7bd7d5330036e506761ac22af19ddf26a07baab06464f1c8491f89797d350e081ad57b096fd1b1a0750b4d1ce700b5b8463f50d759ddcd7f7496506d8830804d8804e86cbff2410458700ae8730ab24224fca888202545b8de1516edfac491bcbb04cf1fadeb92c9e71e69757437866484573b5535dd4a43299426213254b35f639fb02cb733efa4e8031bc876d82aca917bd949d913e87b430802b8955084fdfffdb96988a52bbc01ee2da1834ba92364971b289e05f415e9bfd412efb1aff2eeab5b7d1b307cdc7e274489db663dfc0ab0498bda4e33242c092a8ed7e5bcdf9a2a5679234ee652427afaad4da401b2328032dd1e55e901c33be290570402f14fa3599508d6be681cf8c95f9e960d5552b956eb8f3c5816bf95f1175f9be2e01d35654dfc6fcb95f87ac0cc4c6da0909136d550c712c0ecac6a0c05bf4296dbf72b0ce348dfec8c8e64b2c34415ef7310eeeed8676f584319deb324dabc264899b965b55e0a44932979564e20c4e9acd50543733eac544439132a9a5e91025cf165f71c052668765337af6f0d20d1bdade2c55092931dade50fced1dbf9fc2589313293411b54aa215f6cfbc09a8003b16aa5740638ee0d71a868d327b427dee0f3a0a9e0ee19ffbb34152c9dc8a1198d3327060a195a47183c3909fe28aeaa3e8cced567debb7bf1d2861c0d5f51ee9f742f920480076a5d39855a67d8e57d318a7bcd609b35c1ccc313f2f0ddefbee52425b3f4ff895ffa44c81ef880e580dceed15619bfdeee0130363b7ff3ce74ec75258f660786a1f88f3259887567e676d6433b61a002a2801b81b13d938835aff9bb4af7186a8b33c17cfa2c7d156b4ae621ff0f4c65ce6dec09a4c2b9d2d6c43479ca1a4fd28da2a2e2c3832eccf472500ea354e04cd94f8620119b0459489c424d50f9d295dd1ca3a527af9d6e69c2965f8542d397762deff841ec9e3c112231c952b896c432bf483d57c052474b18807a535f98f2d51bdb2ded0abe18ac262c58e6773b313393d1554781411804b94d5fee39e9be425a2404bfd228f3302617d697f95049fe74048b2b6c924d51ec58edb837204c09487adb18a600fc4a144ca319d354b12f71a0e603a4a0c0ce6a30a140f471cbf7873ece9375367ce041267abba44ce40ae73bbf1e112cc3689f42ee58ce4c59d92ce33c700d9a279a76a9a361914ab1c5ee62bbd8c54094c7e8f98ec421b5808783fd211b9039c27814a1c1a12b675325646f035940a599f01c29827629e5d5cb08737f3f2123bf5e3b47a0c5c615dcf9335b8bdf5421e0406399358620d66f1441cf76e94d9f008f48b16eb6e49b26a154d114c2fe02e6d5da87e7176cfd29fdac15865e2ca9ff2c406bf3a8ffb3dd3be846757c8e1d1b1a021d386e0cefb1947b3340626852fec5f77e9de2715797935218f5e0a9ce5e7c7158ab17a34dfa7b4de0f04bb5ec960ebc91cce3f1253dcdb1b15df2cccdefed4db4f693f7fd546c6386cd73cc45ba5df19136ab5a5eb8d433c048cccc23d0ab7d000be29a5fc8d5dd7d57bc6d731b62ecced4e2e8c5b6b702a24da458e3076914e277140cd70c7e88f265bca6a50f79fc1ead83b3ab057acc4c1c199c75caaf66f607db50fa5564559a9a734d1f1a866541a8e87db097ce5a3acd07a4990a26348e830275c8c85d14b51cc972ec67804a2ee43cae9b6192e5cec9a35652fa5b656aa07df35a69849d5e85d77cc0e9ab0a4441f1573f8acca09ee9098cf9ae717c5f1f48994c9d2cb208681070d755a75c4f6e223092ccce48106aefffd6ccc15c4703d0b608ddb5834a5ae27ee5ef70be3abb63be7770a9b38b38b0ae0d27be8f36f52c7cf3fa4998dfae68b0e56a0609969b7ddf3930e83dc8ce4eb4d45a639b517f709518a1030838702ae5bf6406b34397f532d44e4cda68a8b45ebac507bbca871c1334df0f31ddbae3b5453d1bb5c7fc5a78be068e1f7ef60a6d777369ba9d5fa1f57fa29cb99aef915009660bc5e1b1ac2844f54ca004b8bb901087b9c9439a7724d789b4b186baca91dc3370dfe7e0145d378ea6cfd09de21a07a45079d8e305e22f12e58006da59ed28db0f0d271bcbe5567fcdf390a7c68d16b0f5d49cca7bd73d0a83401fce1a3d4c57e9c92d24d56e6645c0884de7bc325127c93091d58ef8afb70e9dcf09a88f00561572cb0de87bdcba2296a80d58e565bbb9f895521860d8652ccf49e9656aad39781a82efe4e05a2fd2901e4c2c75cbff7c1331f4a85d80cdac2b8e2b36a1b3aa41e23933e0d82cbbf32c0e1929e9443bd55f6e6b4b432d5f9c2ddaa45ea0f4c9819988ae783140f280b08fd087a195328ad0bc6bf447cd1a6a14ecf2b25017c574fae148b9f0be53d65cf257abb520b4e30bd1c44c0bf12ad2c9f7c1262ebb7364889e26734ceb8e8c670f2b03bda945586356fbeceb69a61799258d44971981a07f275c96a0f7a9df31ac2", @ANYBLOB="0c0006000000000000000000"], 0x90}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001300), r1) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_KEY(r1, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x3c, r2, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0xfffff634}, @IEEE802154_ATTR_LLSEC_KEY_USAGE_FRAME_TYPES={0x5, 0x31, 0xc8}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa0}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40014) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000080), 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x60, 0x0, 0x5eb5deb585913bea, 0x70bd29, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0xc2}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x1}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x3}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0xfb}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x2}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x20}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x3}, @IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x60}}, 0x44000) 00:21:08 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000000)={0x20, "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"}) 00:21:08 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}}, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, 0x0, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x68}, 0x1, 0x0, 0x0, 0x20040040}, 0x8c0) [ 708.035876][ T7879] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 00:21:08 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000000)={[{@nr_inodes}, {@huge_advise}]}) 00:21:08 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x6, &(0x7f0000000100)=[{0x9, 0x81, 0x7, 0x28}, {0x8, 0x40, 0x0, 0xcf49}, {0xf500, 0x20, 0x2, 0xb278}, {0xaebb, 0x81, 0xbf, 0x2}, {0xffff, 0x7, 0x1, 0x80000000}, {0x7, 0x9, 0xff, 0x4}]}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x7778, 0x5, 0x1, 0x10001}, {0xa3, 0x29, 0x40, 0xffffffff}, {0x800, 0x5, 0x0, 0xffffff01}, {0x101, 0x7, 0x80, 0x80000001}]}) 00:21:08 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x9, 0x3, 0x20, 0x200}, {0x7, 0x7, 0x1, 0x9}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x7, &(0x7f0000000100)=[{0x3, 0x2, 0x1, 0x3}, {0x1000, 0x5, 0x5, 0x2}, {0x3ff, 0xcb, 0x4, 0x6}, {0x5, 0xfb, 0x0, 0x3}, {0x2, 0x0, 0x4, 0x9}, {0xffff, 0xff, 0x9, 0xfffffffd}, {0xa11d, 0x2, 0x20, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x47b7, 0x3f, 0x81, 0xff}]}) prctl$PR_SET_SECCOMP(0xd, 0x0, 0x0) clock_gettime(0x4, &(0x7f0000000180)) clock_gettime(0x4, &(0x7f00000001c0)) [ 708.078006][ T7889] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 00:21:08 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000005, 0x80073, r0, 0xf60) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1ff7ff, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x31, 0x182b1763f9be3ed3, 0x30, 0x33, 0x31, 0x25, 0x30, 0x32, 0x37, 0x70]}}, {@huge_advise}]}) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x14, 0xf0f849c8e29b4eb8, 0xffffffffffffffff, 0x8000) mmap$perf(&(0x7f0000ff7000/0x9000)=nil, 0x9000, 0x1, 0x4000010, 0xffffffffffffffff, 0x9) 00:21:08 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) [ 708.146335][ T25] audit: type=1326 audit(1622679668.828:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7899 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:08 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x98, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x3}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000000}, 0x4041) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r4) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r7) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r8, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)={0x4c, r9, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x4c}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000900)={0xfc, r9, 0x800, 0x70bd29, 0x25dfdbff, {}, [@ETHTOOL_A_STRSET_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x84, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_STRSET_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4000040}, 0x8800) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r5, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)={0x4c, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x4c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="000425bd7000da26d29803040000051d0300030000c9ffffffffffffff00"], 0x24}, 0x1, 0x0, 0x0, 0x20000025}, 0x20000800) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback, 0x0}, &(0x7f0000000200)=0x14) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x8}, @ETHTOOL_A_PAUSE_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x44004}, 0x4040080) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000240)={0x20c, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0xdc, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x4}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x74, 0x2, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x9}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}, @ETHTOOL_A_STRSET_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x60, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0x20c}, 0x1, 0x0, 0x0, 0x89}, 0x40000) 00:21:08 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x20010, r2, 0x0) 00:21:08 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ff9000/0x4000)=nil) 00:21:08 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) 00:21:08 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20002, 0x0) setsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000000140)="7a2c6359a08c3d3d531b4f67f22da3b51579d6ebf0cc536f22cba3b2b2a16125d281d7cecedd676e98e20cccdea287e8345196e11646c7aa0cd7712befa018d5a283a60cef73d1699398abee8d6f8914a68c4999cc1149ad977fc4b3e0c633a2646d5efa1cbf7d5852fc072f752aaa59c61935f6e73647e9c3426a80bf", 0x7d) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1fffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='nr_blocks=2t-1,nr_blocks=263\x006P-mk,nr_blocks=4,huge=within_size,epol=default=static,\x00']) sendto$packet(r0, &(0x7f00000001c0)="dc55fb116dca69bf0a641105a80869111be0446866af59c7c840985cffe06503a8a2b1460c1fec774f6ae0dc82638a668a88b4338b49e7100eca79f920059e", 0x3f, 0x0, &(0x7f0000000200)={0x11, 0x15, 0x0, 0x1, 0x7, 0x6, @broadcast}, 0x14) 00:21:08 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x0, 0x5, 0x2}, {0x4, 0x54, 0x7, 0xe82}, {0x400, 0x4, 0x3, 0x2}, {0x0, 0x5, 0x3, 0x7}, {0x80, 0xff, 0xff, 0x8}, {0x57, 0x5, 0x0, 0x1000}, {0x0, 0x0, 0x3f, 0x7}]}, 0x10) 00:21:09 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) 00:21:09 executing program 4: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ff9000/0x4000)=nil) [ 708.290595][ T25] audit: type=1326 audit(1622679668.968:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7926 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="080025bd7000030000000300000005000500060000006c00018008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000300000000001400020076657468305f766c616e000000000000140002007369743000000000000000000000000008000300010000000800030096d074f708000100", @ANYRES32=0x0, @ANYBLOB="058ba99500000000"], 0x90}, 0x1, 0x0, 0x0, 0x4000}, 0x1) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), r1) 00:21:09 executing program 2: munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) 00:21:09 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{0x1ff, 0x0, 0x0, 0x200}, {0x0, 0xd5, 0x7e, 0x3}, {0xf05, 0x1f, 0x9, 0xfd}, {0x4, 0x0, 0xff, 0x1f}]}) clock_adjtime(0x6, &(0x7f0000000000)={0x401, 0x80, 0x7, 0x62d, 0xbd, 0x7, 0xffffffffffff9ef9, 0x3fc0000, 0x1f, 0xff, 0xffffffff, 0x2, 0x3ff, 0xd3, 0x100000001, 0x1, 0x3, 0xffff, 0x3f, 0x99, 0x5b59, 0x7, 0x5fc, 0x9, 0x400, 0x800}) 00:21:09 executing program 0: setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req={0x2, 0x1, 0x6, 0xfff}, 0x10) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 00:21:09 executing program 4: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ff9000/0x4000)=nil) [ 708.976021][ T25] audit: type=1326 audit(1622679669.658:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7899 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:09 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000000)={0x2f, 0x8, '\x00', [@ra={0x5, 0x2, 0x883}, @generic={0x81, 0xd, "5f20d16c3b82f88e50e20aaa70"}, @calipso={0x7, 0x28, {0x2, 0x8, 0x1, 0x83, [0x200, 0x6, 0x1, 0x81]}}, @pad1, @enc_lim={0x4, 0x1, 0x39}, @ra={0x5, 0x2, 0x7f}]}, 0x50) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0x6, 0x65, 0x5, 0x6}, {0x0, 0x1f, 0x9, 0x9}, {0xff18, 0xfe, 0x11}, {0x0, 0x80, 0xe, 0x7a9b}, {0x3, 0x9, 0x6, 0xffff0000}, {0x400, 0x48, 0x0, 0x7ac}, {0x8001, 0xf0, 0x8, 0x9}, {0x101, 0x43, 0x1}]}) 00:21:09 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x1f7f57, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]) getegid() setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2c, &(0x7f0000000200)={0x1f, {{0xa, 0x4e22, 0x9, @mcast2, 0x101}}, {{0xa, 0x4e24, 0x0, @local, 0x1000}}}, 0x108) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080)=0x5, 0x4) 00:21:09 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) connect$packet(r0, &(0x7f0000000080)={0x11, 0x6, 0x0, 0x1, 0x8, 0x6, @multicast}, 0x14) prctl$PR_SET_SECCOMP(0x3, 0x1, 0x0) 00:21:09 executing program 4: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ff9000/0x4000)=nil) 00:21:09 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x1) 00:21:09 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="269570c96170300000000000000000000bd015069972fdcf43bd70240355c54629908288bd1683b4983d56cb5593c9f4162e67021bd77bf8d547c4ad9f16ce56da2a6505bdc38866a112e690a37982124083fcbcf2993658569bf73410a37f53c4dd83dc2402f15fad226ae52b70db536ef1ebd233060a3e19", @ANYRES32=0x0, @ANYBLOB="0010002000000007000000084f0a003c00660000ff069078ffffffffe0000001861200000002050c9d28ec3d61f5a9f4372988024410df60000000030000009a0000000201000000"]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'tunl0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=r1, @ANYBLOB="782800080000aabb00000ec54722009c00670000ff299078cf000001e000000101863a00000000060b7f8d8e5e6b895492f201113fa6a494fed969392e3edf925832fd070771be90bbf80003f0020e15878b5c1bd043ae43ced1f8830bf1e0000002ac1414bb441cdb23ac1414aa000004016401010200000081ac1414bb00000008891fa5ffffffffac1414aae0000002ac14143ce0000002ac1414aaffffffff94040000010000"]}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000001380)={@mcast1, 0x0}, &(0x7f00000013c0)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000015c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001580)={&(0x7f0000001400)={0x178, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}]}]}, 0x178}}, 0x24000080) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x10503, 0x0) ioctl$TIOCGSERIAL(r4, 0x541e, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=""/4096}) [ 709.123848][ T25] audit: type=1326 audit(1622679669.798:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7926 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:09 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:09 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@multicast1, @in6=@private1}}, {{@in6=@dev}, 0x0, @in6=@private0}}, &(0x7f0000000100)=0xe8) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r1) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)={0x4c, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x4c}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r3, 0x5394316a51637ac2, 0x70bd29, 0x25dfdbff, {}, [@ETHTOOL_A_PAUSE_TX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x2000800}, 0x400) 00:21:09 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x3b6bff, &(0x7f00000000c0)=ANY=[]) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1, 0xe15d, 0x6, 0x0, 0x1, 0x5, 0x3f}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) 00:21:09 executing program 4: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ff9000/0x4000)=nil) [ 709.215694][ T25] audit: type=1326 audit(1622679669.888:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7994 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:09 executing program 2: getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x2, 0x2, 0x0, 0x0, 0x800, 0x401}, &(0x7f0000000040)=0x20) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x6, 0x9, 0x2, 0xffffff36}, {0xff, 0x7, 0x4, 0xce}]}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x1, 0x80, 0x81, 0x3}, {0xa52, 0x40, 0x5, 0x4}, {0x3, 0x40, 0x51, 0x81}]}) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) syz_genetlink_get_family_id$fou(&(0x7f0000000080), r0) accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 00:21:10 executing program 1: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in6=@private2}}, &(0x7f0000000000)=0x8d) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10018, &(0x7f0000000200)=ANY=[@ANYBLOB='smackfsroot=),euid>', @ANYRESDEC=r0, @ANYBLOB=',fsnaMe=uid<,\x00']) [ 709.343521][ T8034] tmpfs: Unknown parameter 'smackfsroot' 00:21:10 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x2, 0x0) 00:21:10 executing program 4: prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) 00:21:10 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}, {0x5, 0x3f, 0x7f, 0x7f}, {0x0, 0xf9, 0x40, 0x9}, {0xfffa, 0x3f, 0x4, 0x1}]}) 00:21:10 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x3f, 0x3, 0x10001}, {0xfff8, 0x4, 0x96, 0x91a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{0x6d9, 0x0, 0x7, 0x9}, {0x0, 0x9, 0x2, 0x2}, {0x9300, 0x40, 0x2, 0x5}, {0xf3f, 0x81, 0x3, 0x3}, {0x7ff, 0x2d, 0x96, 0x5}]}, 0x10) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x9, 0x4, 0xe2}]}) 00:21:10 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)=ANY=[@ANYBLOB="01"]) unlinkat(r0, &(0x7f0000000000)='./file1\x00', 0x0) [ 710.033972][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 710.033985][ T25] audit: type=1326 audit(1622679670.708:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7994 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:10 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000500)={[{@huge_advise}, {@mpol={'mpol', 0x3d, {'bind'}}}]}) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x1c, 0x800) syz_mount_image$nfs(&(0x7f0000000140), &(0x7f0000000180)='./file1\x00', 0x534, 0x3, &(0x7f0000000400)=[{&(0x7f00000001c0)="cd18f887f573e75c001a7784abbbc50baec47054141274489b4c36624e428e157df73dcd26b3038b5bd0088c1fd41a4478c7d12cd35a3824f785b70b95e9ec296270a635d11cec6cc783a8b5d81f01c0cb5020decf57a882a7f493a1a8394778ddd6f9565e76596be00563450828b026871ee6626b8d30988433aef5f1a4b1a8454674114c3ebc3f3012d83cc096bf6fb8b266416f327666bd3b3bf082d1a11c966a17cfc12dc26459a5154a933953c8b075c803fc7dfdb883bac188a08805992fa6d1dc8baca8c56d1311267fbd5a749e241ffe", 0xd4, 0x8001}, {&(0x7f00000002c0)="1e9dcb7edf19b9a0502d2422d84d618339b59189ee58ab657d809b37a478fd22fd92ec51868b82a7434e495d9802b68180b272c10aca643459b91714ed1744f35a5e4753b0ea0578f1723d3e40778822349369e796214554f90a4bdd817aba7c96d88e13faa761aa26745acfb56fe05a2d13524b100742a78de69a1922d4d8fe56058098c0e821c8c01b57e820102cb1e290346edb45070e99bbb22f99cc7fc1b633aa5ad3f729a87899176cc8805e25705c8540dab5e4a8e2d6116240f02b2d013097611414d86c754d933ce335fa5cf958f523e21dca0e5089c0e4291a428d", 0xe0, 0x10001}, {&(0x7f00000003c0)="f9819fbca93d1ec3321d720ecfa62d8d99ddb5191596c59183f014248cb3d9845a124dae7cbb0abdd69005e3d76ab62f", 0x30, 0x800}], 0x2810020, &(0x7f0000000480)={[{'tmpfs\x00'}, {'tmpfs\x00'}, {'tls\x00'}, {}], [{@subj_user={'subj_user', 0x3d, 'tmpfs\x00'}}]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100), 0x4) open$dir(&(0x7f00000004c0)='./file0\x00', 0x2000, 0xb2) 00:21:10 executing program 4: prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) 00:21:10 executing program 3: syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000080)="fe4149d3992c80c6dc3768cac68eefda89ff0acc6ce8b4a85112ae0975cd60dc5fb921c3f47007649d8b7297fa02eaf75ea0815b8f29377b369aa399a33070da6b545161f7accccf78babbfc03953c14ed8edc1c3b348faec1be", 0x5a, 0x9}, {&(0x7f0000000100)="f07c8b8fbc285180d1afa0e00946fdb510f121e5d9a6670d2102a498", 0x1c, 0xfffffffffffffff7}, {&(0x7f0000000140)="1b4ca3b0a6ef1c0b13874307242a59d86582eee7b24bf7e5ecc88bd0fd4fba6f6c81bc3a652c476886f5fe43a5dabb8d505df36c669b34e387daf438767ac3c3102d9e3f2977be8337280639edd74194a8aef783400a6039f321288499f707fcfabb039e58d4c81d", 0x68, 0xfffffffffffffffb}], 0x40000, &(0x7f0000000240)=ANY=[@ANYBLOB="2c282a242d2c61947ca97bacffff2624232c282c2c2c2b5e2c212c2d2e66736d615469633d30783030303030300200000000000000617070726169"]) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x2, &(0x7f0000000280)=[{0x3, 0x1, 0x7, 0x1ff}, {0x1, 0x0, 0x9, 0x9c}]}, 0x10) [ 710.127689][ T25] audit: type=1326 audit(1622679670.808:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8045 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:10 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x65b4, 0xf6, 0x9, 0x7fff}]}, 0x10) 00:21:10 executing program 4: prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) 00:21:10 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x1, 0x0) 00:21:10 executing program 4: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}, {0x5, 0x3f, 0x7f, 0x7f}, {0x0, 0xf9, 0x40, 0x9}, {0xfffa, 0x3f, 0x4, 0x1}]}) 00:21:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x7800, 0x80, 0xffffffff, 0x1, {{0x14, 0x4, 0x1, 0x29, 0x50, 0x68, 0x0, 0x3, 0x2d, 0x0, @rand_addr=0x64010102, @remote, {[@cipso={0x86, 0x13, 0x2, [{0x5, 0xd, "b52103a46518109fa9d769"}]}, @lsrr={0x83, 0x13, 0xa3, [@broadcast, @local, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @end, @timestamp_addr={0x44, 0x14, 0x9c, 0x1, 0x1, [{@initdev={0xac, 0x1e, 0x0, 0x0}}, {@loopback, 0x1}]}]}}}}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) r4 = accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14, 0x800) getpeername$packet(r4, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000440)=0x14) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xec, r3, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x9a}, @ETHTOOL_A_RINGS_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0xc87f}, @ETHTOOL_A_RINGS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_RINGS_TX={0x8}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x200}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x1}]}, 0xec}, 0x1, 0x0, 0x0, 0x2801}, 0x20008000) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@private1, @private0, @empty, 0x4, 0xafd9, 0x9, 0x100, 0x2, 0xa00080, r1}) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) [ 710.198100][ T8063] loop3: detected capacity change from 0 to 16383 [ 710.210779][ T25] audit: type=1326 audit(1622679670.848:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8027 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:10 executing program 4: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}, {0x5, 0x3f, 0x7f, 0x7f}, {0x0, 0xf9, 0x40, 0x9}, {0xfffa, 0x3f, 0x4, 0x1}]}) 00:21:10 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x80800) [ 710.269211][ T8065] loop1: detected capacity change from 0 to 256 [ 710.276200][ T8063] loop3: detected capacity change from 0 to 16383 [ 710.323467][ T8091] loop1: detected capacity change from 0 to 256 [ 710.953872][ T25] audit: type=1326 audit(1622679671.628:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8045 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:11 executing program 3: sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4044015) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan1\x00'}) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x10, 0x70bd2d, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x42) 00:21:11 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x1, 0x0) 00:21:11 executing program 5: getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=0x113) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x0, 0x20, 0x8, 0x9}, {0x9, 0x0, 0x2, 0x3}, {0x8, 0x3, 0x1, 0x700}, {0xee0, 0x80, 0x7, 0x1}]}, 0x10) 00:21:11 executing program 4: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}, {0x5, 0x3f, 0x7f, 0x7f}, {0x0, 0xf9, 0x40, 0x9}, {0xfffa, 0x3f, 0x4, 0x1}]}) 00:21:11 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) r0 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x1, 0x5, &(0x7f0000000380)=[{&(0x7f00000000c0)="532007fa1d0a9019de04690c8df4", 0xe, 0xdde}, {&(0x7f0000000100)="0e6db9a7d3a5034effc5d933e589faea838aad6b9c231a8e2bf154593b07ffd210abecd57a695d8386a86841c8c70c4a8964db685c0911e9c4", 0x39, 0x4}, {&(0x7f0000000140)="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", 0xfd, 0x9b}, {&(0x7f0000000240)="33bede4e50adc96b50c733a097dc206613092740f5c18c06c25e4b735461072162dfd3e8df893161435647fd10527b12f4ef8c889934", 0x36, 0x4}, {&(0x7f0000000280)="37c0693565ec9cf338b2fb0c1b254f113f9a8de5aff6e42bb43e8e31397c197b6b3950417306471269dce9e654364315018722a15568fd54209e28c9a7091ce55f2c5428d668f5a86f7c5f0bb36a119155d8bbedc7fef317a8cde51aa93ba8f69fcd5179790af8da6e3886ae090d021b240b6f1f5cb6172a533300284dc662cbae7c25f682f2fed4372b06a17abb7e0a8d56ad8b87fcba83c81ddd519154d63d7f65efa39024148bef45920825bd614209f7df274765c91b451b7cb7a27719d2e609c5a1b0db4c18cb", 0xc9, 0x1}], 0x204040, &(0x7f0000000500)={[{'\'@(,*},$!'}, {','}, {'-a^\xd1,[}'}, {'&\'\x91%@-+\xbf!'}, {'\x00\x00\x00{\xcc|/\\Yi\xe5\x18\x1a\xa9J\xe2.\x18=\x8d\x05,\xd7\x88\x89N\xaa\xc8\x9d\b\x1d\xf2\xc7\xaf\xf9\xbc\xf9\xcc\xb9y\xb6?\x90H\x13\xabp\x03\x8e)\xde\xe1\xearm\xe8a\xc7\xf6\xd0\xc5\xa0YB\x92\xf6\xbfX\xab\xa5\x16D\xccE\xec\xe1Y\xa0\xf1\xadG\xae\x8a\xf2G\x93\xc5n)\xd5Ke^\x95\x90\x93\x01m\b\x84\xc0\xbf\x86\a\xb0\x9d\aS\xdefvb\xb4\t\xd9ky\xc8\xf6\xc4\xf2\xdc{\xd6\xc3\xdc\x92\xdcs\xcd\xfd\x93U;\xfde\xd3V-\x9f-\xd4@C\xc7\x958\xe3O\x96\xc5\x8c]\x96[s\x900H\xbb\xdd3\x0f\x19)-\xed5!\xab\x8b\xf1\x9a)\xea)\xbb\x82\xbf\xef\x90\n\'\xd9\x82\x18\x9a'}, {'*'}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@appraise_type}, {@seclabel}, {@smackfsroot={'smackfsroot', 0x3d, '\x10iuG\x92K\x11\xf7=\x8a\xae \xd8\x86\xb1\x15\xa5\x113{\x04J\x03\x00\x00\x02\x00\x00\x00\x00\xc8\x92O\"\xef\"\xd4\xb2\xfc=c\x97\x80\"\xd6\x99\x15\xbc\x86\xbd\x0e\xee\x83\x9e\xf3R\xabxI@p=i\xddb\t\x97'}}, {@appraise_type}, {@seclabel}, {@obj_role={'obj_role', 0x3d, '\b'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@smackfshat={'smackfshat', 0x3d, '\xe5'}}]}) name_to_handle_at(r0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=@xfs={0x1c, 0x81, {0x8000, 0x80, 0xffffffff, 0x8}}, &(0x7f0000000480), 0x400) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) faccessat(r1, &(0x7f00000006c0)='./file0\x00', 0x1c0) faccessat(r0, &(0x7f00000004c0)='./file0\x00', 0x8ca722364ff0c2f0) 00:21:11 executing program 1: r0 = socket$inet6(0xa, 0x4, 0x80000001) r1 = socket$inet6(0xa, 0xa, 0x8000) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000000c0), 0x4) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@empty, 0x4e24, 0xe9a, 0x4e22, 0x7, 0xa, 0x20, 0x0, 0x73, 0x0, r2}, {0x80000001, 0xfff, 0x1f, 0x6, 0x5, 0x0, 0xdc0, 0x7f}, {0xfffffffffffffffa, 0x8, 0x9, 0x7f}, 0x51, 0x6e6bb8, 0x0, 0x1, 0x2, 0x3}, {{@in6=@loopback, 0x4d6}, 0x8, @in6=@private1, 0x34ff, 0x2, 0x3, 0x8, 0x1, 0x3, 0x2}}, 0xe8) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000300)=ANY=[@ANYBLOB="f65c2753ed541e1916e4d361a5c2761c312d65fd85526eddc96d8d7f1849fbe575e76d3144dac7b239aade6254a838364b0cacfeffc1e95980d93f3cd260c97b12df8d09e9ffc762e00d33aff39523bbc18d2a8db814de73cc01ee19fbdb5e0293e3e71556f36c3058d852b5f26d6a8400c29fb9b28f611019082717ab2acbfa7ed6e3653fba5db4239a40990ce7366815e6cad0377fcdcab406f100565207de7bdb62897d920d3530d5"]) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x200880, 0x0) getpeername$packet(r3, 0x0, 0x0) name_to_handle_at(r3, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=@xfs={0x1c, 0x81, {0x7, 0x80010000, 0x7, 0x3ff}}, &(0x7f0000000180), 0x1000) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r4, 0x0, 0x0) faccessat(r4, &(0x7f00000001c0)='./file0\x00', 0x87) 00:21:11 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1000, 0x72, 0x4a, 0x8001}, {0x6, 0x7, 0xd5, 0x1000}, {0x6, 0x3, 0x1, 0x7}, {0x8, 0x0, 0x7f, 0xfff}, {0xffff, 0x7f, 0x5}]}) 00:21:11 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}, {0x5, 0x3f, 0x7f, 0x7f}, {0x0, 0xf9, 0x40, 0x9}, {0xfffa, 0x3f, 0x4, 0x1}]}) 00:21:11 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = socket$inet6(0xa, 0xa, 0x7) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 711.065374][ T8122] loop0: detected capacity change from 0 to 13 [ 711.080842][ T8122] nfs: Unknown parameter ''@(' 00:21:11 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)=ANY=[@ANYBLOB="9b"]) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000000)={0x5, 0xff, 0x5}) 00:21:11 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}, {0x5, 0x3f, 0x7f, 0x7f}, {0x0, 0xf9, 0x40, 0x9}, {0xfffa, 0x3f, 0x4, 0x1}]}) 00:21:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2, 0x27}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x30}}, 0x8001, 0x1, 0x1, 0x0, 0x8, 0x7}, &(0x7f0000000240)=0x20) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x12b603, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), r2) sendmsg$DEVLINK_CMD_PORT_SET(r3, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00012abd7000fbdbdf250600000008000100303a30303a313032300000008008000300010000000600040000020000"], 0x40}, 0x1, 0x0, 0x0, 0x865}, 0x4800) accept4$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r5, 0x0, 0x0) setsockopt$packet_fanout_data(r5, 0x107, 0x16, &(0x7f00000001c0)={0x3, &(0x7f0000000280)=[{0x20, 0x8, 0x2, 0x1}, {0x2, 0x2, 0x2, 0x6}, {0x0, 0x3f, 0xd, 0x9}]}, 0x10) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r6, 0x0, 0x0) setsockopt$packet_fanout_data(r6, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x4, 0x0, 0x4, 0x401}]}, 0x10) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x280000, 0x0) mmap(&(0x7f0000fee000/0x4000)=nil, 0x4000, 0x3000004, 0x4010, r0, 0x8df07000) pkey_alloc(0x0, 0x2) [ 711.114893][ T25] audit: type=1326 audit(1622679671.788:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8131 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:11 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}, {0x5, 0x3f, 0x7f, 0x7f}, {0x0, 0xf9, 0x40, 0x9}, {0xfffa, 0x3f, 0x4, 0x1}]}) [ 711.178716][ T8143] loop0: detected capacity change from 0 to 13 [ 711.186820][ T8143] nfs: Unknown parameter ''@(' 00:21:11 executing program 1: r0 = getuid() setuid(r0) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x8, 0x8, &(0x7f00000015c0)=[{&(0x7f0000000200)="7c96dbd4b0afab359c79068035733f6feee94f5c6a99e193dfa4c943d99433e9d3ebbb5dbd29977292ec3cfce1a0a4e98b2f", 0x32, 0x2}, {&(0x7f0000000240)="6b5810e5d7e6fd2bb2753828e43d93bdca1da76f460bdc148bab2544d2b258d29a642f8d1ace3be51663311df93c3fe2909296f74aee1eb149ecb24d25da3717108115f3054bd2d790870ccdd68c9aea3934dec69fd680f7cd5d8a742c6a24b46c6ee7501f2ba7f4e5715eecb4dd93e4fccf0bb624411da7a3c3705cf573a2f52946c33fa7dbad9f604db63411d251a0d66bfbbfe7d4e07ed81a5c5259e8299a982f2cefa87ea0655a21d5a5083fe9065eaf63", 0xb3}, {&(0x7f0000000300)="22ada0385a2f46af4e19d678499feb679f308ee5f1effe9fb1e7af3c505c3bcc8f6f662f492bf6d0fe5de0079baa7104aea42f08765cbf3b9bb854d287b94a71869f6db118f958781a9be29905056a4d2c050ff15eea1d6eb9e3021750adcea3828fd10087931d9e8550b3c1fef90abe304965d584b1401479364d8ba3c47ae1542513ea3b1fa6e2", 0x88, 0x4}, {&(0x7f00000003c0)="76be2b961a8286efc63c1340f4d05e35ba69f1abf63139e451d9e1d1eefca7cf9939066497213f0272799fe3328ad6f927920c15ff745854b154417e9c1b186d478d0e79c7f8a09ce3301353274af5e1487370db2e32ac18a6ae82ce72c33377dcc36f526e101c512ce2b8200234e37f26527cfe00acf8", 0x77, 0xaa85}, {&(0x7f0000000440)="bddfc98a55b87fdf144fdaea96c9f35320390b26c19a67", 0x17, 0x1}, {&(0x7f0000000480)="054674581987f3b1c80406d2b18a2601fb5cac5e9c907f099ccfdce6fe0c326a7d3fc19ccc7fb0d2d078a7c0106eee1a2df0287a3f6a96c28d5b3494e689a353323b069c009a9dd4f99022", 0x4b, 0x9}, {&(0x7f0000000500)="f8b5297b84ed0e6a365f8f7fd79f7ebd857c275ca3c450348fbb5c7905bcb68451cdeede00ac13fa3e20", 0x2a, 0xfffffffffffffff9}, {&(0x7f00000005c0)="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", 0x1000, 0xaed}], 0x0, &(0x7f0000000540)={[{'\x00'}, {'tmpfs\x00'}, {':.'}, {')/,\x1b'}, {'tmpfs\x00'}, {'tmpfs\x00'}], [{@permit_directio}]}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in=@remote, 0x4e24, 0x8, 0x4e24, 0x0, 0x2, 0xa0, 0x20, 0xb5, 0x0, r0}, {0x80000000, 0x1, 0x6ffd, 0x9, 0x2d6, 0x100000000, 0x4, 0x27}, {0x6, 0x8001, 0x1, 0x3}, 0x4, 0x6e6bb3, 0x1, 0x1, 0x2, 0x3}, {{@in6=@private0, 0x4d3, 0x66}, 0x2, @in=@broadcast, 0x3505, 0x4, 0x0, 0x3, 0xffff, 0x10000, 0x2}}, 0xe8) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) 00:21:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockopt$inet6_buf(r0, 0x29, 0x2d, &(0x7f0000000000)=""/37, &(0x7f0000000040)=0x25) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0), 0x4) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:11 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r0 = io_uring_setup(0x4000051f, 0x0) syz_io_uring_setup(0x5943, &(0x7f0000000680)={0x0, 0xdb6b, 0x8, 0x3, 0x109, 0x0, r0}, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000700), &(0x7f0000000740)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x8000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ff4000/0x2000)=nil, 0x2000}, &(0x7f0000000040)=0x10) 00:21:11 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x3, 0x5, 0x7, 0xb63}, {0x0, 0x40, 0x5, 0x4}, {0x81, 0x7f, 0x20, 0x8001}, {0x5, 0x9, 0x8, 0x1}, {0x6, 0x4, 0x0, 0xfffff9a0}, {0x2, 0x0, 0x7, 0xfffff801}]}, 0x10) [ 711.255347][ T8163] loop1: detected capacity change from 0 to 16383 00:21:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}, {0x5, 0x3f, 0x7f, 0x7f}, {0x0, 0xf9, 0x40, 0x9}, {0xfffa, 0x3f, 0x4, 0x1}]}) [ 711.327760][ T8181] loop1: detected capacity change from 0 to 16383 00:21:12 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) 00:21:12 executing program 0: ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 00:21:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)={0x4c, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x4c}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x7, &(0x7f00000003c0)={@empty, 0x0}, &(0x7f0000000400)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0x98, r2, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x800}, 0x884) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x20000025, &(0x7f0000000000)=[{0x1, 0x6, 0x6, 0xfffffff8}, {0x4, 0xd, 0x0, 0x4}, {0x63b, 0x3f, 0x21}, {0x1, 0x2, 0x5, 0x3}, {0x4, 0x5, 0x67, 0x2}, {0x8001, 0x7, 0x1, 0x81}, {0x5, 0x20, 0x80, 0x6}, {0x4c, 0x6, 0x4, 0xf86}, {0x1, 0x5, 0x3, 0x8}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x0, 0xf2, 0x0, 0xffffffff}, {0x7, 0x86, 0x2, 0x20}, {0x100, 0x81, 0x0, 0x48000000}]}, 0x10) 00:21:12 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x8a, 0x4, 0x0, 0x3}, {0xf001, 0x3, 0x7c, 0xfffffffb}, {0x1f, 0x7}, {0x88d, 0x86, 0x2}]}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="0007000000000000c91000000000000800000000000000000000000100c2040000464205020008c910fc010000000000000000000000000000010200000001000105000000000000"], 0x48) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000100)={r0, 0x1, 0x6}, 0x10) r1 = perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x70, 0x4, 0x7, 0x0, 0x0, 0x10001, 0x800, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f00000002c0), 0x1}, 0x12020, 0x7fffffff, 0xc85, 0x3, 0xbdd0, 0xab, 0xa42d, 0x0, 0x1, 0x0, 0xfffffffffffff831}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) perf_event_open(&(0x7f0000000240)={0x6, 0x80, 0x4, 0x1, 0x8, 0x3, 0x0, 0x0, 0x2080, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000200), 0xe}, 0x0, 0x2, 0x3, 0x0, 0x0, 0x7, 0x0, 0x0, 0x401, 0x0, 0xffffffff80000001}, 0x0, 0xf, r1, 0x4) 00:21:12 executing program 1: getrusage(0x1, &(0x7f0000000140)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000000c0)=""/114, 0x72) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000340)=ANY=[@ANYBLOB="79465e3dba10de9bd642d44241594fee5ade82b0d7a10ed7c765ca23b6b76c65a89e58415b4f4e8691d3f310e1f97262e378e24003dda055bb138b3c787d5c8346f39e8259407b0dae28a2e65616483a503867610bf1acea7acd0d4965fbcc23c0dbcab8a85fa96ff291f9381aad441737e2aa4a4da52ed89a55ecd641a2e32201eadc93e7aace7f98396dd56eb51f09afc3373dc1ed96f7ce4eff0515ff4bc433"]) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000002c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000300)={@mcast2, 0x74, r1}) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 00:21:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 00:21:12 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x2, 0x1f, 0x9, 0x7}]}, 0x10) 00:21:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 00:21:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0, 0xffffffffffffff90}}, 0x41) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x158, 0x0, 0x600, 0x70bd26, 0x25dfdbff, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0x9, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x83}}, {0x8, 0x9, 0xfffffffd}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x7}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x4}}]}, 0x158}, 0x1, 0x0, 0x0, 0x4008c00}, 0x20000080) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:12 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000), 0x4) 00:21:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000080)={@private1={0xfc, 0x1, '\x00', 0x1}}, 0x14) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7, 0x9, 0x81, 0x944e}, {0x0, 0x5, 0x9, 0x6}]}, 0x10) shmget$private(0x0, 0x4000, 0x54000000, &(0x7f0000ff9000/0x4000)=nil) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r1) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)={0x4c, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x4c}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000180)={'tunl0\x00', 0x0, 0x700, 0x7800, 0x3ff, 0x7fff, {{0x17, 0x4, 0x3, 0x30, 0x5c, 0x67, 0x0, 0x5, 0x29, 0x0, @rand_addr=0x64010100, @remote, {[@timestamp={0x44, 0x1c, 0xe8, 0x0, 0x3, [0xb0, 0x8000, 0x6, 0x2, 0x3, 0x0]}, @end, @ssrr={0x89, 0x1b, 0xd1, [@remote, @dev={0xac, 0x14, 0x14, 0x3d}, @loopback, @loopback, @dev={0xac, 0x14, 0x14, 0x25}, @loopback]}, @lsrr={0x83, 0xf, 0x80, [@empty, @private=0xa010100, @empty]}]}}}}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f0000000340)={0x1a4, r3, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x4000804}, 0x200008c0) 00:21:12 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000000)=ANY=[@ANYBLOB="5efe8a88a7a4cc27728bf75901b3192acc82307c852b1cb2c23b6533bee788ec5deb5aa9020735cd"]) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80200805}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x144, r0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfff}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x4}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x40}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x10000}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0xff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9}}, {@pci={{0x8}, {0x11}}, {0x8}}]}, 0x144}}, 0x40804) 00:21:12 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x1, 0x89, 0x10001}, {0x100, 0xc4, 0x40, 0x8}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000001c0)={0x5, &(0x7f0000000180)=[{0x2, 0x0, 0xc0, 0x4}, {0x4, 0x1f, 0x7, 0xff}, {0xff, 0x3, 0x80, 0x8}, {0x8, 0xff, 0x9, 0x7ff}, {0x5113, 0x5, 0x0, 0x400}]}) prctl$PR_GET_THP_DISABLE(0x2a) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x6, &(0x7f0000000080)=[{0x7, 0x2, 0x80, 0x7}, {0x7fff, 0xb, 0xe6, 0xc6b}, {0x9, 0xff, 0x6, 0x9}, {0x7d, 0x0, 0x80, 0x1}, {0x8, 0x5, 0xc1, 0x6}, {0x5, 0x9, 0x1f, 0x7}]}) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000340)={r1, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000140)={0x8, &(0x7f0000000100)=[{0x3ff, 0x2, 0x81, 0x509d599e}, {0x4, 0x8, 0x4, 0x8000}, {0xbc8, 0x11, 0x6, 0x3}, {0x1, 0x80, 0xff, 0x13}, {0x5, 0x0, 0x5, 0x7}, {0xff01, 0x1}, {0x8, 0x7, 0x2, 0x20a8}, {0x8000, 0x4, 0x8, 0x80}]}) 00:21:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 00:21:12 executing program 5: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x81, 0x7, 0xb7, 0x7}, {0x7ff, 0x0, 0x9, 0x5}, {0xf000, 0x6, 0xa1, 0x6}, {0x7, 0xc5, 0x5, 0x1000}, {0x48, 0x1}, {0x8, 0x40, 0x1, 0x6}]}) 00:21:12 executing program 3: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000040)=0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000000c0)=0x2, 0x4) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x81800) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@private2}}, &(0x7f0000000540)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000002c0)={r2, 0x1, 0x6, @broadcast}, 0x10) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) prctl$PR_SET_SECCOMP(0x2, 0x2, 0x0) accept4$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000340)=0x1c, 0x40800) getsockopt$packet_int(r1, 0x107, 0x33, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in=@local, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000480)=0xe8) 00:21:12 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000000)) [ 712.154767][ T25] audit: type=1326 audit(1622679672.828:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8233 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) [ 712.204183][ T25] audit: type=1326 audit(1622679672.878:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8241 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:12 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001300), r0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x24040080}, 0x40000) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001300), r2) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000280)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_SET_PAN_ID(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012cbd7000fcdbdf250a000000060009000200000008000300", @ANYRES32=r1, @ANYBLOB="08000300", @ANYRES32=r3, @ANYBLOB="9ebc0000", @ANYRES32=r1, @ANYBLOB="8f4202f49b7b62fa03000000"], 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x44850}, 0x40) 00:21:12 executing program 0: mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3, 0x30, 0xffffffffffffffff, 0x10000000) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 00:21:12 executing program 1: r0 = getuid() setuid(r0) r1 = getuid() setuid(r1) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x1fffff, &(0x7f00000000c0)={[{@uid={'uid', 0x3d, r0}}, {@huge_never}, {@huge_never}, {@uid={'uid', 0x3d, r1}}]}) 00:21:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 00:21:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@private1, 0x0}, &(0x7f0000000100)=0x14) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}, @FOU_ATTR_IFINDEX={0x8, 0xb, r1}]}, 0x50}, 0x1, 0x0, 0x0, 0x84}, 0x4040819) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x81, 0x7, 0x7e, 0x8}, {0xe720, 0x8, 0x5, 0xfffffff9}, {0x5, 0x6, 0x9, 0x9}]}) 00:21:13 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) [ 712.312660][ T25] audit: type=1326 audit(1622679672.928:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8233 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 [ 712.978971][ T25] audit: type=1326 audit(1622679673.658:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8233 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 [ 713.025279][ T25] audit: type=1326 audit(1622679673.698:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8241 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:13 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{0x5, 0xff, 0x8, 0x8}, {0x3, 0x7, 0xbc, 0x62}]}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan4\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r0, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x51}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x10) 00:21:13 executing program 1: accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000100)=0x1c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, &(0x7f00000001c0)=0x1c, 0xc1800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@ipv4={""/10, ""/2, @loopback}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@private0}}, &(0x7f00000003c0)=0xe8) accept4$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @initdev}}, &(0x7f0000000380)=0x1c, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xbc, 0x0, 0x0, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_DEBUG_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x78, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_VALUE={0x6c, 0x4, "efa4f37ed1e474717952fe16ebe4a069d182fb78311368270fb54f6ac0f494732e254555283b009b5c8e8f71624334f2f25dd95f3c73a4ca7087f641283cb5c0bd50fa4e5099e7f3c5be4219463d972c319566c0f0abb45335fdc8f2ecf80793e7601791f8377b11"}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4000}, 0x800) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) 00:21:13 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) r0 = io_uring_setup(0x32a2, 0x0) syz_io_uring_setup(0x5943, &(0x7f0000000680)={0x0, 0xdb6b, 0x8, 0x3, 0x109, 0x0, r0}, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000700), &(0x7f0000000740)) utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x0, 0xea60}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000019, 0x40010, r0, 0x0) 00:21:13 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}, {0x5, 0x3f, 0x7f, 0x7f}, {0x0, 0xf9, 0x40, 0x9}]}) 00:21:13 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) clock_gettime(0x4, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0)={0x8, 0x7773, 0x8001, 0x8, 0x4, 0x3, 0x6, 0x3}, &(0x7f0000000040)={0x6, 0x3, 0xffffffffffff1220, 0x5, 0xffffffff, 0x9, 0x3, 0xfffffffffffff397}, &(0x7f0000000080)={0xc26b, 0x7f, 0xfc3, 0x0, 0x1, 0x9, 0x7a5, 0x70}, &(0x7f0000000100)={r0, r1+10000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x1]}, 0x8}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000280)={0x1c4, 0x0, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x40}, 0x14) 00:21:13 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10, &(0x7f0000000000), &(0x7f0000000040)=0x4) 00:21:13 executing program 3: r0 = io_uring_setup(0x3bf4, 0x0) syz_io_uring_setup(0x5943, &(0x7f0000000680)={0x0, 0xdb6b, 0x8, 0x3, 0x109, 0x0, r0}, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000700), &(0x7f0000000740)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:13 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}, {0x5, 0x3f, 0x7f, 0x7f}]}) 00:21:13 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0xfff8, 0x7, 0x3f, 0x34e}, {0x794, 0x2, 0xe, 0x4}]}, 0x10) 00:21:13 executing program 0: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) accept$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@remote, @loopback, @local, 0x8, 0x5, 0x1ff, 0x500, 0x8, 0x80000004}) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/171) 00:21:13 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000b6ca00502c4c585900000000000000000000000019e702694aa4f9904c6ea1513b8326df490970fee667ffe04135fa71e7fcbaaf4b15a77bed6cb5b1bbbe72d0fbbcee6930c5dc4609d71e0e0cdfe09b8928ca00000000008000007480ce0bc89240d063b67605b5d0caee3690a53a12aadf8f65e0a8256cd9bce8125839de9ccdeb55805b771a47540355b8fa143e4ceb870760444fca5ca1ed97db3f9585e8ae96e0caa7e059e9ecf81144f8d4a77ec3f91dc02df3fecba5882d630d5923a5066cefc131a9ab142de451ba3de2b9"]) prctl$PR_SET_SECCOMP(0x38, 0x2, 0x0) fchownat(r0, &(0x7f0000000000)='.\x00', 0xffffffffffffffff, 0xee00, 0x800) 00:21:13 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}]}) 00:21:14 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@initdev}, &(0x7f0000000040)=0x14) 00:21:14 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 00:21:14 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:14 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000140)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0xee00, @ANYBLOB="2c6e725f69f2fadcbe36072b163335376bdaf06e22653d30303030303030303030303030303030303e00000000000000e6e9585b8c8517acafbe6dbe8693c6b5a162233a37a6aca09a7d5bc3"]) 00:21:14 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x401, 0x7, 0x8, 0x6}]}) 00:21:14 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}]}) 00:21:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}]}) 00:21:14 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x8, 0x3, 0x20}, {0x8, 0x0, 0xfa, 0x6dfa}, {0x5, 0x53, 0xa5, 0x9}, {0x7, 0x8, 0x9, 0xd3}, {0x2, 0x9}]}, 0x10) 00:21:14 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:14 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0xc) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) 00:21:14 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}]}) 00:21:14 executing program 5: munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000), 0x4) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1ff7ff, &(0x7f0000000100)={[{@mode={'mode', 0x3d, 0x7fff}}, {@size={'size', 0x3d, [0x33]}}, {@mode={'mode', 0x3d, 0x6}}, {@mpol={'mpol', 0x3d, {'default', '=relative', @val={0x3a, [0x34, 0x34, 0x31, 0x30, 0x38, 0x3a]}}}}]}) 00:21:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}]}) 00:21:14 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x2, 0x0) 00:21:14 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x124, r0, 0xe2880f6aa2e6eca2, 0x70bd26, 0x25dfdbfc, {}, [{@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}]}, 0x124}, 0x1, 0x0, 0x0, 0x800c010}, 0x80) 00:21:14 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)={0x0, 0x3d23, 0x1, 0x2, 0xc3}) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) 00:21:14 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}, {0x0, 0x3f, 0x7f, 0x7f}]}) 00:21:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}]}) 00:21:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x12, r0, 0x440d000) r1 = syz_open_pts(0xffffffffffffffff, 0x84901) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f00000000c0)={0x8, 0x6}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r2) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)={0x4c, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x4c}}, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x18, r4, 0x100, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x24000815}, 0x4000) syz_open_pts(r1, 0x20000) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f0000000100)={0x2, &(0x7f0000000040)=[{0x8, 0xff81}, {0x2, 0x9}]}) 00:21:14 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x9, 0x4, &(0x7f0000000400)=[{&(0x7f0000000100)="d2e923c16d7e20b023b41a9d19da20fc09de6e3c7043c21e622b7a7930b79ebd46387deec783ee94f936a88b56a30b3ac134a85b022f706d7a93f8c2f82165064703b908014d2d7f1e7025d417e88f5d48011b29d759e827199677151a57e90adca8201f834fd4d7d96444fdc6c9b3662b5fa91215dffdc8e731d1e1ef74db95fd380aff9d8c78dcc001c4b55732988517a64e6bb5335fa0a609c79a4812cff2752629313ebb390cd7ae17f295e8d4814a5983d7e3f64c288b87105d61394f1fdff4b7003147eb17569953115a78bc30145720bf0d", 0xd5, 0x914}, {&(0x7f0000000200)="e0ea608f9f8edfa15cbd05725899bf34058941b7fb44935e1cfa39ce8d8b062ff988f177d2296dadc704330d579d52603c7db3430dad658f65a8f75b986112f7e029fcdd3ae2f871262cbb4e20809ca660eeefc3921bacd5a8d1dbef479b45ea2f33f3f7670983ac6a104f161ea241d4b17f095f15a9efdd3588ad4df3f1b6d9f0425e123d5ab3846d0119ea2ec4", 0x8e, 0x7}, {&(0x7f00000002c0)="c601cc2c33524d80d5bddb17dda83d7145a0c137d7e5452f51162ff67a47151d711701199d1f492fd5096995f4088d37c311bfe5b752b88607079963b814b2fba579f2e0b98349944d583885779bb092207d84b05f878e252845291e8ed3530ca9f520ea72c14c8c199321c12d4503e320c826045bd7e0ab735fc2fb59d088a35dad4a9ac2f4dce85c1f4d9f20305ed1016347c71e", 0x95, 0x7}, {&(0x7f0000000380)="0bf6cc0910de1f13a796bf7a4b3b26e7f9874b255151196ec22ca66a15971ec70ae8e2976f65f88d852c1b2fb8b83a92978dbd3caae3a2b8bf6452b72aa947d347c0cc9b7df5494af2803ed29e1417a69ba3cacd94ca9f00ea", 0x59, 0x7}], 0x1000010, &(0x7f0000000480)={[{@mode={'mode', 0x3d, 0x8}}, {@size={'size', 0x3d, [0x37]}}], [{@dont_appraise}, {@obj_user={'obj_user', 0x3d, '-+\'/'}}, {@context={'context', 0x3d, 'root'}}, {@smackfsroot={'smackfsroot', 0x3d, 'tmpfs\x00'}}]}) 00:21:14 executing program 5: getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) 00:21:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}, {0x0, 0x3f, 0x7f, 0x7f}]}) 00:21:15 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x1, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEV(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x409, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x11}, 0x40005) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)=0x80, 0x4) 00:21:15 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x6, 0xff, 0x2a, 0x6}, {0x8000, 0x6, 0x6, 0x1f}, {0x80, 0x16, 0x1}, {0x1, 0x7f, 0x7f, 0xec}, {0x91d8, 0x40, 0x3, 0x2}]}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000540)={@private2}) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000100)={@local, 0x0}, &(0x7f0000000140)=0x14) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x80, r1, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@ETHTOOL_A_DEBUG_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_DEBUG_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x20000080}, 0x80) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x100010, r0, 0x1b775000) 00:21:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}]}) [ 714.368787][ T8422] loop1: detected capacity change from 0 to 9 [ 714.375267][ T8422] tmpfs: Unknown parameter 'dont_appraise' 00:21:15 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = syz_open_dev$rtc(&(0x7f0000000080), 0x8, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1c1e) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000000)={@local, @empty, @mcast1, 0x2, 0x7ff, 0x4, 0x500, 0xb5, 0x2040000}) 00:21:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}, {0x0, 0x3f, 0x7f, 0x7f}]}) 00:21:15 executing program 1: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0x10) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x2b2000, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000140)={0xffff, 0x401, 0x5, 0x8000, 0x6, "5138228301c75e97b92149d9e671d130a097f8", 0x10001, 0x1}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) 00:21:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}, {0x5, 0x0, 0x7f, 0x7f}]}) 00:21:15 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r2) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)={0x4c, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x4c}}, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, r4, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @ETHTOOL_A_RINGS_TX={0x8}]}, 0x60}, 0x1, 0x0, 0x0, 0x24008c10}, 0x80) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x3f, 0xb, 0x7, 0x80000000}, {0x8035, 0x85, 0x7, 0x4}, {0x8, 0x8, 0x6, 0x401}, {0x3, 0x7f, 0x7, 0x1ff}, {0x2, 0x7, 0x1b, 0x9}, {0x5, 0x5, 0x8, 0xfffffe35}, {0x7ff, 0x2, 0xc8, 0x29}]}, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, r4, 0x800, 0x70bd29, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x1}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xe98680b9971e6b3e}]}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x9}]}, 0x44}, 0x1, 0x0, 0x0, 0xc880}, 0x20000080) 00:21:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}]}) 00:21:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}]}) 00:21:15 executing program 3: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:15 executing program 1: r0 = getuid() syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000000)={[{@uid={'uid', 0x3d, r0}}]}) 00:21:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}, {0x5, 0x0, 0x0, 0x7f}]}) 00:21:15 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4, 0xff, 0x0, 0x1}, {0xbf5, 0x5, 0x3, 0x101}, {0x80, 0x3f, 0x2, 0xd3}]}) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000080)=""/124) 00:21:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 00:21:15 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000000c0)={@mcast1, 0x0}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80008090}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00082bbd7000fedbdf2502000000140001db000003000100000008000100", @ANYRES32=0x0, @ANYBLOB="1c0001800800030001000000080001008ebe474dd42442faf3c54da44e0d5b5d1c54daac08c520a76dfe4d43787166f091544e7dc2501ff84dd173b7e23ce19f7f328b4d93ab7940283b5c28365a3351f12e1c69317b72d42b2f7bdff3be55f3d4461b82afbf83574783a939c8f5d306e1587ee0fbad4731ab5055e64e1731e06cbc6ea2f33fa1f963189ebf2572ff4e8e6b9ddcfa9dcb83354561c78c041ff11852a6da8d2cf4fc7723109f02ca8efd35560bae2d96be809f25eae8fba5a03095e7710a21eb965f143fb6ae49816d123383e1fd6da95156298e10ef4bc78a42a534df83891a8051b951f7b5d0f9bcd105fd7200"/253, @ANYRES32=0x0, @ANYBLOB="08000300020000002000018008000100", @ANYRES32=r0, @ANYBLOB="140002006970766c616e31000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x2080}, 0x811) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x28, 0x0, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x24000004) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001300), r2) sendmsg$NLBL_MGMT_C_REMOVE(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @local}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @empty}]}, 0x30}, 0x1, 0x0, 0x0, 0x40800}, 0x4) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)=ANY=[@ANYBLOB="15"]) 00:21:15 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x20500, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001300), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040080}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r2) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)={0x4c, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x4c}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x94, r4, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}]}, @ETHTOOL_A_PAUSE_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000000) 00:21:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}, {0x5}]}) 00:21:15 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x2, 0x0) 00:21:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 00:21:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x5}]}) 00:21:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) setsockopt$inet6_buf(r0, 0x29, 0x44, &(0x7f00000000c0)="13a8df51e109c4a20847edae043b3ead89479d1eb0e6f5e9a36db09f87939805eb7c97292d78ad6bf71c8ed99a7f1634ed6f24bf46eff6", 0x37) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000000)={[], [{@smackfsdef={'smackfsdef', 0x3d, 'func'}}]}) 00:21:15 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) 00:21:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}}, 0x0) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x401, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @local}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, 0x0, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [@NL802154_ATTR_SEC_LEVEL={0x14, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x1}, @NL802154_SECLEVEL_ATTR_FRAME={0x8}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x50}, 0x1, 0x0, 0x0, 0x240000c0}, 0x20004804) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) 00:21:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x5}]}) 00:21:15 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/240, 0xf0, 0x1, &(0x7f0000000100)={0xa, 0x4e22, 0x403, @local, 0x7ff}, 0x1c) 00:21:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 00:21:15 executing program 2: ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x4, 0x26, 0x12, 0x10, 0x8, 0xfff, 0x2, 0x3f, 0x1}}) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) 00:21:15 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x220000, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x100, 0xec, 0xff, 0x80000000}, {0x2, 0x5, 0x7, 0x7}, {0x81, 0x3f, 0x3f, 0x16}, {0x6, 0x68, 0xf9, 0x1}, {0x0, 0xf, 0x13, 0x4}]}) pselect6(0x40, &(0x7f00000000c0)={0x3, 0x4, 0x0, 0x7ff, 0x4, 0x1ff, 0x1, 0x800}, &(0x7f0000000240)={0x800, 0xa2, 0x2, 0x7f, 0x80000001, 0xffff, 0x5, 0x7ff}, &(0x7f0000000140)={0xc4a, 0x9, 0x3, 0xffffffff, 0xd84, 0xc, 0x8, 0x6}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 00:21:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x5}]}) 00:21:15 executing program 2: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000080)) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) ioctl$RTC_UIE_ON(r1, 0x7003) 00:21:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x1, 0x3, 0x1}, {0x5}]}) 00:21:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f00000000c0)={0x1e0, 0x0, 0x8, 0x70bd25, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x3}}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x8}, 0x24044094) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000780)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@private0, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f00000007c0)=0xe8) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000800)={'syztnl2\x00', &(0x7f0000000a80)={'tunl0\x00', 0x0, 0x10, 0x1, 0xffff, 0xbd, {{0x1c, 0x4, 0x0, 0x0, 0x70, 0x64, 0x0, 0x1f, 0x29, 0x0, @multicast1, @loopback, {[@timestamp_prespec={0x44, 0x14, 0x3c, 0x3, 0x0, [{@empty, 0x5b}, {@loopback, 0x9c3}]}, @timestamp_addr={0x44, 0x14, 0xd3, 0x1, 0xd, [{@dev={0xac, 0x14, 0x14, 0xb}, 0xc0}, {@multicast1, 0x5}]}, @timestamp={0x44, 0x14, 0xc1, 0x0, 0x4, [0xffff, 0x9, 0xdc3c, 0xa0]}, @rr={0x7, 0x1f, 0xb1, [@initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100, @local, @private=0xa010100, @empty, @empty, @local]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000840)={'syztnl1\x00', &(0x7f0000000c40)={'syztnl2\x00', 0x0, 0x40, 0x7, 0x7, 0x1ff, {{0x32, 0x4, 0x0, 0x0, 0xc8, 0x66, 0x0, 0x6, 0x29, 0x0, @local, @multicast1, {[@rr={0x7, 0x1f, 0x7b, [@rand_addr=0x64010101, @multicast2, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @local]}, @generic={0x0, 0xc, "7db86420034bf556ca1d"}, @timestamp_prespec={0x44, 0x1c, 0x45, 0x3, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8c1f}, {@remote, 0x80000000}, {@empty, 0x2}]}, @timestamp_addr={0x44, 0x24, 0x34, 0x1, 0x3, [{@local, 0x3e9c}, {@local, 0x8}, {@local, 0x8}, {@local, 0x9}]}, @timestamp_addr={0x44, 0xc, 0xf7, 0x1, 0x6, [{@multicast2, 0x2}]}, @timestamp_prespec={0x44, 0x3c, 0x7e, 0x3, 0x7, [{@rand_addr=0x64010100, 0x9}, {@private=0xa010101, 0x4fa4}, {@multicast2, 0x9}, {@multicast2, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x20}, {@multicast1, 0xcc19}, {@multicast1, 0xff}]}]}}}}}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000b80)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000f40)=ANY=[@ANYBLOB="94010000", @ANYRES16=0x0, @ANYBLOB="040026bd7000fedbdf25190000002800018008000300020000001400020074756e6c30000000000000000000000008000300010000002000018008000300010000001400020076657468305f746f5f7465616d0000008000018008000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468315f746f5f687372000000001400020076657468315f746f5f62617461647600140002006e657464657673696d300000000000001400020076657468315f746f5f687372000000001400020076657468305f746f5f626f6e6400000008000100", @ANYRES32=0x0, @ANYBLOB="08000300020000000c00018008000300030000003c00018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="140002007465616d5f736c6176655f300000000014000200746561653000000000000000000000005400018008000100b4a4b08124dea059d60d02326cd8802841f625ff05cb656aad154fdc5ffde531924fa6354080f6239bc1c3f222fe2688d290c951460a244aa673fdb90cf7c8aed109a844bfb0f0dd8c43e57fcd2061a7fbc81ea3992d09afafad5a1b", @ANYRES32=r4, @ANYBLOB="080003000300000014000200726f736530000000000000000000000008000300010000000800030000000000140002006e657464657673696d3000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1c00018008000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB], 0x194}}, 0x4000080) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r2) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r7, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)={0x38, r8, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x4}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x38}}, 0x4004) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f00000004c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000700)={&(0x7f0000000340), 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xfc, r8, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x24000004}, 0x800) 00:21:15 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 00:21:15 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)={0x0, 0x3d23, 0x1, 0x2, 0xc3}) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) 00:21:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x3, 0x1}, {0x5}]}) 00:21:15 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)={0x0, 0x3d23, 0x1, 0x2, 0xc3}) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) 00:21:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x1}, {0x5}]}) 00:21:15 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r2 = getuid() setreuid(r1, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) accept$packet(r3, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000ec0)={0x23c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000e669595e3a847e5804bf52e656452b2aa4a4c0564c506188ed35b066b6bdee702fcbf2b621c3a7f64fa7f33b0acb3def5e6838b4bf13ccd554a1e23f7371d313324f8ddced8079af82e68f96c8c3eb", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf251600000005000300000000000c00018008000300010000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0500030000000000050003000000000005000200000000000500030001000000050003000000000005000200010000000500040001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20008080}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0}, &(0x7f0000000480)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f00000004c0)={'ip_vti0\x00', r0, 0x8, 0x20, 0x10000, 0xd16, {{0x22, 0x4, 0x1, 0x0, 0x88, 0x64, 0x0, 0xe, 0x29, 0x0, @empty, @empty, {[@generic={0xda, 0x11, "275a8b0672316c638bc224fad0209f"}, @noop, @timestamp_addr={0x44, 0xc, 0x9c, 0x1, 0x6, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x9}]}, @noop, @generic={0x86, 0x3, 'j'}, @end, @timestamp={0x44, 0x1c, 0x1f, 0x0, 0x3, [0x3f, 0x7, 0x7, 0x80, 0xfffffff8, 0x3]}, @timestamp_prespec={0x44, 0x34, 0xab, 0x3, 0x3, [{@dev={0xac, 0x14, 0x14, 0x28}, 0x2}, {@broadcast, 0x5}, {@local, 0x10000}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@broadcast, 0x20}, {@remote, 0x3f}]}]}}}}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@private2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={""/10, ""/2, @multicast1}}}, &(0x7f00000006c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000740)=0x14, 0x80800) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x110, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x20000084}, 0x10) r11 = socket$packet(0x11, 0x0, 0x300) bind$packet(r11, &(0x7f0000000140)={0x11, 0x1, 0x0, 0x1, 0x7f}, 0x14) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x8814) 00:21:16 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)={0x0, 0x3d23, 0x1, 0x2, 0xc3}) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) 00:21:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 00:21:16 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x220000, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x100, 0xec, 0xff, 0x80000000}, {0x2, 0x5, 0x7, 0x7}, {0x81, 0x3f, 0x3f, 0x16}, {0x6, 0x68, 0xf9, 0x1}, {0x0, 0xf, 0x13, 0x4}]}) pselect6(0x40, &(0x7f00000000c0)={0x3, 0x4, 0x0, 0x7ff, 0x4, 0x1ff, 0x1, 0x800}, &(0x7f0000000240)={0x800, 0xa2, 0x2, 0x7f, 0x80000001, 0xffff, 0x5, 0x7ff}, &(0x7f0000000140)={0xc4a, 0x9, 0x3, 0xffffffff, 0xd84, 0xc, 0x8, 0x6}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:16 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x5}]}) 00:21:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r1) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000800)={'syztnl0\x00', &(0x7f00000006c0)={'syztnl2\x00', 0x0, 0x8000, 0x1, 0x3, 0xff, {{0x3a, 0x4, 0x3, 0x4, 0xe8, 0x64, 0x0, 0x3, 0x29, 0x0, @remote, @broadcast, {[@generic={0xc6, 0x5, "832588"}, @lsrr={0x83, 0xf, 0x2e, [@broadcast, @loopback, @multicast2]}, @timestamp_addr={0x44, 0x2c, 0x95, 0x1, 0x1, [{@rand_addr=0x64010100, 0xf6f}, {@loopback, 0x1f}, {@loopback}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffff000}, {@private=0xa010101, 0x82a}]}, @rr={0x7, 0x1b, 0x35, [@private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast2, @local, @loopback]}, @lsrr={0x83, 0x3, 0x4e}, @end, @lsrr={0x83, 0x1b, 0x74, [@dev={0xac, 0x14, 0x14, 0xe}, @multicast1, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x32}, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x2c, 0x20, 0x1, 0x6, [{@empty, 0x3}, {@private=0xa010100, 0x100}, {@dev={0xac, 0x14, 0x14, 0x2d}, 0x8}, {@loopback, 0xfffffffc}, {@empty, 0x7}]}, @cipso={0x86, 0x12, 0x3, [{0x1, 0xc, "b4f13afc47ab7021bfa4"}]}, @timestamp_addr={0x44, 0x1c, 0xd5, 0x1, 0x2, [{@multicast1, 0xff}, {@local, 0x5}, {@private=0xa010100, 0x1}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000008c0)={'ip_vti0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="003a002000000101800000004b09002c0068000008049078640101017f0000010717d57f000001ffffffff0a010102ac1e0101ac1414aa00"]}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000c40)={0x148, r4, 0x1, 0x0, 0x25dfdbfd, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0x18}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r7) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r8, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x58, r9, 0x1, 0x70bd25, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x9, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x58}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0)={@private2, 0x0}, &(0x7f0000000200)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[@ANYBLOB="b8000000", @ANYRES16=r9, @ANYBLOB="00042dbd7000fcdbdf250e0000006c0001801400020069703665727370610f163b43fb604f53236e3000000000000008000300040000001400020073797a5f74756e0000000000000000001400020076657468305f746f5f626f6e640000001400020076657468305f766c616e00", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="380001800800030002000000080003000300000008000100", @ANYRES32=r11, @ANYBLOB="08000300010000001400020076657468315f746f5f62726964676500"], 0xb8}}, 0x10) r12 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0x24, r9, 0x400, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4004090) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r3, 0x4, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20040014}, 0x24000840) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) 00:21:16 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) getsockname$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000880)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000840)={&(0x7f0000000300)={0x540, r1, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x2e0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x138, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '(+@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '#\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x736}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffe}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '(^\xd7&{$(\'\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '\\+-!*).\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '{+]#\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/vcsa\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '@[#o\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/vcsa\x00'}]}, {0x4}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/vcsa\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/vcsa\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x188, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/vcsa\x00'}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffc}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/vcsa\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/vcsa\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\'\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/vcsa\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffff00}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\'@)\xd5]\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, './&\'%]\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '.(,[\\{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '%\xa2^\'(\"/a\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, ',$!%^\x89+(\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ed7b5b6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7}, @ETHTOOL_A_BITSET_MASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x10c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xd}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7f}, @ETHTOOL_A_BITSET_MASK={0x5c, 0x5, "8623da82001a5ebc19c43f66806a3cd41a0823bcb5068e5c4a261086c9bb2adf2361b0af1656415e3ac17fef5c011f905527a3617cf614bdf31ad2eb1044f882d8e6e250955c6cf329bf9ea5ab2361720465463f0d415b19"}, @ETHTOOL_A_BITSET_MASK={0x95, 0x5, "b504d94fb304b100dbaa46d49e0608bb5b9ac91aefc1e9f695be3a52cbd362e76f3b556b059083d89cf1ac0625d453c58800dadb95500c02a25c73b80a54f52a82b64fd0b71e797d9e447b79e6c256f7cda6da3ae288d4e742a9bd7de1afa0f009144b6e082e95412cdd68d29fb2a61c6139afac1a4909d3e40f76db4e8f3625e8702adb5e40f7561fe548cdc7a4d00d76"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x18, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x540}, 0x1, 0x0, 0x0, 0x4040}, 0x20000081) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000080)=0x10) [ 715.813017][ T25] kauditd_printk_skb: 10 callbacks suppressed [ 715.813026][ T25] audit: type=1326 audit(1622679676.488:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8530 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 00:21:16 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)={0x0, 0x3d23, 0x1, 0x2, 0xc3}) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) [ 715.925350][ T8590] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 715.949459][ T25] audit: type=1326 audit(1622679676.628:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8587 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:16 executing program 3: ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/43) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="b12042806cd7fea0e00fde5b62abf1e24ea49c668cefb2b566f09755421c70d1cfbabc8c6479208bebc489ba82f24a8b40829d8143b8e99e76b7989dd02710ec3219f7b772d01606b19db85623cc205cf465490daf7de664d03cd0c1085da67bd27d13b0934ad4161f287c6836c1a7982fabc45c1fe80a5b0d4d9ac818f18b", 0x7f, 0x800, &(0x7f0000000100)={0x11, 0x1, r0, 0x1, 0xc3, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000280)={0x4, 0x6}, 0x4) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) recvfrom$packet(r2, &(0x7f0000000180)=""/162, 0xa2, 0x1001, &(0x7f0000000240)={0x11, 0xd, 0x0, 0x1, 0x1f, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1a}}, 0x14) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:16 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r2 = getuid() setreuid(r1, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) accept$packet(r3, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000ec0)={0x23c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000e669595e3a847e5804bf52e656452b2aa4a4c0564c506188ed35b066b6bdee702fcbf2b621c3a7f64fa7f33b0acb3def5e6838b4bf13ccd554a1e23f7371d313324f8ddced8079af82e68f96c8c3eb", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf251600000005000300000000000c00018008000300010000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0500030000000000050003000000000005000200000000000500030001000000050003000000000005000200010000000500040001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20008080}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0}, &(0x7f0000000480)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f00000004c0)={'ip_vti0\x00', r0, 0x8, 0x20, 0x10000, 0xd16, {{0x22, 0x4, 0x1, 0x0, 0x88, 0x64, 0x0, 0xe, 0x29, 0x0, @empty, @empty, {[@generic={0xda, 0x11, "275a8b0672316c638bc224fad0209f"}, @noop, @timestamp_addr={0x44, 0xc, 0x9c, 0x1, 0x6, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x9}]}, @noop, @generic={0x86, 0x3, 'j'}, @end, @timestamp={0x44, 0x1c, 0x1f, 0x0, 0x3, [0x3f, 0x7, 0x7, 0x80, 0xfffffff8, 0x3]}, @timestamp_prespec={0x44, 0x34, 0xab, 0x3, 0x3, [{@dev={0xac, 0x14, 0x14, 0x28}, 0x2}, {@broadcast, 0x5}, {@local, 0x10000}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@broadcast, 0x20}, {@remote, 0x3f}]}]}}}}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@private2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={""/10, ""/2, @multicast1}}}, &(0x7f00000006c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000740)=0x14, 0x80800) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x110, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x20000084}, 0x10) r11 = socket$packet(0x11, 0x0, 0x300) bind$packet(r11, &(0x7f0000000140)={0x11, 0x1, 0x0, 0x1, 0x7f}, 0x14) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x8814) 00:21:16 executing program 2: syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) [ 715.956056][ T8590] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.1'. 00:21:16 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r2 = getuid() setreuid(r1, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) accept$packet(r3, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000ec0)={0x23c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000e669595e3a847e5804bf52e656452b2aa4a4c0564c506188ed35b066b6bdee702fcbf2b621c3a7f64fa7f33b0acb3def5e6838b4bf13ccd554a1e23f7371d313324f8ddced8079af82e68f96c8c3eb", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf251600000005000300000000000c00018008000300010000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0500030000000000050003000000000005000200000000000500030001000000050003000000000005000200010000000500040001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20008080}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0}, &(0x7f0000000480)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f00000004c0)={'ip_vti0\x00', r0, 0x8, 0x20, 0x10000, 0xd16, {{0x22, 0x4, 0x1, 0x0, 0x88, 0x64, 0x0, 0xe, 0x29, 0x0, @empty, @empty, {[@generic={0xda, 0x11, "275a8b0672316c638bc224fad0209f"}, @noop, @timestamp_addr={0x44, 0xc, 0x9c, 0x1, 0x6, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x9}]}, @noop, @generic={0x86, 0x3, 'j'}, @end, @timestamp={0x44, 0x1c, 0x1f, 0x0, 0x3, [0x3f, 0x7, 0x7, 0x80, 0xfffffff8, 0x3]}, @timestamp_prespec={0x44, 0x34, 0xab, 0x3, 0x3, [{@dev={0xac, 0x14, 0x14, 0x28}, 0x2}, {@broadcast, 0x5}, {@local, 0x10000}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@broadcast, 0x20}, {@remote, 0x3f}]}]}}}}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@private2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={""/10, ""/2, @multicast1}}}, &(0x7f00000006c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000740)=0x14, 0x80800) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x110, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x20000084}, 0x10) r11 = socket$packet(0x11, 0x0, 0x300) bind$packet(r11, &(0x7f0000000140)={0x11, 0x1, 0x0, 0x1, 0x7f}, 0x14) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x8814) 00:21:16 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) [ 716.026128][ T8603] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 716.043123][ T8603] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.1'. 00:21:17 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x220000, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x100, 0xec, 0xff, 0x80000000}, {0x2, 0x5, 0x7, 0x7}, {0x81, 0x3f, 0x3f, 0x16}, {0x6, 0x68, 0xf9, 0x1}, {0x0, 0xf, 0x13, 0x4}]}) pselect6(0x40, &(0x7f00000000c0)={0x3, 0x4, 0x0, 0x7ff, 0x4, 0x1ff, 0x1, 0x800}, &(0x7f0000000240)={0x800, 0xa2, 0x2, 0x7f, 0x80000001, 0xffff, 0x5, 0x7ff}, &(0x7f0000000140)={0xc4a, 0x9, 0x3, 0xffffffff, 0xd84, 0xc, 0x8, 0x6}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:17 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in=@private=0xa010100, 0x4e20, 0x0, 0x4e22, 0x6, 0x0, 0x80, 0x0, 0x3c, 0x0, 0xee01}, {0x0, 0x9, 0xfffffffffffffffc, 0xc15, 0xc568, 0x1f, 0x3, 0xfffffffffffff39c}, {0x4, 0x22d8, 0x10001}, 0x8, 0x6e6bb3, 0x1, 0x0, 0x3}, {{@in6=@dev={0xfe, 0x80, '\x00', 0x15}, 0x4d3, 0x32}, 0xa, @in=@multicast2, 0x3501, 0x0, 0x3, 0x5, 0x9, 0x912, 0x1f}}, 0xe8) r0 = getuid() setuid(r0) setreuid(0xee00, r0) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:17 executing program 1: ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000008700)={0x17, 0x38, 0x8, 0x13, 0x7, 0xfffffffc, 0x1, 0x68, 0xffffffffffffffff}) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00']) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/227, 0xe3, 0x40000101, &(0x7f0000000000)={0xa, 0x4e20, 0x6e77, @loopback, 0x8}, 0x1c) getsockname$packet(0xffffffffffffffff, &(0x7f0000007c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007c40)=0x14) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000084c0)=[{{0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f00000001c0)="0322a20701145949bea1e0217db9aac6", 0x10}, {&(0x7f0000000200)="dc19e91128ecac005d001287df00b41f697667573b28032a09cc86f793253106de965208bfa8c6132e495413da7700926ced1d60bf9acfc3402a8e3fdc4f9620182a30881225e7cfa28d98b7cfd48643fe8f8dd539dad374b937d063a782058d3e40cc7e3bf682f9e80c598dc3b7917ea9020e2f4cd6d39867053b4003037f02e48a69e425a73f8fcdf57a1e68f5c5be2c6ec1b341ecbc5fbb31db38e3577e9fb83f091f31c221ccbdefff3a136d69d3b3e0963a370aa40be5b7a668f0a7c9757cc205f7877ea1b4c38e5f0e", 0xcc}, {&(0x7f0000000300)="efa0617d138859180c259572941337d8590df659ef6924e78ffaaf27c7e4fadedf0c4bf43764c67e2dba07b7cc545d37eeacafb567316a6d99c2d6c21f29933182eef0816a4220f27e6f5fccc8ea6a934b0ed3e7e5ac308ba76e4ad42162db90a7a0705d6d1420bfe412ddb00b3a251b1940d43b8cbe9c19e68aead1084385e3a3234c8b40e4f999cb1ceb302ec8d528d80b66b5ab02bd4974a1b6dcdfe824c336c357aa4b35d6f08f7c06938cec6034dbf4a60c6d9294466cca48b6", 0xbc}, {&(0x7f00000003c0)="de98aad0311116156842ac067a4ff55a049cde22d595585fd89fd216e504ab0f93ca41d7af7cd9cd8a73531999e60a1bb7c4a530fdc6934c7d3de00222d3114b7d2ee9f3974ac2e8a9ad770c1a08aad4561dbe9025f2809dc759e92b245aef5d54bbf389534ad6c73ae93d7711c25f0c4adb17f826c3cd5fa0a18c4e2c4a2f0b2631219d7f24dc288a8f50c0a3b64dccf15c9ac507d8a3970d98c734cf0a3dc7897498cc661fada40db6398313971ba7895ea0fb28cc5318448c3a9e5bc00e5dc8231a552d844b5f7d3a644394981fb751c0bd0d5db32c91faf7cc2e72", 0xdd}, {&(0x7f00000004c0)="f4914e73bdf0d305e7534027ad7004192aa2cc15606af4fce91fd9d11a6e03ecf3a0c81106cb0862588796588893b63afdf7c3db594337fde50bcf44bd49247c9e022b6bf70e702cd392d7a27a8c87b09cd20a0e56ea735bc77380ada75c9d9c9960c6b35f4a9d66e4e5431c4226d6904d62b853d8bcf2027876a2f2", 0x7c}, {&(0x7f00000005c0)="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", 0xfd}, {&(0x7f00000006c0)="b429f833e965eed25b44247d1d421fdd010c71a561149cc6b7dbcf9970c90f1746383ee4aa798151976be7107322bc3fe78c862eb974c6ab4bb04c887a05c8686e276a978b7258ef4c2b545a38b9788a40277a23e40a592efa158d5d5394b84095d01420bd3d92987d7f707e7722a904dbd59e8ed05800ed3372d24dbf3b9abb44776c1252f4998779484a00b5ddb08a1dadd405b7181a38e1b7d79e26a33424023760cfcc55060f2e15e6d9b0ab64b6d5f361c53bf6d68dce401a9a5749ebb25c422188a288e925e55cad26060080836a5a9b2ea10148cf37c79530690ea30214dea31e26d0eaffb40ce19cf524877cdbedb476891f4d88aa82c31593823c80af72409f0e9e2954376b6907b68c392101acecd38c2d9decb76614693a67669c7c0437dc9c7084c99a4ab27114fd51c0b418424d3b94ecdd190aeb94b7cfc058d94853398e03122d9031f368cba0dc59b6d1e0be6f47645a67c3ce4684bbb6e81dc3b3fa674cea952b7da052c15b47263da2cb11c9424a892b7458ac309b5372e5da914cc12f267258b8cb0404dc2d933be76b94a759961864c766fbce6bc7ba46af6cecde474ad6dc13e6126709e44a459aa2538b9c989b42357b4723a83c5e3d6b9ef6f8c989a8d3cdd30c04076731fdd115f1450177a21e256dd489c42cd0bdaa0adba542d567e0a01e2e27c68766ca1744d97691f249ad0aa9f6e505701c3da500defafea90169a77e4df1e8175c87e3e7443ed3064b9d19ddd16983a5d4ff22ef3aeecb6a6eb5b95d13ddc086b3f0276d17f3973c3e6a0f9266f477ae9ca81442f7a6c8554fc85d8400cd4b8c92d16850265b80e2f6003f5fececb2a49182ae04c9245e19c09f8c40ec88a498b8f58e68150f0412a271fa16111cd0728d5f7c86768a4b94e1f51385cbcfecdb3bff6c084ac188db7222a541460acc449cbba67ef6060048e344b8219eb447f508e1c1d250f6377644ec6a7139a61f497a1b5abb60911d34161ab3b4f269cdad1833dcfa6f4ef8b6bc1ba51a93489fc2aca86ae367e5de88f1ea692623b2394e497e91afc2f3c07bb71eb83f44d15ceb8a9d2be7102e7ca0205f93e45aa14abc45109f6b3cd5d18b78418341d697dd9b739fa86b89cd27f8eba74b3fe3d2e9060f2e9b50913c369aa1364aeac72280c39a92944594e8dd96f14a4cac888b7bf38a8a5c8acb17f45000d18c7217820acc3c0511075ec484d519626947167926d3a53d6f8191f7c14ad126b3f67b53ee4114bd2c6b058593cdadec236c2b0f6e9026a6a2c9c20a7628adebe1a73d9b8f45b58353a5974ed4b56ba3160d0ce6e625fa6d9b64ee3e6b5ab0a613ffa6596b3012cb95bb399de0cca1c18cbd3294ee46871ce76b84a2dba7608a7360e48ebd4092f2c529bc9e746b0f75e7aa1e6f7533fe9314ff8bc07cf7edb95064f48e7af395f8ea7d8d0a3d9657cb04caa64eb6a63125407f72acc718e256dada0702dea8f9b1ae9564055e795e45159046ddff0e9944b499b08b45c917111520c8a8ffbac4b93876f5d3129d7a425479128eaae68eb1d66dbb25db2744fcf442928efb9731308a3b84cac1f5baa750d964009a66531fec564532cad073333f3bb0991efad2c72daa6f5c612fff8b84c7d33bd9a2313b2a435e9cc2d238bc7f8a60a2be0a383be89a6f8a60c6f10a6fe175882821161dd379001831cab5ab0203fabe8b77a8a87165894c572bfa3ce6ff874bf22425a133aaca3eb0823d9bd89ed902077ba503a35df5cf37bc9d73103e2fd069f83ffffb0fea457ae68eb4b72db4ebb411eea4120b058b095f3ba5daef183c8482d556cb3b74c4808282c23c3e70c69730c18be0a01090e1dd32960bcc44d5b0f7dcd6ac1de45dbc1b950360a8d8e59fabb703281c7f8f1436b4803738d301f748385668fb6ab54ecabc3281994a6e793584b998e69c37c5fb86d7e04ee4dc4a41a7d19cc610555539373de92670419c0d06fc8b76246d2ab577be72230d99a02d286e18bee7a6f703654a754bea53ff7334c680be2c3c33b41c84680716db95489595c6b4b163db61987d7c87647f5565272825323e85ed4a2c1ff2187c219131b5182a035c4a972952ad336252768c07e1510c39305e0c5d6f610703ad47932d2148cc65686cf8e4a87e1b4ddabf161f7b92a4935ebefae58aa4c2c3149b10ae7e8909004970e6b9064ea48149836c974e6b1105d8559021430f7f6ed25f0d1f4ca9f66543ec384168a5f6ef5b011543e9a1ff68bb58c9cb917cae7e184d189e3fcc03b3ddfc8701ef04e52bc74ef58c4123d4f505a74ca695c1fc28e80015aa5ac4390b93634fa85261b2e851c38444f3556600cc6ecfb47f4cce2f0370503552bb953c01693742c78ddf3acb0c5364e761e50d92fa447245bac487d994398d250a333ce4076377b010c6fa951172c7791fd04b7e72599508e856e188fee6a885137e6b640856617d6c5aa2b29b1b64f8e2c39a60be7a97b4d675069e2c18be420c956ad5f3304419eeec68a56b52cc680ae23befc833e9ef185f90d602e02c3d4f0ca5ab8f89b0908da7bd829f12b957f0ef934da19be0f6ed4d2ccc3ba892388216dc4388d8cebd1cad5971d9dab322ef06ec357aa9d5b578e426c0c5fa5442e5b0eaae363f578048a9626acc5f074351d7083fe65cc2a6caf4fd674bd1cae30d5f48b9862acf69d1006dee7f31d7363b654a9b7441823e5e2ef7bd01ba601a9f724b5e888a65b7dff5a615a31b08397ad715cc169febc3fec6b23cc2558cba4f5c4fc3e0c401a5c7540ef653cabe47bef1d074a903e94f905faad6e053199815e6e0a1d3ac90d3f10ec723240ceca4108aa3d98ebece1ff090673c52c944d310a0aa4057c2e0e12a225f599d9f4d84c3cbc2a709a74dc881f602433bb4e7622fbe939fcb29cb666ca0c40f2b68085463814a2b99d9b6cf83a624de13d0c7d182f44bdee4cbee8e294fa0a3594289e445bb463a4fe6472fc51f5ba10507fcfbee546e592d5f5153d0c6bfe5d6e475e7e6780ea9a91bcafc420bbefd7a7bde904c52217925a062114b4b3d81d4e21f35f412389e4aa76ddee840d2ccfb9f7d802da0a836d4b5a928354e89f9d344a40219082ea327541be2665e0df42e415bd53c2eb51253178ff0a8298d00314f97b08e4562f60f8759c3a2ef3c0f0bfe258280c98433c452564b0279b06d5b24466fff16b34f70872bdda121123873595ea73a4d8c0c10d1855bff2b5b7490b7b0a5b81e32a485c9079ba5b1fcf4932ac557b800afca0a80575e8f7c8c14b6032d07327a3c06f86032b3bd4d28c2f5d4ed1bd3cfe55381fa57222a2658bff978c9aa941c540a587b7fc40330edccbc17859579b0913a6a93ff351c2dc4c7f3d17007dd2a44378c174e6ab3609cc2c60321c5f48c249e3259ac57a3ff8d5d1034d3ce80e09fc31505974f5e78187829661ba24bd155c1761864898c41b1aca7afc16d861ad522dfa96a210d5b0e4ef3288689b303b664e37fd4638cc8c8da543584acac446d9b6e16be59e4a691d8d1fc32a40fd7fee821dff02ac310debc40e33560e7ca65f8744691b479f936b228bc3ee5e14a743bd9d63f0bd24836b6537c92d87e5019a2abfc948321b1671eca1d71000207e21368876fcff0b4a850bf52718348887459cdf4cfe8bd3a536c67d09c43ee131b10b2893323c285704dcee279fda676a87411501a48b29262aa893e4cda4a3f5dabcc395da9e7638a8b6c099c49603c579ae1b85c812c1e71007cdb349fc571c90f60577ebb0a7770c82ace5885463eb8be77e82930fdc8dda12ed80555c2ccbe838e0394c19fff1b71bbb34a605d920ba4a7be482aa9e8e3b7b3a4aaafc1f573038231fd3be8cc40e532690f6d02c2ac5f80ad7b176f4ac6435632c6d1ffcebe923cd0270aa5212866bbf13227b6487649908ebdd96b96dcda5bbe636201900139ae1e6fc60202f209f6ccbe57ee10ee9c8ff4b9a56ae03d65f8ae51cf0634626db93bec3cadafb2996e62cd004565fef29ac14a11bf2cc4b34ee4d4f24dcdbc38ab243fd1616ea8ae90ad3f9b59a1638b98de66d545d5bde4a72d89b44a3282b94597ab19730e07f36139e304f97de3e275d4d4025be3581db6316054490f06611b3916ecfeb8322703a9e366190277c270930b3c08323a669d17ea2b542c913ab8cf0a53565587d71af7829a7116d616ff0dc898f18ccbd7894148c410efcc7638a7f464576eafd78824ac88d9062c001bd09bb09b858e06e9542e03fa2760dfb92d041f16fda8d777290046b19e91d398d4208682be9a51cdd6937ef80c09ec62f5184a1b1d4284891c2bea7cd7b2e1e319407c221150e6317d56715ba474d21b6358456e33ba919a7d5bfe1374d0d1837894d1e23f888495a006ddd8444d1fd18bec0e219de905968344bcbdb2c5317e3cd9b8cb9820d06acf9321e6cedd3c62d8ea391e7b8b11603a06080464d52eb5d91bcdcbda2cd110d33ae60bdb904c69e4a3c5b70433186f28b5a9dcbd68d456eb21d326512499f89fedd27a34122a4ca3b7cec179800948171590a2fda0a38ad318bde6b900111566d2cdd9cfc2a3505cb7affc7b1837e0258aa900678aae2e94282083c86e2bb2bcc371f9a3168d57998ba6280c4db9d541da7442b3e5d8c7e35d02e7f49ed6b07d7fc31270221fd62c95bf859e2f56051836f11004b0b0abab1fc132fed4f62934cceddff0da3512e054284862f7834f41eb59330704f47f967bc790357610c3614f5accd1060ca1aa823af30ba64376c8c8bd254e8dddae8f6458a4fe7845c4fae6454cbeec744fee02dbbabea2179d29268131d56a6c311b7d54195be184c0b2090d3c67d28f6aa216c97d7e739b33ded47f4b0acd2b0db4f563f17cb882fc441a027798f614f895bd8342cfffb547373b4674ddc0ab09b279fca37f5d2736d1cb60c325b6e53b36ec8bcbedac624bf96bcb4bbcb13877255f13925599ce69417ad4b907c8a5e7458027d8b5f072d59623dc737166862063d594d96272ebd0bf6d2ea1d4ed9ea8d237b3586fccb9ce3317f1dae986212d9ec5864c5076b9974edd46e0dd7ae8579f10762fe1d55d1ad5bca6f40bf0f606ae90f0add769e0d87d45e58193e6bd2284b591c4380cee3ac4a801f95ea59fe0c23005f88d5c73190946c0c92e3bf0d2c6d97f75e7830161efe4621cff9fcf8d8f6a24ed0ba4d394f49a8226a6a785d08a61ec87d4ed7b011cb01c810c385507fe73f9080502093b3abbadc399299fb6fac21700db814e064000d8b53dca7550d14e881b62a06a84db592215511a2383f3eb97782f90be613ddad0c498546cbf5604b865f8bebc3685e076a7dc081b1c1bea1618c66d09f71eeb579222db1e910918a778fd4fe811c2699e11869bb22ad731970e596cba02e64f0f2b41787872c08f1d6c5980e220a000f0c09d8cd77de54ec102648856df22f7dead6b8ba97d80c0933f9e0d881add47b54a0a99488f9254b8fcfb913e21b2f28898676caea07f869c86630ebd6bb988ba711b7e7bcc7681b5a328e4628c4ffb56c57adfe79bf2880c7d49ddac362eddc453f734b2afe1b7b387e48ef315804dce892a9b271c4c52f121fee5b1dd50767dee8719da008a396604ae4879d104f7e0fc5177d72e1b53671579204549ec864d96a1b1196353ad0946bd793d93ab5c8af77fbe4c3e004705f359b350716b4a16389627be0fd61f8136d993f29b0b042c80750716d0127fdc93d048694d122062f08836d4b44e8c5a7677b397204d09dd", 0x1000}], 0x7, &(0x7f0000001740)=[@dstopts_2292={{0x100, 0x29, 0x4, {0x3c, 0x1c, '\x00', [@generic={0xf9, 0xe2, "27b3ae5f4b5b0a18bbcbdc8b6c4bad72d504fcdcf9e1169b33f19859f7b1e5761173eefea799493010e21e3ebabb26b090b9ab64262d1b6fe661fe8ee0935c86051481d832df0b531ddcf082aa62a4f83cac1a91fdcd0619e27cb06996dc343f623787ac68b8ed52a6f782f2d5d1cf43ed3a6140d2648af1c466715b66cf6270e8bdabd1dd17292eec1f75855170dc9327f99c318f31f46122628317c5c00f38424a9e079ac84e987b82352d4fa34c36713ea8cd789a14eb910e322e2d83319e058fd7a0edcfd9e1d5b46c2287cb2370ec2fbd83cf288639e3cf2c56b9c8c5aa14be"}]}}}, @dstopts_2292={{0x60, 0x29, 0x4, {0x3a, 0x8, '\x00', [@hao={0xc9, 0x10, @empty}, @padn={0x1, 0x1, [0x0]}, @enc_lim={0x4, 0x1, 0x1}, @generic={0x81, 0x1e, "2e97f4b498513b4c04a62ae2e0669f0bab894ee709b217b154c9d5f250bc"}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x40}}], 0x178}}, {{&(0x7f0000000540)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x7}, 0x1c, &(0x7f0000003e40)=[{&(0x7f00000018c0)="872ae9484d9e0cd5d4fe78d411f59e388c353d7df0736aff31cfba926852ff328f70c19fa7474347bfe9e0b8473fa856fbdac1d5c9a71fdb698b7dccb6f9cf5f1b30e61964e3fe36ce1f893c326e647b38eb58d9fd40c28b5b0ff3701de7325ad9c3aeb17e6e8a3aef1fde3c261317122b45b1b012f2a29b80e820205f80007fa3dea78f7ffdb7", 0x87}, {&(0x7f0000001980)="21db29910fcdbf92b205e3a076533c4bedb9f6ead4d6ceb2b5d32437b51a3c8142d964f93ff9d75b683b309b807751d361da530c1e66375475e2cf04669eede433b5df562fa6b7f79c4d2a7dd7a2d3485ebd29334d8ae8bb70fe55e883882fcc5d059fc287e1f0ecf23d31e7a0130a954af109621c984a30396faf64599d7367c95e66b112a0082bb7b88e61d3eefc87add71f6c00b7f45711c9e93c20dcd536cb978c49699a6581091b96592dba5833d7de5fe089d867def9ff9085ced06b2337e2f3e4153e", 0xc6}, {&(0x7f0000001a80)="74f9f83f853be3a0616f127ab89814dbdb8460e5bac8072a856debee4c3c557317485aa3ca9d26a68aa4df0169b9", 0x2e}, {&(0x7f0000001ac0)="85e4c1e588bb4a61f2c40bf1440a5002f54f5f28978972f3b940bb3dbadf073857537c0a7a36e71e4928de36f93035cc98e447ed5c86204a732d48d7745a90968ad4e8b7e98f7b2f52ee2109f84686a410533505a47cbbd3a3af30107b6c64bed5f6a0488f0305e18d51b9866eb7e8c7b71ead2d9deedef02e1f7a9c003f96412707875a11913b4dc8b21f337a81a3b3dece93f09228ff1a9ab2b5b8cbea0b1e579a0d", 0xa3}, {&(0x7f0000001b80)="915feed0c1c98de6a8cecbfc64d66ac756b28a9ef1ec3f90918dcb212cee4ffaafdf84807822f1898380db5cc6913426b514de276b9d6930c67c1306cd1484b3b7b1570e4a06eed692cc4eee60168a829a92d76c1d7dbdfdf41b5f8ba162b37edeeeca4d35fd447af9914ba5bf2b710687005ac12427222a23b4e5f4852e4720c6a5621ebbf32913b805781adfd81a6ea605057c82b7f9a7e2b33b231f360d3ac2475e8b3f731c250ba3882c6f689f09b0dbaf526dc5e89fd506a1c70102cbc658e465b27cf0a22e72485f4c49dc937cbdfccb61288839238b0cfe6c38eaafe0c843ea", 0xe3}, {&(0x7f0000001c80)="f7697ac7dda87fd82e736b8e5ae7185688ef6473b7456c80d4c5dddf71c9596db06838369b2e3ce0a59ba0ba933c5ba985fee4fdb64f8594a3c8ccf6741180e1d932cdc2746c34378399ecb941a118c2532b", 0x52}, {&(0x7f0000001d00)="35fa3af8fd841bc5f0c873c820e854dde7f4ca9b318bd61e57c53e5e009f7b086fcb354c551926dc410783fec6198b758c45fa958b5d3ecf53269cdb3d798a1619752b4ea9e87ae46f006aa5509f1dad2579c111e78235b7dcd6530805ee3d655dd4a7df44f313f1f3c8bf0d6dbf2a0edeedbd5cb4c5672660f5f897e4c890874a12f823e96ba2a0bb44b1d039a1ca5501ef988c3eb9112420f037cfaa66c99cdc56c4127b9a0624aa9821b86ef024f1455a9571cf2a3c7032458cac88ff059bc55f6868aaa2be7c7bf1109d0f9375c6ed4b11fd8f99818ea1d9d4da15270d2c3c77cbe4ab", 0xe5}, {&(0x7f0000001e00)="4cc2c9616dc59b1b647c22", 0xb}, {&(0x7f0000001e40)="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", 0x1000}, {&(0x7f0000002e40)="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", 0x1000}], 0xa, &(0x7f0000003f00)=[@dstopts={{0xb8, 0x29, 0x37, {0x4, 0x13, '\x00', [@ra={0x5, 0x2, 0x1}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @generic={0x81, 0x7f, "784549ea93a6ebb2308e8e50dbbcfdc48788bb8150a61c0aa1de2f0c70c89caf9a76e5a81979838fd31f42ae77dfbec4d873c67e35397dcbd69c9a873f7f87338ac7a373506979977c28d0a88d4bb052da1ceba9cf5785247afe2964efc01fce474dcbfbed268c9706a5f29aa60ca06877f4360620a0be61a88edad33d7c7a"}, @hao={0xc9, 0x10, @local}]}}}, @dstopts_2292={{0xa8, 0x29, 0x4, {0x89, 0x12, '\x00', [@generic={0x0, 0x4b, "30c60959abb1f9131701a8843e810172c50db8e558556f8fae9f86f6448ac3a7d0f8cb7b82bd391268c6f5d54e98b956583ab12f054b478962bccaee60571da134bd502ce1aea493a57902"}, @generic={0x6, 0x26, "e2e39fffb08d7edbd61607eced0ac0b66a78bb96f830da237ea03250057d3181f8b9d43fa573"}, @pad1, @jumbo={0xc2, 0x4, 0xffff7fff}, @hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}]}}}, @rthdr_2292={{0x88, 0x29, 0x39, {0x67, 0xe, 0x0, 0x6, 0x0, [@dev={0xfe, 0x80, '\x00', 0x9}, @dev={0xfe, 0x80, '\x00', 0xb}, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, @loopback]}}}, @dstopts={{0x98, 0x29, 0x37, {0x1d, 0xf, '\x00', [@enc_lim={0x4, 0x1, 0x4}, @enc_lim={0x4, 0x1, 0x1c}, @generic={0x81, 0x42, "d8c4beb4c69ab7b552785bf827175b38ce341adeb87282d6971a8330d76115631b6c820b7985a0d7d5e74968148b0dbb5bdbee08cd082ec613b581cbf93fc3f3a53d"}, @padn={0x1, 0x1, [0x0]}, @enc_lim={0x4, 0x1, 0x3f}, @hao={0xc9, 0x10, @private1}, @enc_lim={0x4, 0x1, 0x40}, @ra={0x5, 0x2, 0x8}, @hao={0xc9, 0x10, @mcast1}, @ra={0x5, 0x2, 0xffff}]}}}, @rthdr={{0x18, 0x29, 0x39, {0x8, 0x0, 0x1, 0x1}}}, @dstopts_2292={{0x48, 0x29, 0x4, {0x21, 0x5, '\x00', [@hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x37}}, @padn={0x1, 0x1, [0x0]}, @pad1]}}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0x73, 0x2, '\x00', [@jumbo={0xc2, 0x4, 0xff}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @rthdr={{0x48, 0x29, 0x39, {0x88, 0x6, 0x2, 0x2, 0x0, [@private0={0xfc, 0x0, '\x00', 0x1}, @private0, @private1]}}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x2b, 0x0, '\x00', [@pad1]}}}, @hopopts_2292={{0x28, 0x29, 0x36, {0x87, 0x1, '\x00', [@pad1, @enc_lim={0x4, 0x1, 0x8}, @pad1]}}}], 0x3a0}}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f00000042c0)="c8ee684825ce45ea6a6f1eb4caf99a46b859c48d5b6c24b1ebe687e85c74ec5b03f2d8bb7040e7846f270266a55278e4d1e7b3bef2af18081d6242f66561d0fbd34e3cf0b27327fe142bad773e5f3e9e1aacae79bd847de2a046ab40199c34d858230b4612f7a232ba93dea69dc51a1cdc3120e7e0373e8685bb2f6ef9f64431a4e24d644f65fd905907c6abcb57ba2fa2904ad3abf64c8096faf5ec34cd9f9c8007c0bbf5", 0xa5}], 0x1, &(0x7f00000043c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x200}}, @rthdr={{0x68, 0x29, 0x39, {0x67, 0xa, 0x1, 0x9, 0x0, [@mcast1, @private2={0xfc, 0x2, '\x00', 0x1}, @private0={0xfc, 0x0, '\x00', 0x1}, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x2}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0x4, 0x3, '\x00', [@jumbo={0xc2, 0x4, 0xffff}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x89, 0x4, 0x1, 0x80, 0x0, [@local, @private0={0xfc, 0x0, '\x00', 0x1}]}}}], 0x100}}, {{&(0x7f00000044c0)={0xa, 0x4e20, 0x29, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x11}}, 0x7}, 0x1c, &(0x7f00000055c0)=[{&(0x7f0000004500)="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", 0x1000}, {&(0x7f0000005500)="9e23954656a1618221e3e862a5ea7152938a881d2036a801f55fd357f8ca918e6056b94dec272bcda284d6e3cbc9c7d7e1efbfede35be72c09c6cbc16d85052931a6c470b495e2a142962e61eda15e3c6f3ac5a98c803a2a556adab73e9262f7cedd2c9babdbb10030f9feaf6a158993eda8619a077ab4ad83503cae687fd38ea6d038b4cdcbe9530dad29", 0x8b}], 0x2, &(0x7f0000005600)=[@tclass={{0x14, 0x29, 0x43, 0x3}}, @hopopts={{0xa8, 0x29, 0x36, {0xff, 0x11, '\x00', [@calipso={0x7, 0x30, {0x0, 0xa, 0x5, 0x9, [0x80, 0x2, 0x80000000, 0xff, 0x100000001]}}, @pad1, @hao={0xc9, 0x10, @private1}, @jumbo={0xc2, 0x4, 0x5}, @pad1, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @hao={0xc9, 0x10, @private1}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @broadcast}}, @jumbo={0xc2, 0x4, 0xf61}]}}}, @dstopts_2292={{0xe0, 0x29, 0x4, {0x2c, 0x18, '\x00', [@ra={0x5, 0x2, 0x1}, @generic={0x7f, 0x88, "001f81869ba30e23452f7cb69a25f128583da611ad9137b0d597baeb0f5b2d486ea5102638f96d348fd6c3f58ac48fe09774ce1d20673ecd0e8955b874db3e4cfa76ce6d73c71ee6a711f931e0a947b3f3fbb645332051d1f9f33c6b79cd99c919fb4c3f9060643729f75be5acf184d281b25bf12e55ddb2c81950a25409f88feb9ea4374fde4651"}, @calipso={0x7, 0x10, {0x2, 0x2, 0x8, 0x6, [0x3ff]}}, @calipso={0x7, 0x20, {0x2, 0x6, 0x1f, 0x0, [0x0, 0x5, 0x2]}}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7fd}}], 0x1b8}}, {{&(0x7f00000057c0)={0xa, 0x4e21, 0x3, @private1, 0x2}, 0x1c, &(0x7f0000005d80)=[{&(0x7f0000005800)="1aeb83fb4b6c5d9b493f838332be506e5eb05c7291c00c82d28f777e6c76ab5b2c568435c33e14f5f1ddf60de06880fd2a3a83c06c5fdb84dddbccfa80a94597bc42f14f948d1828ce9907deef4365a55b0f9dbca750566363b40006adc6db0ae9d1856f78b947328c215b9d5d89f353bc093d5850d3412b6897db5e5c30a473e55c82115ca221cf8f29ed52440921efc58ee344470cd7bf2757589526bbf52cbfa1870734fe3c360156b66012bd540877f8716435e9a57ed79a4c3ad56ca95a4690e5fb22781f123f8c74f27b39605f48d6938e40ba1eda0bbbe61bedc97f5529a2", 0xe2}, {&(0x7f0000005900)="a0b0c546b0422d5a3352e69d889bae629fbecfd39e574c5a892db75f76aaf77f0b31c1f516ac00bed77d70fb02e8773ff8a7dd05673850313590fed1c5103a869ba0c3a6120227c844de49371cf2fd87d1117f5e0fdf95d29add706b17b4d46e9bddf91dadb1686236b5ed0585ef6286e80175ec9866123637c6078f437c1b5d890607ba8b38eba0b1ce2c4aee485f673e98cf32aba2e23800981699ec86f4f275c46a84a53dec0bed6755487c176e20b7cf6a3d353a138b3e77567f9c52d8cf0c9cb7569c2575b58ef9c23b49f7407b0f3c8830782424d3dadb3baf89f1a344de3058", 0xe3}, {&(0x7f0000005a00)="926df6be7a543acd5075f012e92c3ad8b482dc9e97883f31783b323ff05cbe16d74a42a7311d43f3408eec9940b0e5547a7d3879a4939109ef703f33c2ecac862296776182d8b10ca3dd67f6535c305354", 0x51}, {&(0x7f0000005a80)="75d7ef97c7e419d36ac571eaec45f3718a3b70a037369d5effc82504b5a6203b96ac31b1c5d2039803ad75ab2968fb00c9accbffb78ae6ff29e145a3f9e2b219cfd888803bcfe4844ab5701b98d087a6", 0x50}, {&(0x7f0000005b00)="b50ddb690cd997310aa5624b0dfa83ce230b9d7c3389ad29b8834ab9fec3511cacf354cdfaa14550a0be96518424973accacfb39e09e0345132957f0e3d3661d58f929256fff6c57a2d33b9199e394c1b86ff9c242c8aa8c1582aec62d9844ede14176860a98ef4d31adc21269a3d7d74b2af297bfa112198c1dbda4cc64266c84798513f16748b4533d933f6f67d3a44b273eca229b9667456737d240f09d05f53ed915bd0b5d38e65c8f3fd2a813bdad2f1cfc7a35dfd123cf8d5f85994c6a7ed88103f3de25ab8dd8b5c4489b2cd9aa84d7e662a5b00a525ee8f907d81e47df146590d26ba104c205b3", 0xeb}, {&(0x7f0000005c00)="3f56c37fc2bba8f53f8e4662d15f2315d1c100bf3377c289b2edc04ccd618577eac8263ba97b2cb2eb9a58d2e94094451775cbabddaefb91988cbe8b1d272a69db05f11a8e31c7174ef6b902f54b3e8aaa879c5295fcafcc3669584a601ef8", 0x5f}, {&(0x7f0000005c80)="38b682302d2a8aa542438409bee3d1dc201fad929275744c6e4e8346dcc685cae1d3b73af18e3e2d3a3c9a2a68b220ef456ce2c201fcd74c2d185c35fa4b007845538621cb48036d2a09cb8c02abb0cae4c6377b535313bb8b1941130df0798fa83a1d0a6e2fdeaeca54524dba26e2e00e221f2fe6a670b885a5ab2cf70ed87ee2b90ac0f4509c3c82d71a5df666df1f1938707026138a0484d097619d9b6a273750539853be172827587d14188b114cfaa0e6b90f052693e2468822d5fa046988e5d906e187fb9cd905403febc0e78bff5cd9077bf5d8f04ffff324d64176c93a9e", 0xe2}], 0x7, &(0x7f0000005e00)=[@rthdr={{0x88, 0x29, 0x39, {0x0, 0xe, 0x0, 0x0, 0x0, [@private1, @ipv4={'\x00', '\xff\xff', @broadcast}, @private0={0xfc, 0x0, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, @loopback, @ipv4={'\x00', '\xff\xff', @broadcast}]}}}, @dstopts={{0x58, 0x29, 0x37, {0x2e, 0x7, '\x00', [@pad1, @pad1, @jumbo={0xc2, 0x4, 0x7ff}, @enc_lim={0x4, 0x1, 0xff}, @calipso={0x7, 0x28, {0x2, 0x8, 0x3f, 0x401, [0x400, 0x4, 0x34, 0x100]}}]}}}, @rthdr={{0x78, 0x29, 0x39, {0x32, 0xc, 0x1, 0x2, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private0={0xfc, 0x0, '\x00', 0x1}, @private2]}}}, @dstopts_2292={{0xc8, 0x29, 0x4, {0x2f, 0x15, '\x00', [@enc_lim={0x4, 0x1, 0x8}, @calipso={0x7, 0x30, {0x0, 0xa, 0xf, 0x80, [0x2, 0x71ac, 0x6b, 0x4, 0xfffffffffffffffb]}}, @generic={0x1, 0x74, "8fca88da1899910fd7433cad2b002b4f38f8fafdf48956dd9f2e80e053adc94a68bd397c302df85a8038aa839a36a454c2fbd823edd813ebf5e3faa3f951fd9ed08a577e2e7885079a8f4c41f65fb46734e523d71cb67da0c46c9773b4cb5cb8ede032eae534d44d4c6769c92b2d99e0e11cccaa"}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xffffffff}}, @tclass={{0x14, 0x29, 0x43, 0xff80000}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x87, 0x2, 0x1, 0x40, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x1ff}}], 0x290}}, {{&(0x7f00000060c0)={0xa, 0x4e24, 0x96b, @mcast1, 0x10001}, 0x1c, &(0x7f00000074c0)=[{&(0x7f0000006100)="45c39197c0b07d8a97432ba92efa45a219357594eff07ed355e61f7806eaaccfafc9cbca489a831bd440825fc252d60453769e0c57e19b4583075fa65bef0e9c9e1b949f473c4bcadc1d8243b5608fedc0efba38b3c97f48694f383085fbe69a9695671bc1a63138823ff77cd422c77dd5c48d7c27994139", 0x78}, {&(0x7f0000006180)="2e18eadce4d0d3285660f9c4fcc4829e962b03df0f761765b978e2e1a10b4219e6afb45a59bb644ee5f11b4f391e3f7af881833e0ad10820c0f1504fdbc311261e1e3596ef37e3bd2548f5774a85b9cce971c306dee7b113eb34b42f83a96c7b4128877757749af9375a4b23c98c5a8ce4190780418aeb1864daf5d03a35e995bf7887da1607cf5bfe1d843fb024c11d92bb721e7281a62bea082f2973abd0e2d1ea9595aa12afa2dd", 0xa9}, {&(0x7f0000006240)="f81752c648b640ca1b7c01a7259c675baabf33bd91bc4fba92f5e674cc17589b79167cc75c7c9e39862cbc96f197b00847f3182273becb7719b28af9e4800ccc135426ca099b419dbfebd236c781d20c42dc3236f5008bbb1739020d4cf83d36a2283586f2908890ea9ff137aa976ae191e2cbb4270abbcd68", 0x79}, {&(0x7f00000062c0)="f7c84f251d4f37424535e8ac5556b0eda4c3914acf1a72ec4442ea4078870135191a7189fa5e5d48ca72e0306e1324bbd1103ed871ed7f0aca88424e5d5c152a98f3ce447bc59fcc30a85c6c9a2f915177d81fb8bb3d4026e99c07e8b22c6f1fedb1275d390361162fa059a4a7c10155e43e4dc2943fbc30b8c792151f26a0e9ccf9fdced09357adc4bab005eef254222f65b83e95e6cf9c15c076c08750ae1e675424c10e61a0bf74deb30789010768b7", 0xb1}, {&(0x7f0000006380)="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", 0x1000}, {&(0x7f0000007380)="f13b41761cb60479269ee63e6d919eeb54582cdcf8477ea8fd58eed74209a78d5e089d50736114726107d57a210d6a68603ed3cc1673d6caa97c46ec595fda662811a4737dec2be39f577be35fddecb05fc66acab30e058bddb3ae7c2e442efcff143860d130beed2070e67ee548c6da741b5b70dd34273e5ef7a2313a334afc8f51a054f4007dbdedc1f88abb25a4716498d0d5d8eab63c91f3dda6a5408f37354ed7926761a307de7b999f4fcf63dcd238c33681207669434f5915e9d6205d60df804a14117919a7230fb65399de8c318ffa56646c07f4de86b155560ba66d5046cf77d5573a22131d6500d01c", 0xee}, {&(0x7f0000007480)="63e9a7bb96fde014da0e45dcd4f4f45c41b3845bdd28fecc8dfab956a9434e0f24da67e654b4daab039fed96876865bd4d490d", 0x33}], 0x7}}, {{&(0x7f0000007540)={0xa, 0x4e21, 0x6b, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x80000000}, 0x1c, &(0x7f0000007680)=[{&(0x7f0000007580)="96a678aa7f6e7d54fd7b11e03407ea6a2631c6636cae958cdfb43f9cb98626c156f4b6c394e974eba568a5b2084dc08003bac7fa92bf0615b38af116b2982f13900278c9bd995a0a3eb429e3335ec28d7ceaa1889574e376a2df63fdbf836c2716fdcdfd646ca1d4102835e2c6c54c6a20b74a5ca591c9cb7ddcad3c7d77780e4a3b1d184ccb7bbf9746bbc6ae66c09e1084d21f11036c29de956a1034a2b194d4733f95f23d3eb2ce1395e4ac867ed5179ad92eb9940c6a9cfcfac064124a14aecd6287f2ec15796d205af4655ff8208579", 0xd2}], 0x1, &(0x7f00000076c0)=[@rthdr={{0x48, 0x29, 0x39, {0x16, 0x6, 0x1, 0x3f, 0x0, [@private2, @empty, @remote]}}}, @dstopts={{0x158, 0x29, 0x37, {0x0, 0x27, '\x00', [@hao={0xc9, 0x10, @remote}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @generic={0x1f, 0xd2, "278743327fd6299ae30a8c7bc2f19971a9becb1932165a5ba5d0a893c3644ec106c168d8fbbd44b7de159998fe5d50f2f1113b19c9b925695595fa24c73263f3fddae1c9fdc7e15b1475ffe962532fe6abff7ebba155c6d2b63d70dcc78d39f53a4e4056ee69889c371ba44541fbfa6480da34e258f3d0e73533e8050010371aad243b5a10d57adc6e1b40846f6814db1d1b148b4738849b27b828cbaa7790759c3cffb77f214cc6958f3a7ab4cecd278b1644357538eb8b011874676a3c0a8bcdd0a11d1d712aa762a32a98a482e553cc96"}, @ra={0x5, 0x2, 0x9}, @calipso={0x7, 0x48, {0x1, 0x10, 0x0, 0x6, [0x7fff, 0xb3, 0x5, 0x401, 0x4, 0xd2, 0x2, 0x2]}}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7fffffff}}, @dstopts={{0x88, 0x29, 0x37, {0x16, 0xd, '\x00', [@hao={0xc9, 0x10, @mcast1}, @hao={0xc9, 0x10, @private2}, @enc_lim, @calipso={0x7, 0x40, {0x3, 0xe, 0xb9, 0x2, [0x1, 0x2, 0x7ff, 0x2, 0x2, 0x800, 0x8a]}}]}}}, @rthdr_2292={{0x68, 0x29, 0x39, {0x5e, 0xa, 0x2, 0x9, 0x0, [@empty, @dev={0xfe, 0x80, '\x00', 0x2b}, @mcast2, @empty, @dev={0xfe, 0x80, '\x00', 0x25}]}}}, @dstopts={{0xc8, 0x29, 0x37, {0xc2, 0x15, '\x00', [@jumbo={0xc2, 0x4, 0x4}, @jumbo={0xc2, 0x4, 0x1}, @jumbo={0xc2, 0x4, 0x6}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo, @jumbo={0xc2, 0x4, 0x32d}, @generic={0x3, 0x4e, "5a9be8a2b5acdf48b1f04d601363dd7e48df3acdab938ca9f8245879325066e92d24dcd6c0ed24d932c0ca776973b6ac12660f810fb5e004fc5121193e1bd630db5b9a55e77973fa1fc893394381"}, @ra={0x5, 0x2, 0x8001}, @calipso={0x7, 0x30, {0x0, 0xa, 0xfa, 0x5, [0x20, 0x3, 0x6, 0x7fff, 0x7]}}]}}}], 0x388}}, {{0x0, 0x0, &(0x7f0000007bc0)=[{&(0x7f0000007a80)="f61968cc70ea4a9039f69c7e72aed6cbf3b5c4bb26df692d526a6b06c1aca7f7310181e570339b8df5428fe9f2fd3e375fcec4f7260eb758c8d6808a3f0c92bacb9626635db5e36386cd17112aacf4521f811fefe87f0b7c13ad6f65177193354d4e849a7f6b578d35", 0x69}, {&(0x7f0000007b00)="9509cb3ddbddd491f1ce03727dbb49307e966de823336bde27d0cffa2a7bf892a4bd23d47757bef5304fb0c5", 0x2c}, {&(0x7f0000007b40)="27ef24b7cc7b6186d35e37218999f4b53208e60a79ea7266fb67d9a700e8558daea92be5fdf21199841c4b4006ddeeeadf39f4a10502fcf91111177c041b60d007032c3ba0838bd6ed87699070055be84f6bf79307e791a2e442d631423a3040c2946ca63e699e05eb8d4779b6fe8aa665d1a043013cc0be00644790", 0x7c}], 0x3, &(0x7f0000007c80)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}, @rthdrdstopts={{0xd8, 0x29, 0x37, {0x87, 0x17, '\x00', [@hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x18}}, @generic={0x2, 0x8c, "5e669904925f45fb7e1dcc21012623b1fd93fa211eb357eb1215d0dd045e7e7f1cb279c00d4612cd05c50d4d2c3b677d61cc294e55e9f5b348efe68a2bf3d1bf9f935cb640c5ac87b2bbed3a6be4ecf9a4e8e1cce28c0a13f8ae788c6c588f28639f375adca7be1681907e6756dbae7e7bb135b2c64c665e9e4f12a505299db3770cfd8533d194bd25af32d7"}, @hao={0xc9, 0x10, @mcast1}, @enc_lim={0x4, 0x1, 0x9}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @rthdrdstopts={{0x118, 0x29, 0x37, {0x63, 0x1f, '\x00', [@hao={0xc9, 0x10, @mcast1}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x3, 0xca, "652ec3ad864b0c766e2e1e62967f8de8e938ac4f39981b70dea87ec7be7597fbbaa4a4f66fa6d2b5bf7953e6ef89989bd03ca67d95acfcdd57233a32fb831024a89fcfcd0fb1f85f79d8c9eac40247d0c2a737f6eb99eb0c8948354ee32d0fea03456b447c812a80dc8ce0b012ccdc08602ad9c86f4e54082e39aa7548c91056a9163e7ff5e899f87bd209531bd0aab437955417969daa79f1686f9b266d4c95d5eca033c2ebbf1189b13292f3a4526dbe615722989dcdc3449fefc90d728be96d4f6c0753b368a0129d"}, @hao={0xc9, 0x10, @loopback}, @ra={0x5, 0x2, 0x71}]}}}, @hopopts_2292={{0x28, 0x29, 0x36, {0x62, 0x2, '\x00', [@enc_lim={0x4, 0x1, 0x4}, @calipso={0x7, 0x8, {0x0, 0x0, 0x4}}, @enc_lim={0x4, 0x1, 0x7}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@local, r0}}}, @dstopts_2292={{0x140, 0x29, 0x4, {0x6c, 0x24, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @generic={0xd4, 0x27, "dc9f6ab536441205e244a4e6a06575805148524e2254a4c4c759fd7031308f758aba1ce07237b2"}, @enc_lim={0x4, 0x1, 0x80}, @generic={0x0, 0x52, "7cea4fc6505454724d2caaf6a2ed7ea0d29d2b2d77251470491a4308ffb122c0941fe2776df88c82db93078faa68b25090c9ed3a0ebdd9376ca37bbf5c024c945b130e5ba89e017b809d26270b472935a80a"}, @enc_lim={0x4, 0x1, 0x40}, @pad1, @generic={0x5, 0x8b, "328bd85643f0374c8fdd14ae0dabb29ea048fe6d492a2504aa7b967ed4597976ee3fd9bdbbbc8525dcb48e0e9106e97a76c88a114435889d6374855f508d1be83cf8ec550966f0323b80441f835b43221882fa55829eb312e0677a84f4d6e2e66e37425c58a4bbbd86fc2dbd11708c2b2ddd1ea03111c406ad1071ff735cf445dd0037a7c59248e4654314"}]}}}, @rthdr={{0x38, 0x29, 0x39, {0x6c, 0x4, 0x0, 0x50, 0x0, [@dev={0xfe, 0x80, '\x00', 0xa}, @mcast2]}}}], 0x3d0}}, {{0x0, 0x0, &(0x7f0000008280)=[{&(0x7f0000008080)="07c1c0aa09b25ccfe23d5c85d8fa303b09ee7e7b1cf3ebecbc102bedbf3a", 0x1e}, {&(0x7f00000080c0)="d8800e73c967f790275217398524576590a7b4031f3592cdfedf0b7248ce0dfbac0d33dcf81faae6d13d27d41c13a53236bef03f868ac1376fd62c04adc76759c1e518133ceb221ff9977768a584fd61b4e1d74abe46365a80cf1ae8fb8b676d52f448f793f48e6671bdba31cc24ab3b80dbe3e664b17e91ca5e8904a7474a0f9fa59a6f", 0x84}, {&(0x7f0000008180)="5bd4af9492a2ddbd511e88c1074c08c80e8721624d6ece375d77f584c5769d1553331b629fdaebb7a55c2ac16d63b49572bff8c65fd84c606f5e814c4710f9af1602e79c7ab47810b9164e7b7254fe542a12c93d6fa1a79bdc09a3c2665c5299962578ceb2fbf76a369099b5ad864c14d80919fcf08e31744d0fd1c31f029451613d6274400d5dcc49499fd90ce3fb978706b10d341af75b0a646af8ea4f69ad1af98258b24543195f77965cf92d4c741c33fde81e760a914605d4ea1db7ab9f31818a1a34035eea27ede0c890813477a5fb8c9f06130e364ef27dcf11597b206ec6244bda44fdd8fbc86502a39f31f609e70ee3e23d134ee0", 0xf9}], 0x3, &(0x7f00000082c0)=[@dontfrag={{0x14, 0x29, 0x3e, 0xffffffff}}, @hoplimit={{0x14, 0x29, 0x34, 0x6}}, @dstopts={{0x30, 0x29, 0x37, {0x3b, 0x2, '\x00', [@calipso={0x7, 0x10, {0x2, 0x2, 0x3f, 0xf29d, [0x8]}}, @padn={0x1, 0x2, [0x0, 0x0]}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x6}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x1d, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x81}, @ra={0x5, 0x2, 0x1}]}}}, @rthdrdstopts={{0x118, 0x29, 0x37, {0x67, 0x1f, '\x00', [@enc_lim={0x4, 0x1, 0x6}, @generic={0x3b, 0xf3, "957e7ec278db04c2b5f65553ac75fb6f0c68f761bd77d44db85ed9deb6296df0028e6993ecd1fac7c8279946a2a588bb1de70423f5999d4d3387d6f1b0755f7e8ef91d651ced227a5dbaf00754cb7ede634adb1f229f0f56fc2eb179b9d6e34fb11380c480f1dd08a368b05d6f4a54aca9e2c2a7fb5391f878c59ff813c6242a6b74c6f5a781ef47ec481e4ed29794a852f98408fc42fbc34917c8470ee200f5e245849ed4c999153bc4a628a468739b512f4b38b3e56d5ee8edcac91fcd322d3f113d51c70a8f06abf0b3bd2e1a978433af7aa51b5dc8521199cb5933419c1558a7727c03b956fdfc39b47b99261493083779"}, @pad1, @padn={0x1, 0x2, [0x0, 0x0]}]}}}], 0x1c8}}], 0x9, 0x20000040) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) getsockopt$inet6_buf(r1, 0x29, 0x2a, &(0x7f0000008740)=""/9, &(0x7f0000008780)=0x9) 00:21:17 executing program 2: syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:17 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r2 = getuid() setreuid(r1, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) accept$packet(r3, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000ec0)={0x23c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000e669595e3a847e5804bf52e656452b2aa4a4c0564c506188ed35b066b6bdee702fcbf2b621c3a7f64fa7f33b0acb3def5e6838b4bf13ccd554a1e23f7371d313324f8ddced8079af82e68f96c8c3eb", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf251600000005000300000000000c00018008000300010000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0500030000000000050003000000000005000200000000000500030001000000050003000000000005000200010000000500040001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20008080}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0}, &(0x7f0000000480)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f00000004c0)={'ip_vti0\x00', r0, 0x8, 0x20, 0x10000, 0xd16, {{0x22, 0x4, 0x1, 0x0, 0x88, 0x64, 0x0, 0xe, 0x29, 0x0, @empty, @empty, {[@generic={0xda, 0x11, "275a8b0672316c638bc224fad0209f"}, @noop, @timestamp_addr={0x44, 0xc, 0x9c, 0x1, 0x6, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x9}]}, @noop, @generic={0x86, 0x3, 'j'}, @end, @timestamp={0x44, 0x1c, 0x1f, 0x0, 0x3, [0x3f, 0x7, 0x7, 0x80, 0xfffffff8, 0x3]}, @timestamp_prespec={0x44, 0x34, 0xab, 0x3, 0x3, [{@dev={0xac, 0x14, 0x14, 0x28}, 0x2}, {@broadcast, 0x5}, {@local, 0x10000}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@broadcast, 0x20}, {@remote, 0x3f}]}]}}}}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@private2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={""/10, ""/2, @multicast1}}}, &(0x7f00000006c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000740)=0x14, 0x80800) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x110, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x20000084}, 0x10) r11 = socket$packet(0x11, 0x0, 0x300) bind$packet(r11, &(0x7f0000000140)={0x11, 0x1, 0x0, 0x1, 0x7f}, 0x14) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x8814) 00:21:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 00:21:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x1, 0x3, 0x1}]}) 00:21:17 executing program 3: r0 = io_uring_setup(0x7da7, &(0x7f0000000000)={0x0, 0x8013, 0x4, 0x200, 0x2df}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000001, 0x30, r0, 0x0) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:17 executing program 1: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000100)='devices.deny\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000240), 0x2, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) r1 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x6, 0x0, &(0x7f0000000100), 0x210040, &(0x7f0000000140)={[{':-!-)/'}, {'/-{\\}{(-1@)%)#'}], [{@euid_lt={'euid<', 0xee00}}]}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000180)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000001c0)) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000280)=ANY=[@ANYBLOB="2c02000000000000c910fe880000000000000035718d95113391b712b8ff62a38e00000000000101000100000000"], 0x20) 00:21:17 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r2 = getuid() setreuid(r1, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) accept$packet(r3, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000ec0)={0x23c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000e669595e3a847e5804bf52e656452b2aa4a4c0564c506188ed35b066b6bdee702fcbf2b621c3a7f64fa7f33b0acb3def5e6838b4bf13ccd554a1e23f7371d313324f8ddced8079af82e68f96c8c3eb", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf251600000005000300000000000c00018008000300010000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0500030000000000050003000000000005000200000000000500030001000000050003000000000005000200010000000500040001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20008080}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0}, &(0x7f0000000480)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f00000004c0)={'ip_vti0\x00', r0, 0x8, 0x20, 0x10000, 0xd16, {{0x22, 0x4, 0x1, 0x0, 0x88, 0x64, 0x0, 0xe, 0x29, 0x0, @empty, @empty, {[@generic={0xda, 0x11, "275a8b0672316c638bc224fad0209f"}, @noop, @timestamp_addr={0x44, 0xc, 0x9c, 0x1, 0x6, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x9}]}, @noop, @generic={0x86, 0x3, 'j'}, @end, @timestamp={0x44, 0x1c, 0x1f, 0x0, 0x3, [0x3f, 0x7, 0x7, 0x80, 0xfffffff8, 0x3]}, @timestamp_prespec={0x44, 0x34, 0xab, 0x3, 0x3, [{@dev={0xac, 0x14, 0x14, 0x28}, 0x2}, {@broadcast, 0x5}, {@local, 0x10000}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@broadcast, 0x20}, {@remote, 0x3f}]}]}}}}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@private2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={""/10, ""/2, @multicast1}}}, &(0x7f00000006c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000740)=0x14, 0x80800) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x110, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x20000084}, 0x10) r11 = socket$packet(0x11, 0x0, 0x300) bind$packet(r11, &(0x7f0000000140)={0x11, 0x1, 0x0, 0x1, 0x7f}, 0x14) 00:21:17 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x1, 0x3, 0x1}]}) 00:21:17 executing program 2: syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) [ 716.893571][ T25] audit: type=1326 audit(1622679677.568:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8634 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 [ 716.968015][ T8660] nfs: Unknown parameter ':-!-)/' 00:21:18 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x220000, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x100, 0xec, 0xff, 0x80000000}, {0x2, 0x5, 0x7, 0x7}, {0x81, 0x3f, 0x3f, 0x16}, {0x6, 0x68, 0xf9, 0x1}, {0x0, 0xf, 0x13, 0x4}]}) pselect6(0x40, &(0x7f00000000c0)={0x3, 0x4, 0x0, 0x7ff, 0x4, 0x1ff, 0x1, 0x800}, &(0x7f0000000240)={0x800, 0xa2, 0x2, 0x7f, 0x80000001, 0xffff, 0x5, 0x7ff}, &(0x7f0000000140)={0xc4a, 0x9, 0x3, 0xffffffff, 0xd84, 0xc, 0x8, 0x6}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:18 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[{0x4, 0x1, 0x4, 0x5}, {0xec, 0x8, 0x4, 0x30a}, {0x8558, 0x9, 0x5, 0x9}, {0xb, 0x3f, 0x73, 0x1f}, {0x6, 0x9, 0x5, 0x1}, {0x4, 0x5, 0xff, 0x1}, {0xaa14, 0x5, 0x4, 0xfffffffd}, {0xff00, 0x3, 0xfc, 0x400}]}) 00:21:18 executing program 2: r0 = io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x3d23, 0x1, 0x2, 0xc3}) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x1, 0x3, 0x1}]}) 00:21:18 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)=ANY=[@ANYBLOB="1a"]) 00:21:18 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r2 = getuid() setreuid(r1, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) accept$packet(r3, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000ec0)={0x23c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000e669595e3a847e5804bf52e656452b2aa4a4c0564c506188ed35b066b6bdee702fcbf2b621c3a7f64fa7f33b0acb3def5e6838b4bf13ccd554a1e23f7371d313324f8ddced8079af82e68f96c8c3eb", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf251600000005000300000000000c00018008000300010000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0500030000000000050003000000000005000200000000000500030001000000050003000000000005000200010000000500040001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20008080}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0}, &(0x7f0000000480)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f00000004c0)={'ip_vti0\x00', r0, 0x8, 0x20, 0x10000, 0xd16, {{0x22, 0x4, 0x1, 0x0, 0x88, 0x64, 0x0, 0xe, 0x29, 0x0, @empty, @empty, {[@generic={0xda, 0x11, "275a8b0672316c638bc224fad0209f"}, @noop, @timestamp_addr={0x44, 0xc, 0x9c, 0x1, 0x6, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x9}]}, @noop, @generic={0x86, 0x3, 'j'}, @end, @timestamp={0x44, 0x1c, 0x1f, 0x0, 0x3, [0x3f, 0x7, 0x7, 0x80, 0xfffffff8, 0x3]}, @timestamp_prespec={0x44, 0x34, 0xab, 0x3, 0x3, [{@dev={0xac, 0x14, 0x14, 0x28}, 0x2}, {@broadcast, 0x5}, {@local, 0x10000}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@broadcast, 0x20}, {@remote, 0x3f}]}]}}}}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@private2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={""/10, ""/2, @multicast1}}}, &(0x7f00000006c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000740)=0x14, 0x80800) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x110, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x20000084}, 0x10) socket$packet(0x11, 0x0, 0x300) 00:21:18 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x3, 0x1}]}) 00:21:18 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x100000001, 0x0, 0x0, 0x10bbf3f, &(0x7f0000000000)={[], [{@fowner_gt}]}) 00:21:18 executing program 3: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x800, 0x5, 0x8, 0x7}]}) syslog(0x3, &(0x7f0000000100)=""/87, 0x57) pkey_alloc(0x0, 0x5) syslog(0xa, &(0x7f00000001c0)=""/126, 0x7e) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x20, 0xdb, 0x401}, {0x8f20, 0x2, 0x3}]}) [ 717.770968][ T25] audit: type=1326 audit(1622679678.448:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8686 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:18 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r2 = getuid() setreuid(r1, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) accept$packet(r3, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000ec0)={0x23c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000e669595e3a847e5804bf52e656452b2aa4a4c0564c506188ed35b066b6bdee702fcbf2b621c3a7f64fa7f33b0acb3def5e6838b4bf13ccd554a1e23f7371d313324f8ddced8079af82e68f96c8c3eb", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf251600000005000300000000000c00018008000300010000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0500030000000000050003000000000005000200000000000500030001000000050003000000000005000200010000000500040001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20008080}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0}, &(0x7f0000000480)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f00000004c0)={'ip_vti0\x00', r0, 0x8, 0x20, 0x10000, 0xd16, {{0x22, 0x4, 0x1, 0x0, 0x88, 0x64, 0x0, 0xe, 0x29, 0x0, @empty, @empty, {[@generic={0xda, 0x11, "275a8b0672316c638bc224fad0209f"}, @noop, @timestamp_addr={0x44, 0xc, 0x9c, 0x1, 0x6, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x9}]}, @noop, @generic={0x86, 0x3, 'j'}, @end, @timestamp={0x44, 0x1c, 0x1f, 0x0, 0x3, [0x3f, 0x7, 0x7, 0x80, 0xfffffff8, 0x3]}, @timestamp_prespec={0x44, 0x34, 0xab, 0x3, 0x3, [{@dev={0xac, 0x14, 0x14, 0x28}, 0x2}, {@broadcast, 0x5}, {@local, 0x10000}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@broadcast, 0x20}, {@remote, 0x3f}]}]}}}}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@private2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={""/10, ""/2, @multicast1}}}, &(0x7f00000006c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000740)=0x14, 0x80800) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x110, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x20000084}, 0x10) 00:21:18 executing program 2: r0 = io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x3d23, 0x1, 0x2, 0xc3}) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:18 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000000)='.\x00', 0x80000000000000, 0x0, 0x0, 0x10000a0, &(0x7f0000000880)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES16, @ANYBLOB="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", @ANYRESDEC, @ANYBLOB="15175901c52f4a2c5f0c1e6584e86717120f56a1be1a813a3b9a852190f8075dced38ae7c3831c73840d7bafad38b2b4deb0898e99278d31440341e5629e95e1c90b752bc3ce70b0d78c9be0736cc02f6a7d920d4511a0875a90b0dea305820d8337789600211b773bc7aea2d23b7abc7323e4632d16ad6ecfffe28c497d8df927a2ee109abb4732d425095f0280dba6d7d765a711ee5ecd36a474634b8de4c012e2a280da15f0fb22fa146b324747934120e55c26f88dfd1abc6a0c4fa377b8e5677102c0a1c088ee2a5f6ce91cbfe5cdb3c8d396ba81532749cc70931b6959327fe9abf321d1868853a3f59120f16cd691", @ANYBLOB="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", @ANYRESDEC, @ANYRESHEX=0x0, @ANYRESHEX]) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x412100, 0x40) name_to_handle_at(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x101, 0xe20, 0x5, 0x401, 0x1, 0x1}}, &(0x7f00000001c0), 0x400) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f00000000c0)={@id={0x2, 0x0, @c}}) personality(0x4000005) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) [ 717.840605][ T25] audit: type=1326 audit(1622679678.508:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8697 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 717.912050][ T25] audit: type=1326 audit(1622679678.548:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8699 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 [ 717.977404][ T25] audit: type=1326 audit(1622679678.658:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8699 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:19 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x220000, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x3, 0x4, 0x0, 0x7ff, 0x4, 0x1ff, 0x1, 0x800}, &(0x7f0000000240)={0x800, 0xa2, 0x2, 0x7f, 0x80000001, 0xffff, 0x5, 0x7ff}, &(0x7f0000000140)={0xc4a, 0x9, 0x3, 0xffffffff, 0xd84, 0xc, 0x8, 0x6}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x1}]}) 00:21:19 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r2 = getuid() setreuid(r1, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) accept$packet(r3, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000ec0)={0x23c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000e669595e3a847e5804bf52e656452b2aa4a4c0564c506188ed35b066b6bdee702fcbf2b621c3a7f64fa7f33b0acb3def5e6838b4bf13ccd554a1e23f7371d313324f8ddced8079af82e68f96c8c3eb", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf251600000005000300000000000c00018008000300010000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0500030000000000050003000000000005000200000000000500030001000000050003000000000005000200010000000500040001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20008080}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000480)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f00000004c0)={'ip_vti0\x00', r0, 0x8, 0x20, 0x10000, 0xd16, {{0x22, 0x4, 0x1, 0x0, 0x88, 0x64, 0x0, 0xe, 0x29, 0x0, @empty, @empty, {[@generic={0xda, 0x11, "275a8b0672316c638bc224fad0209f"}, @noop, @timestamp_addr={0x44, 0xc, 0x9c, 0x1, 0x6, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x9}]}, @noop, @generic={0x86, 0x3, 'j'}, @end, @timestamp={0x44, 0x1c, 0x1f, 0x0, 0x3, [0x3f, 0x7, 0x7, 0x80, 0xfffffff8, 0x3]}, @timestamp_prespec={0x44, 0x34, 0xab, 0x3, 0x3, [{@dev={0xac, 0x14, 0x14, 0x28}, 0x2}, {@broadcast, 0x5}, {@local, 0x10000}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@broadcast, 0x20}, {@remote, 0x3f}]}]}}}}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@private2, @in6=@empty}}, {{@in=@empty}, 0x0, @in6=@ipv4={""/10, ""/2, @multicast1}}}, &(0x7f00000006c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000740)=0x14, 0x80800) 00:21:19 executing program 2: r0 = io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x3d23, 0x1, 0x2, 0xc3}) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:19 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x22feff9, &(0x7f0000000000)={[{@huge_advise}]}) 00:21:19 executing program 5: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x3, 0x4, 0x0, 0x7ff, 0x4, 0x1ff, 0x1, 0x800}, &(0x7f0000000240)={0x800, 0xa2, 0x2, 0x7f, 0x80000001, 0xffff, 0x5, 0x7ff}, &(0x7f0000000140)={0xc4a, 0x9, 0x3, 0xffffffff, 0xd84, 0xc, 0x8, 0x6}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:19 executing program 2: r0 = io_uring_setup(0x5878, 0x0) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:19 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r2 = getuid() setreuid(r1, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) accept$packet(r3, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000ec0)={0x23c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000e669595e3a847e5804bf52e656452b2aa4a4c0564c506188ed35b066b6bdee702fcbf2b621c3a7f64fa7f33b0acb3def5e6838b4bf13ccd554a1e23f7371d313324f8ddced8079af82e68f96c8c3eb", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf251600000005000300000000000c00018008000300010000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0500030000000000050003000000000005000200000000000500030001000000050003000000000005000200010000000500040001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20008080}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000480)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f00000004c0)={'ip_vti0\x00', r0, 0x8, 0x20, 0x10000, 0xd16, {{0x22, 0x4, 0x1, 0x0, 0x88, 0x64, 0x0, 0xe, 0x29, 0x0, @empty, @empty, {[@generic={0xda, 0x11, "275a8b0672316c638bc224fad0209f"}, @noop, @timestamp_addr={0x44, 0xc, 0x9c, 0x1, 0x6, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x9}]}, @noop, @generic={0x86, 0x3, 'j'}, @end, @timestamp={0x44, 0x1c, 0x1f, 0x0, 0x3, [0x3f, 0x7, 0x7, 0x80, 0xfffffff8, 0x3]}, @timestamp_prespec={0x44, 0x34, 0xab, 0x3, 0x3, [{@dev={0xac, 0x14, 0x14, 0x28}, 0x2}, {@broadcast, 0x5}, {@local, 0x10000}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@broadcast, 0x20}, {@remote, 0x3f}]}]}}}}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@private2, @in6=@empty}}, {{@in=@empty}, 0x0, @in6=@ipv4={""/10, ""/2, @multicast1}}}, &(0x7f00000006c0)=0xe8) [ 718.651409][ T25] audit: type=1326 audit(1622679679.328:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8725 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 718.675197][ T25] audit: type=1326 audit(1622679679.348:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8699 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:19 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) getcwd(&(0x7f0000000000)=""/138, 0x8a) 00:21:19 executing program 1: r0 = getegid() syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x1fffff, &(0x7f0000000000)={[{@gid={'gid', 0x3d, r0}}, {@size={'size', 0x3d, [0x37, 0x25, 0x6b, 0x6d, 0x2d]}}]}) 00:21:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 00:21:19 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r2 = getuid() setreuid(r1, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) accept$packet(r3, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000ec0)={0x23c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000e669595e3a847e5804bf52e656452b2aa4a4c0564c506188ed35b066b6bdee702fcbf2b621c3a7f64fa7f33b0acb3def5e6838b4bf13ccd554a1e23f7371d313324f8ddced8079af82e68f96c8c3eb", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf251600000005000300000000000c00018008000300010000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0500030000000000050003000000000005000200000000000500030001000000050003000000000005000200010000000500040001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20008080}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000480)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f00000004c0)={'ip_vti0\x00', r0, 0x8, 0x20, 0x10000, 0xd16, {{0x22, 0x4, 0x1, 0x0, 0x88, 0x64, 0x0, 0xe, 0x29, 0x0, @empty, @empty, {[@generic={0xda, 0x11, "275a8b0672316c638bc224fad0209f"}, @noop, @timestamp_addr={0x44, 0xc, 0x9c, 0x1, 0x6, [{@dev={0xac, 0x14, 0x14, 0xa}, 0x9}]}, @noop, @generic={0x86, 0x3, 'j'}, @end, @timestamp={0x44, 0x1c, 0x1f, 0x0, 0x3, [0x3f, 0x7, 0x7, 0x80, 0xfffffff8, 0x3]}, @timestamp_prespec={0x44, 0x34, 0xab, 0x3, 0x3, [{@dev={0xac, 0x14, 0x14, 0x28}, 0x2}, {@broadcast, 0x5}, {@local, 0x10000}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@broadcast, 0x20}, {@remote, 0x3f}]}]}}}}}) 00:21:19 executing program 2: r0 = io_uring_setup(0x5878, 0x0) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:19 executing program 5: pselect6(0x40, &(0x7f00000000c0)={0x3, 0x4, 0x0, 0x7ff, 0x4, 0x1ff, 0x1, 0x800}, &(0x7f0000000240)={0x800, 0xa2, 0x2, 0x7f, 0x80000001, 0xffff, 0x5, 0x7ff}, &(0x7f0000000140)={0xc4a, 0x9, 0x3, 0xffffffff, 0xd84, 0xc, 0x8, 0x6}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:19 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) [ 718.839508][ T25] audit: type=1326 audit(1622679679.518:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8755 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 00:21:19 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) r0 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000100)=[{&(0x7f00000005c0)="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", 0x1000}], 0x140000, &(0x7f0000000140)={[{}, {'tmpfs\x00'}, {'tmpfs\x00'}, {}, {'tmpfs\x00'}, {':/'}, {'tmpfs\x00'}], [{@permit_directio}]}) faccessat(r0, &(0x7f0000000180)='./file0\x00', 0xc0) 00:21:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 00:21:19 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r2 = getuid() setreuid(r1, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) accept$packet(r3, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000ec0)={0x23c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000e669595e3a847e5804bf52e656452b2aa4a4c0564c506188ed35b066b6bdee702fcbf2b621c3a7f64fa7f33b0acb3def5e6838b4bf13ccd554a1e23f7371d313324f8ddced8079af82e68f96c8c3eb", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf251600000005000300000000000c00018008000300010000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0500030000000000050003000000000005000200000000000500030001000000050003000000000005000200010000000500040001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20008080}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000480)=0x14) 00:21:19 executing program 2: r0 = io_uring_setup(0x5878, 0x0) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:19 executing program 5: pselect6(0x0, 0x0, &(0x7f0000000240)={0x800, 0xa2, 0x2, 0x7f, 0x80000001, 0xffff, 0x5, 0x7ff}, &(0x7f0000000140)={0xc4a, 0x9, 0x3, 0xffffffff, 0xd84, 0xc, 0x8, 0x6}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:19 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x2, 0xc3}) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:19 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xea, &(0x7f0000000000)=""/19, &(0x7f0000000040)=0x13) 00:21:19 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r2 = getuid() setreuid(r1, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) accept$packet(r3, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000ec0)={0x23c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000e669595e3a847e5804bf52e656452b2aa4a4c0564c506188ed35b066b6bdee702fcbf2b621c3a7f64fa7f33b0acb3def5e6838b4bf13ccd554a1e23f7371d313324f8ddced8079af82e68f96c8c3eb", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf251600000005000300000000000c00018008000300010000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0500030000000000050003000000000005000200000000000500030001000000050003000000000005000200010000000500040001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20008080}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) [ 718.965961][ T8778] loop1: detected capacity change from 0 to 264192 00:21:19 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0xc3}) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) [ 719.014540][ T8778] loop1: detected capacity change from 0 to 264192 00:21:19 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@xfs={0x1c, 0x81, {0x8, 0x9, 0x6, 0xffff7fff}}, &(0x7f0000000100), 0x400) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14, 0x80000) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000001c0)=@req={0x1, 0x5, 0x2, 0x89e3}, 0x10) 00:21:19 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)=0x80000000, 0x4) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) syz_open_dev$tty1(0xc, 0x4, 0x2) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 00:21:19 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r2 = getuid() setreuid(r1, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) accept$packet(r3, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000ec0)={0x23c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000e669595e3a847e5804bf52e656452b2aa4a4c0564c506188ed35b066b6bdee702fcbf2b621c3a7f64fa7f33b0acb3def5e6838b4bf13ccd554a1e23f7371d313324f8ddced8079af82e68f96c8c3eb", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf251600000005000300000000000c00018008000300010000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0500030000000000050003000000000005000200000000000500030001000000050003000000000005000200010000000500040001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20008080}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) 00:21:19 executing program 5: pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0xc4a, 0x9, 0x3, 0xffffffff, 0xd84, 0xc, 0x8, 0x6}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:19 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xc3}) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:19 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000240)={r1, 0x1, 0x4, @local}, 0x10) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) openat$cgroup(r2, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 00:21:19 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r2 = getuid() setreuid(r1, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) accept$packet(r3, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000ec0)={0x23c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6c0000e669595e3a847e5804bf52e656452b2aa4a4c0564c506188ed35b066b6bdee702fcbf2b621c3a7f64fa7f33b0acb3def5e6838b4bf13ccd554a1e23f7371d313324f8ddced8079af82e68f96c8c3eb", @ANYRES16=0x0, @ANYBLOB="02002cbd7000ffdbdf251600000005000300000000000c00018008000300010000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="0500030000000000050003000000000005000200000000000500030001000000050003000000000005000200010000000500040001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20008080}, 0x40) 00:21:19 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:19 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 00:21:19 executing program 1: sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x0, 0x800, 0x70bd2b, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}]}, 0x20}}, 0x10000004) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000180)=ANY=[@ANYBLOB="00c90394ee9d78a50da3cbab6225759716002d14fe5d4294aec48704a622fa2ea481da244dd2994001c952f6d4766e8a7785bde5a587aa6a485f9cf42f71f3f2ee3025eb8219015fcaac69a308c32853922ab60d8f7bd9330eeb4495154a699ceaea622b06585cad3446e055469dda051051f89c1f6446e934a2aeee814ac7e3720801ce512a8fd96c5e34"]) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000426bd7000fedbdf25410000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f707300000000ac9b44dbe4038693272e25fdd5143a7be4ba3ab48c3b"], 0x70}}, 0xc000) 00:21:19 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:19 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:19 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r2 = getuid() setreuid(r1, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) accept$packet(r3, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000ec0)={0x23c, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 00:21:19 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 00:21:20 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:20 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r1 = getuid() setreuid(r0, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) accept$packet(r2, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) 00:21:20 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x20, 0x7, 0x7f, 0x10000}, {0x6, 0x2, 0x7, 0x80}, {0x2, 0xa4, 0x6, 0x3f}, {0x1, 0x7, 0x1, 0x7f}]}, 0x10) 00:21:20 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff0433068bf4ec5e6ab194bf08f004c76696264aa01db8eec3a560fbe6415e841a445475b490ae690e28b876f824ff08ec6655faf2268506b799c69e565f161f376c7e42e4a3ddab871558e90123559348e0969fe02140d1435adc9358c8ec586801c4a6682812f6ec1c95aa73d6a824bffb178f044e69b24d73a4f619303795230fba1b68f3533b24af9476586ff97ed5eaf8169f55f91cdbaca70e56b5cc78390ea8bb7f901e2a947c363bef94c295a7a358aa662a6ad9a4f7eea2d76c16ceb4699c2d5442c1cdce8603687551e01c8124372dbbfab410afb315193d4229"]) 00:21:20 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 00:21:20 executing program 3: ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000000)={0x1c, 0x33, 0xf, 0xf, 0x7, 0x8, 0x5, 0x1e, 0x1}) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}}}, &(0x7f00000005c0)=0xe8) r2 = getuid() setuid(r2) syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000140)="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", 0xfa, 0xffffffff}, {&(0x7f0000000240)="2d5faa18f1d321af2fa8a1c7850d10b7304b7853bdfaaea9c9c67420851dc46d383fab1d9693633d27b9a1f0c9ef016658d7e96457817bd7c87c3c5003b398cb16d02b6c2e846aaa57ac4bafcc58177e77c0f90af04d04af911f187ae75890e7d65e4cfcacb6202b530cc52a025985b6", 0x70, 0x5}, {&(0x7f00000002c0)="72c949a44dd5f7d47f1dbfcad55a5bd194aad1783bb13762f2e1335cf010962766b08823d2b87873fb6ec716c47f8ceecfe09dec592583b3d8282ec401dfb231f169e53a3b315176510e5b9b7ea197f6af91e3cc5af8ac56c3664d9d7cc561518b9d8c9beb2eb8e165f5a3488fab8e423a7ebb4a188a34fbd024fb698503e7582a39d92e950b379f519d18967bf126a5d964dda832f2f0d22720a0df3c4efa390d7f2ecddbc753f8145df8c66f24d0db6164938e9af071a0488fdfd9d1cb74f344dca3576752a4b8b89ad7a32c57b7dc03260fc928bec1fcec6165de996b6d34c273cc164552a99d9402d46f1488fe8bb48381e3cba0c81fd2", 0xf9, 0x3}], 0x4000, &(0x7f0000000600)={[{'%'}, {'\x00'}, {}, {'\x00'}, {'!\xdc'}, {}, {'tmpfs\x00'}], [{@obj_role={'obj_role', 0x3d, '+*[{#[$+-('}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@euid_gt={'euid>', r1}}, {@uid_lt={'uid<', r2}}, {@fsname={'fsname', 0x3d, '\xd0['}}, {@appraise}, {@appraise_type}]}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) [ 719.513973][ T8875] loop1: detected capacity change from 0 to 264192 [ 719.523770][ T8875] nfs: Unknown parameter '%' [ 719.560043][ T8882] loop1: detected capacity change from 0 to 264192 [ 719.567093][ T8882] nfs: Unknown parameter '%' 00:21:20 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:20 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r1 = getuid() setreuid(r0, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) accept$packet(r2, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) 00:21:20 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0xb244, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 00:21:20 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) 00:21:20 executing program 1: io_uring_setup(0x79c, &(0x7f0000000100)={0x0, 0xe1f, 0x20, 0x3, 0x27d}) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000080)={[], [{@appraise}, {@subj_user}]}) 00:21:20 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r1 = getuid() setreuid(r0, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) accept$packet(r2, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) 00:21:20 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1008f4, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) fchownat(r0, &(0x7f0000000100)='./file0\x00', 0xee01, 0xee01, 0x400) 00:21:20 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00', 0x0}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_KEY(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r6}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}]}, 0x30}}, 0x0) sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x6c, 0x0, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_LBT_MODE={0x5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}, @NL802154_ATTR_LBT_MODE={0x5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x6c}}, 0x40000) 00:21:20 executing program 2: io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, 0x0, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 00:21:21 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r1 = getuid() setreuid(r0, r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) accept$packet(r2, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) 00:21:21 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:21 executing program 2: io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, 0x0, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:21 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x4, &(0x7f0000000100)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)={{r1, r2/1000+60000}, {r3, r4/1000+60000}}, 0x0) 00:21:21 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x8000, 0x80, 0x5, 0xe8b}, {0x621, 0x1, 0x40, 0xfffff001}, {0x79, 0x81, 0x1, 0xf0}, {0x1, 0xf8, 0x7f, 0x20}, {0x9, 0x0, 0x4, 0x10001}, {0x7, 0x7, 0x7, 0xfffffe00}, {0x1ff, 0x9, 0x1}]}, 0x10) 00:21:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 00:21:21 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r1 = getuid() setreuid(r0, r1) accept$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) 00:21:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 00:21:21 executing program 2: io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, 0x0, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:21 executing program 3: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f0000000000)={0x400, 0x9, 0x80000001}) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:21 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r1 = getuid() setreuid(r0, r1) accept$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) 00:21:21 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) r0 = getuid() r1 = getuid() setuid(r1) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x81, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="6a17229e42c02497a5cdb33483675a4d15f365c25995538d6dcd1da9daaeda2ea07b4b87ed1cd16c2321802536a6bea0eedd548a1048400a5e9c35a30879c2140cb5900831ba186884f5c3a8a4304a", 0x4f, 0x8b}], 0x11000, &(0x7f00000001c0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x2d, 0x34, 0x34, 0x30]}}, {@gid={'gid', 0x3d, 0xee01}}, {@huge_always}], [{@smackfsdef={'smackfsdef', 0x3d, '}/\\\xc6(*\xe6-*'}}, {@permit_directio}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@obj_user={'obj_user', 0x3d, 'tmpfs\x00'}}, {@subj_type={'subj_type', 0x3d, 'tmpfs\x00'}}, {@euid_lt={'euid<', r0}}, {@obj_user={'obj_user', 0x3d, 'tmpfs\x00'}}, {@fowner_lt={'fowner<', r1}}, {@obj_role={'obj_role', 0x3d, '.-'}}]}) 00:21:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 00:21:22 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 00:21:22 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:22 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) 00:21:22 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r1 = getuid() setreuid(r0, r1) accept$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) 00:21:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 00:21:22 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x9, 0x7, &(0x7f0000000480)=[{&(0x7f0000000100)="f7b0dea19d979441f41a66082049634eac034e62dd20481aae702e10ce8c6acefdea9419dd38b6e0438b2558cac17f09bf9da6584ca2502cd56cc4b61a", 0x3d, 0x4}, {&(0x7f0000000140)="b10eee405bd9aba271442fa20f99fb74feeb45587137dcdb68f010179bacd39aa320c53cb886590a3c13b1539b88a2710a94653473070407976b1c59f125f5ceb7bf", 0x42, 0x2}, {&(0x7f00000001c0)="039cb7e298fe65804e1a49abfee0bb16eee4b06004cf808772de615d88e4d3d9aa8c6f74e1f895cc95b3b4d968394832487de58b9fe85e946c2acbfbbcef2eff970edfa8005519d33fc48a6f2c5f8b503958448bebbc9e99e23957c4b4b5deda86a87d61ce96f1789b69cd143c6752007edef6baabca9ee30360c61af7619acadaf2a192cf677c7f12c0c79e489df0ac5cfe0d8dab29755a92c8e836e3", 0x9d, 0x39}, {&(0x7f00000005c0)="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", 0x1000, 0x1f}, {&(0x7f0000000280)="d0f4fc486b01c1b72e222657363a65986d18f52f43d7ddd81115f1f0c00505d413146a912fee6254b67d24103eb4bf29a504e676b3a6e2ec6ea41f0bfe401b71d64f7149b803212ba6803f3a88b991d978b5fa6c2ef613ce23c6e1b6c6b136db04c7120c9c7b8548f0377bd8ae8de8899696ac71544d1e4322815fa123d11d4db8da880447caae3bb83c82dac56e71c12ab8c4bc08f80333706c5e6bdfa9db32868d985d7797d57bf51d", 0xaa, 0xd1}, {&(0x7f0000000340)="787294129df149a9d3dbc567d69eaabb971a75e0151b2789cd5617cbf392", 0x1e, 0x7}, {&(0x7f0000000380)="70d50ef05bc442a5d675d9a5d6bf9889dce2bfa1903c7aec8b90a2c70d34ebad845a9d0fed48d4aa17d644885c442f755575be9500eac6b9f473735310e5a9e5dbd3484d245e1d93de8958d9ea45040feb59db4bb3ab8918d3627b7fa0ec2708a338766733bea930e325675b6541fed85baab9de37ef86f90ae1b7647cd0506445c5b0d8bf67938a0246511467c470b005d7fae0bcb0355669816fa4fcac6cea37294f3250c454bffa3107985fb41519d6bdfcbe84c221fc0f324f2d61058d1d74f5dc07346f7c53435368e2e8283fc53fc5a4602083ada24d0830f615b89a4e01b85da1916a622545d2", 0xea}], 0x3001000, &(0x7f00000015c0)={[{}, {'tmpfs\x00'}], [{@uid_gt}, {@appraise_type}, {@subj_user={'subj_user', 0x3d, 'tmpfs\x00'}}, {@context={'context', 0x3d, 'system_u'}}, {@fsname={'fsname', 0x3d, 'tmpfs\x00'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@seclabel}, {@fsmagic={'fsmagic', 0x3d, 0x4}}]}) 00:21:22 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) getuid() r0 = socket$nl_generic(0x10, 0x3, 0x10) accept$packet(r0, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) 00:21:22 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 00:21:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 00:21:22 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:22 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) getuid() setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3, 0x6, 0xff, 0xc87}, {0x2, 0x0, 0x7f, 0x7}]}, 0x10) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000180)=0xe8) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f0000000200)=""/220, &(0x7f0000000300)=0xdc) connect$packet(r0, &(0x7f0000000340)={0x11, 0x15, r1, 0x1, 0x6, 0x6, @link_local}, 0x14) [ 722.027515][ T8992] loop1: detected capacity change from 0 to 8 00:21:22 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r0 = socket$nl_generic(0x10, 0x3, 0x10) accept$packet(r0, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) 00:21:22 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000000)=ANY=[@ANYBLOB="4d9037a08766c3ed2d9f06"]) r0 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) 00:21:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 00:21:22 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:22 executing program 3: ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x61}) prctl$PR_SET_SECCOMP(0x2, 0x3, 0x0) 00:21:22 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 00:21:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) accept$packet(r0, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) 00:21:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f00000000c0)={0x264, 0x0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0xe0, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x20, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}]}, @ETHTOOL_A_STRSET_HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x100, 0x2, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}]}]}, 0x264}, 0x1, 0x0, 0x0, 0x48801}, 0x4080) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r1) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)={0x4c, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x4c}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x5c, r3, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @ETHTOOL_A_DEBUG_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x5c}}, 0x24008010) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) 00:21:22 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 00:21:22 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={0x0}) 00:21:22 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:22 executing program 3: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000040)=0x1c, 0x180800) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in=@rand_addr=0x64010100, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x4e24, 0x64c7, 0x4e22, 0x0, 0x2, 0x20, 0xa0, 0x5c, 0x0, 0xee01}, {0x5, 0x40, 0xfffffffffffffff8, 0x5, 0xb76, 0x4, 0x5}, {0x3, 0xffffffffffff9231, 0x9, 0x7}, 0x1, 0x6e6bbb, 0x0, 0x0, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d5, 0x2b}, 0x7, @in6=@mcast1, 0x0, 0x4, 0x2, 0x80, 0xc0, 0x1, 0x7fff}}, 0xe8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x400000, 0x0) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:22 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) accept$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) 00:21:23 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={0x0}) 00:21:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)) 00:21:23 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f0000000100)="871987c11f3469abbb3a7362bd81f5c6563633156fd0a5209a6ed20b492469505265fb9c921639cfb438c09aa930e079dddf601fc74ae4060d8f6b9f3442019a15b0e3925f5b696a6543c93571866ca99bd05b127f22cf7b90d433e1ccebd95d454261e933ed05130347a9ccbd5ff75e66c589341db3b0fae10fd0acf150cc69074ea2cf8a830b34308a2aefd70a29c7b097b1", 0x93) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x400) 00:21:23 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:23 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) accept$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) 00:21:23 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@private1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xe8) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r4, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000780), 0x4) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), r2) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, r5, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000006c0)={&(0x7f0000000280)={0x5c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe}, 0x4c}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000001) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f00000007c0)={0x3, {{0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8}}}, 0x88) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000540)={&(0x7f0000000c40)=ANY=[@ANYBLOB="cf03b100490000", @ANYRES16=r5, @ANYBLOB="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"], 0x3cc}, 0x1, 0x0, 0x0, 0x40004}, 0x1) 00:21:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 00:21:23 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) accept$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000e80)=0x14) 00:21:23 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={0x0}) 00:21:23 executing program 1: prctl$PR_SET_TSC(0x1a, 0x2) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x40, 0xfffffffffffffe1a, 0x0, 0x1fffff, &(0x7f0000000000)) syz_open_dev$ttys(0xc, 0x2, 0x1) 00:21:23 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 00:21:23 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) 00:21:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) accept$packet(r0, 0x0, &(0x7f0000000e80)) 00:21:23 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 00:21:23 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x3, 0x3, &(0x7f0000000240)=[{&(0x7f0000000100)="1132a05553eb4e972e064687f53aac4c083968dfa7d9de500b2b645ecd50d1a8d706b749b13ebe7b5d2b332c740ee5c201f8ddbdbe26919adacbc316cf780bf7f7665fc2c2696926bedc8a8d3f482efd103896cb1e97175d3d090f481dfe4a16f1b269cfe99381fd6233ef33531a88ac69a634da20820de13c", 0x79, 0xffffffff}, {&(0x7f0000000180)="606eb044de837830fb3b48ad9999b63e3caed47bec615c9401ba76cef0b7a3da44099002e94dc9814e818a024de1fc2669fe7590c3badb7641f4f8fdb2c2c353d151157b556785424cb2245007017ca525c0c2ca7f5886b207fa44605394908f62cac702534823fd1e4b2de516ae", 0x6e, 0xb07b}, {&(0x7f0000000200)="a71ef219b3d8ffd80e0f76c9e64aa7b34bcd5b710b140e678e28951a9e04610e2abb385f7f51365752b4551e", 0x2c, 0x80000000}], 0x5a710b464e75c758, &(0x7f00000002c0)={[{@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x39, 0x39, 0x37, 0x65, 0x39, 0x33, 0x65]}}, {@huge_within_size}, {@nr_blocks={'nr_blocks', 0x3d, [0x67]}}], [{@subj_role={'subj_role', 0x3d, 'tmpfs\x00'}}]}) 00:21:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) accept$packet(r0, 0x0, 0x0) 00:21:23 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 00:21:23 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 00:21:23 executing program 2: io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x20}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:23 executing program 3: ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000000)={0x5, 0x80000000, 0x20004, 0x0, 0x81, "f4fa7fb31bba1492ec2c78e2b9d6856c93318a", 0x0, 0xffff}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) 00:21:23 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 00:21:23 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 00:21:23 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@private1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xe8) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r4, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000780), 0x4) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), r2) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, r5, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000006c0)={&(0x7f0000000280)={0x5c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe}, 0x4c}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000001) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f00000007c0)={0x3, {{0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8}}}, 0x88) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000540)={&(0x7f0000000c40)=ANY=[@ANYBLOB="cf03b100490000", @ANYRES16=r5, @ANYBLOB="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"], 0x3cc}, 0x1, 0x0, 0x0, 0x40004}, 0x1) [ 722.681013][ T9102] loop1: detected capacity change from 0 to 264192 00:21:23 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000000)={[{@nr_blocks={'nr_blocks', 0x3d, [0x67, 0x39, 0x6b, 0x36, 0x58]}}]}) 00:21:23 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 00:21:23 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@private1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xe8) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r4, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000780), 0x4) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), r2) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, r5, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000006c0)={&(0x7f0000000280)={0x5c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe}, 0x4c}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000001) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f00000007c0)={0x3, {{0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8}}}, 0x88) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000540)={&(0x7f0000000c40)=ANY=[@ANYBLOB="cf03b100490000", @ANYRES16=r5, @ANYBLOB="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"], 0x3cc}, 0x1, 0x0, 0x0, 0x40004}, 0x1) 00:21:23 executing program 3: r0 = io_uring_setup(0x32a2, 0x0) syz_io_uring_setup(0x5943, &(0x7f0000000680)={0x0, 0xdb6b, 0x8, 0x3, 0x109, 0x0, r0}, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000700), &(0x7f0000000740)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x10000000) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x1000006, 0x10, r0, 0x8000000) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) syz_open_pts(r1, 0x101001) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) openat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 00:21:23 executing program 2: io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x20}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:23 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="005974befc550f5c5b0f09bdeefc7244e54dd52a5921081e0d3e018956f66552aa940a241d5d8dfb9cdf417b9d1720b9a3dd2bebb8d6c69a7b1ed2da4dc5eb08d6e74103b7fb5eb5f66cb41a4cc18e01a9c9cee45ec9c1198db99e0d7d0fd494cfe91edfd74586d918ee3dc1d76de389aca6ab6dd31e4c5d2b4bf9c13e3879c7152034585e02790a579816e7f314c3e9216c1f5300000000000000"]) 00:21:23 executing program 5: io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x20}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:23 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 00:21:23 executing program 3: socket$inet6(0xa, 0x800, 0x5) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="440080006037c909f9c254a7e9efe9b602451e4761cb6d1b125339bb03fb72c28394de449f30d7", @ANYRES16=0x0, @ANYBLOB="00022dbd7000fbdbdf250300000008000800ac14143f08000800ac141425050003002b00000008000b00", @ANYRES32=0x0, @ANYBLOB="08000600e0000001050002000a000000"], 0x44}, 0x1, 0x0, 0x0, 0x8084}, 0x2004c014) 00:21:23 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)=ANY=[@ANYBLOB="f6"]) 00:21:23 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@private1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xe8) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r4, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000780), 0x4) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), r2) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, r5, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000006c0)={&(0x7f0000000280)={0x5c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe}, 0x4c}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000001) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f00000007c0)={0x3, {{0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8}}}, 0x88) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000540)={&(0x7f0000000c40)=ANY=[@ANYBLOB="cf03b100490000", @ANYRES16=r5, @ANYBLOB="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"], 0x3cc}, 0x1, 0x0, 0x0, 0x40004}, 0x1) 00:21:23 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 00:21:23 executing program 2: io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x20}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:23 executing program 5: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x6, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 00:21:23 executing program 1: faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) r0 = getuid() syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1feff3, &(0x7f0000000100)=ANY=[@ANYBLOB="726f6f74636f6e741078743d73797374656d5f752c666f776e65723d", @ANYRESDEC=0xee00, @ANYBLOB=',euid=', @ANYRESDEC=r0, @ANYBLOB=',\x00']) 00:21:23 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@private1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xe8) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r4, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000780), 0x4) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), r2) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, r5, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000006c0)={&(0x7f0000000280)={0x5c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe}, 0x4c}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000001) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f00000007c0)={0x3, {{0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8}}}, 0x88) 00:21:23 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) 00:21:23 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, &(0x7f0000000140)) 00:21:23 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 00:21:23 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) 00:21:23 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, &(0x7f0000000140)) 00:21:23 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@private1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xe8) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r4, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000780), 0x4) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), r2) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, r5, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000006c0)={&(0x7f0000000280)={0x5c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe}, 0x4c}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000001) 00:21:23 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000001300), r0) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x200, 0x70bd2a, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}}, 0x10) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00']) 00:21:24 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 00:21:24 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, &(0x7f0000000140)) 00:21:24 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 00:21:24 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x440000, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x7ff, 0x5}) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) 00:21:24 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@private1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xe8) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r4, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000780), 0x4) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), r2) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, r5, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) 00:21:24 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f00000009c0)=0xe8) fchownat(r0, &(0x7f0000000540)='./file0\x00', r1, 0x0, 0x400) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x3f, 0x8, &(0x7f0000000740)=[{&(0x7f0000000100)="a8d1f83588ae950cae063d25809f71a7c92283c01434371badae6a4aa39312a4953fc5704e31b93a9130db9b5173325048476f5ec3a67ba13718969e26e7f4badc45450a8380a022785db85250c4941c5417ceaefd3c33", 0x57, 0xfff}, {&(0x7f0000000180)="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", 0xfe, 0x1}, {&(0x7f0000000280)="086702ce4b409c71a17ce47a06b67fea82b84b16e5a044a613f3fa5055db89e12d882d32c323aea5355f2cfaf5b3d50dacb1de2b2f918adb1187d91e9a11fbc7515094ba27b088a2f5d4c61f44c1eb082fc10360b36f38419a30ee2f3e05d443e427d4ab9d382e80c4d548b03b5498c99389195fcf38f6dbb930bd35400b0798cc30c9bbc2f2914f6ecc1bebcb2eb3f3a21bf1e697ff4d5a274828323c", 0x9d, 0x401}, {&(0x7f0000000340)="f2e754d6b77e827ce13e0fc17ac68c0d9eed3b138818eae66d2b388de1fda401ef4d7c2cef13870021ff6247946a8895daf904c677e336982b29ee90c1308ef9bfda98d1f22bc596b83b30a16dd640c7c4eb119a455e673f3a5feecb6e9bb3be0a1239a32007ac84efeb4ab6d14c72df534106e14155c83870ba7cb293e76759d294ee5b625814fb572b18451fcc58ab1868827ba5377d7654f7850969317bf325a7302855881cd644255b5e4712bf609887e601573c8401c05b0607f0133cebcca12937f737c423efe55f5e88d0", 0xce, 0x8}, {&(0x7f0000000440)="c490b68bc6c4b131615ec115404b1ee617072f62ff7d2023305a239f7488cd9ff28207ace798302b8e773148c083e68c9a87e0c1d2bb6c4b10e23912c59a1d64b41aefbcfc03053994ebf3c7363c69d68915edf61df16c9684fd946b24b61f04d3ec4580ed43a4c4d507bdfd70fc0328eefe369b16438b48af9bcc32ca12892ee111ab8ca075f8fc09e3a5233033c0ecbb6bb16634fb40904dd8f61df9edae73df0f81787f0adf12d55b", 0xaa}, {&(0x7f0000000500)="fd365c3414084248c510a8e40c92220e9057f325f7a2f30a4eec15e1b5ac5a35dcd0b6", 0x23, 0x5}, {&(0x7f00000005c0)="64a64477c0a53fec734d8c5d2d92525cd23a04cb7b5df203eb4214521dd6b38192e09523874c134d041d6d8d904cf3d0cd7089ba2b9f7765c43877a3dc60f2e89d26c8243d802802f7b44f12db4ae1e3c694484fece3b46e0fdca99b91dffdaf72e3f17216cb9f5b23a5fa8f17e84910b9d69be2cea008b3b850861d6508cde1ce8067fa9f17941c85c34dbb2858778fe4daf0d20ad0019f392208358b5bd4541825b92436644e508b466a534cd87e8db487a1ca07b05ef2e99c61efbf891781925e44bcd8d6a2d9dc9ec1dc3e344ec8449a26ddc2fbdf3081dbc79e4a9a6a354b9259fde500", 0xe6, 0x42}, {&(0x7f00000006c0)="84ea41b6ffbee8a4489223c6647934d212d8277bfb0ac175162fa4e59597f047d5f99d4a647e6d2a2ed8be035ea99f72a69dd81c4520439663be68f5a839852f86", 0x41, 0x5e0}], 0x0, &(0x7f0000000800)={[{@nr_inodes={'nr_inodes', 0x3d, [0x37, 0x70, 0x32]}}, {@huge_advise}, {@huge_always}, {@mode={'mode', 0x3d, 0x2}}, {@huge_within_size}, {@huge_always}, {@huge_advise}], [{@subj_role={'subj_role', 0x3d, 'tmpfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) 00:21:24 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@private1, @in6=@dev}}, {{@in6=@private0}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xe8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r3, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000780), 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), r2) 00:21:24 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), 0x0) 00:21:24 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) [ 723.911120][ T9212] loop1: detected capacity change from 0 to 15 [ 723.926343][ T9212] tmpfs: Bad value for 'nr_inodes' 00:21:24 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@private1, @in6=@dev}}, {{@in6=@private0}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xe8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r3, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000780), 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) 00:21:24 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:21:24 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0xf800, 0x7, 0x20, 0x3ff}, {0x4, 0xcf, 0x1, 0x3000}, {0x9, 0x9, 0x6, 0xbec}]}) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r0) r3 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r3) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000600)={0x50, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x50) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'erspan0\x00', &(0x7f00000000c0)={'tunl0\x00', 0x0, 0x8000, 0x708, 0x9, 0x3ff, {{0xe, 0x4, 0x0, 0x17, 0x38, 0x66, 0x0, 0x5, 0x29, 0x0, @multicast2, @multicast1, {[@end, @timestamp={0x44, 0x20, 0x15, 0x0, 0x4, [0x6, 0x8, 0x800, 0x6, 0x5, 0x4, 0x401]}]}}}}}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000001c0)=0x14) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r7, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r8) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r9, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="0100000a0f000000000002000000140001800800010068c0277b610db8b8057159c1c4796491e26e4db6", @ANYRES32=0x0, @ANYBLOB="080003000000000018000180140002006d6163766c616e3100000000000000000c0001800800030004000000"], 0x4c}}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_GET(r7, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x34, r10, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xcc, r2, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0xfffffffffffffd76, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4080}, 0xcc14) [ 724.032181][ T9241] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 724.053742][ T9245] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:21:25 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 00:21:25 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)=ANY=[@ANYBLOB='H']) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x1ff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="083a6ffb90b6608ca8c810138d52911ca974e87991cc6ed8d20d60a2e599a722bf94a0ca8990d41d0eca3a6c545456775f613a3b91faccf045f2c01052fc7b455e3ba18d6fb0", 0x46, 0x962}], 0x6182e, &(0x7f00000001c0)={[{}, {@mode={'mode', 0x3d, 0x17c}}, {@huge_never}, {@huge_advise}, {@huge_always}, {@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x36, 0x2d, 0x35, 0x30, 0x35, 0x36]}}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x31, 0x6b, 0x32, 0x65, 0x65, 0x2d, 0x0]}}, {@huge_within_size}, {@uid={'uid', 0x3d, 0xee00}}, {@huge_advise}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'tmpfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '.&'}}]}) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) utimensat(r0, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000340)={{0x77359400}, {r1, r2/1000+60000}}, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r3, 0x0, 0x0) name_to_handle_at(r3, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x20, 0x73, 0x5, 0x0, 0x8, 0x8}}, &(0x7f0000000400), 0x0) 00:21:25 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), 0x0) 00:21:25 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@private1, @in6=@dev}}, {{@in6=@private0}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xe8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r3, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000780), 0x4) 00:21:25 executing program 3: prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) 00:21:25 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@private1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xe8) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r4, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000780), 0x4) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), r2) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, r5, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000006c0)={&(0x7f0000000280)={0x5c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe}, 0x4c}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000001) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f00000007c0)={0x3, {{0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8}}}, 0x88) 00:21:25 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@private1, @in6=@dev}}, {{@in6=@private0}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xe8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r3, 0x0, 0x0) 00:21:25 executing program 2: r0 = io_uring_setup(0x5878, &(0x7f0000000000)) syz_io_uring_setup(0x3c40, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), 0x0) 00:21:25 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1008f4, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) fchownat(r0, &(0x7f0000000100)='./file0\x00', 0xee01, 0xee01, 0x400) [ 724.790478][ T9256] loop1: detected capacity change from 0 to 9 00:21:25 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1008f4, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) fchownat(r0, &(0x7f0000000100)='./file0\x00', 0xee01, 0xee01, 0x400) 00:21:25 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 724.863538][ T9256] loop1: detected capacity change from 0 to 9 00:21:25 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1008f4, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) fchownat(r0, &(0x7f0000000100)='./file0\x00', 0xee01, 0xee01, 0x400) 00:21:26 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 00:21:26 executing program 2: pselect6(0x0, 0x0, &(0x7f0000000240)={0x800, 0xa2, 0x2, 0x7f, 0x80000001, 0xffff, 0x5, 0x7ff}, &(0x7f0000000140)={0xc4a, 0x9, 0x3, 0xffffffff, 0xd84, 0xc, 0x8, 0x6}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:26 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@private1, @in6=@dev}}, {{@in6=@private0}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xe8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:26 executing program 1: r0 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000000c0)=@req={0x3, 0x9, 0xcf, 0x10001}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = accept$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @remote}}, &(0x7f0000000280)=0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) 00:21:26 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1008f4, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:26 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:26 executing program 2: pselect6(0x0, 0x0, &(0x7f0000000240)={0x800, 0xa2, 0x2, 0x7f, 0x80000001, 0xffff, 0x5, 0x7ff}, &(0x7f0000000140)={0xc4a, 0x9, 0x3, 0xffffffff, 0xd84, 0xc, 0x8, 0x6}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:26 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@private1, @in6=@dev}}, {{@in6=@private0}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xe8) 00:21:26 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 00:21:26 executing program 1: r0 = getuid() setuid(r0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f00000000c0)={[], [{@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x36, 0x65, 0x38, 0x31, 0x66, 0x65, 0x38], 0x2d, [0x33, 0x62, 0x31, 0x34], 0x2d, [0x66, 0x61, 0x37, 0x32], 0x2d, [0x61, 0x8, 0x36, 0x62], 0x2d, [0x0, 0x35, 0x61, 0x65, 0x34, 0x66, 0x32, 0x7]}}}, {@euid_gt={'euid>', r0}}, {@dont_measure}, {@fsmagic={'fsmagic', 0x3d, 0x240}}, {@subj_user={'subj_user', 0x3d, '!'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) 00:21:26 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:21:26 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:26 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) 00:21:26 executing program 2: pselect6(0x0, 0x0, &(0x7f0000000240)={0x800, 0xa2, 0x2, 0x7f, 0x80000001, 0xffff, 0x5, 0x7ff}, &(0x7f0000000140)={0xc4a, 0x9, 0x3, 0xffffffff, 0xd84, 0xc, 0x8, 0x6}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:26 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 00:21:26 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:26 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) 00:21:26 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0xd246, 0x2}) 00:21:26 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={0x0}) 00:21:26 executing program 2: pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0xc4a, 0x9, 0x3, 0xffffffff, 0xd84, 0xc, 0x8, 0x6}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:26 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1008f4, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:26 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) socket$nl_generic(0x10, 0x3, 0x10) 00:21:27 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) 00:21:27 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:27 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140), 0x0) 00:21:27 executing program 3: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1008f4, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:27 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={0x0}) 00:21:27 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1008f4, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:27 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:27 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) 00:21:27 executing program 3: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1008f4, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:27 executing program 1: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in6=@loopback}}, {{@in6=@private0}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000004c0)="ba8d62c2f0212d468fccc23d167234e26ca50c1ecdfde607534269bd266ab1d81110aabf5a7696ddbb257ab1c88ab08befc26c2fa175d0619112218578b2a4b36b1a0544ad8565ef3d1af4df125c1cda3541afa4d2079be1f7b8ebfcb08e0c7e3b2fc7b12371ba87edb90277b386fd50b9cf6f529211c4ebd77a88e5cd99b2553d7cf786053eae1fd8761b97d169392174729abb9adff6afa97f8919e19ea9e93d934a6d6958270448c72995408e2385c52360d51d2e64788f6a236fe7af80bc7128bbf6f8f23a8d3d3e0963f35a25858358b81fe259b07f4d9e1166b2d2a054f54734f25e41f9f8b5400ad9", 0xec) r0 = socket$inet6(0xa, 0x2, 0x7) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000005c0)={@loopback}, &(0x7f0000000600)=0x14) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000240)=ANY=[@ANYBLOB="736d61636b6673666c6f6f723d746d70667304d36d10d0721022922e002c61707072616973655f747970653d696d617369672c636f6e746578743d756e636f6e66696e6564"]) r1 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) r2 = getuid() setuid(r2) fchownat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', r2, 0xffffffffffffffff, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@private2, @in=@multicast1, 0x4e21, 0x6b, 0x4e21, 0x0, 0x2, 0x0, 0xa0, 0x3a, 0x0, r3}, {0x20, 0x3, 0x0, 0xcf3, 0x6, 0x0, 0x3f, 0x1}, {0x0, 0x6, 0x8}, 0x101, 0x6e6bb0, 0x1, 0x1, 0x3, 0x1}, {{@in=@multicast1, 0x4d3, 0x2b}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0x9, 0x5, 0x7407c49, 0x10001}}, 0xe8) 00:21:27 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={0x0}) 00:21:27 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1008f4, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:27 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1008f4, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:27 executing program 3: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1008f4, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:27 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) 00:21:27 executing program 0: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x800, 0x5, 0x8, 0x7}]}) syslog(0x3, &(0x7f0000000100)=""/87, 0x57) pkey_alloc(0x0, 0x5) syslog(0xa, &(0x7f00000001c0)=""/126, 0x7e) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x20, 0xdb, 0x401}, {0x8f20, 0x2, 0x3}]}) 00:21:27 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:27 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) [ 726.954267][ T25] kauditd_printk_skb: 3 callbacks suppressed [ 726.954280][ T25] audit: type=1326 audit(1622679687.628:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9421 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 [ 727.060580][ T25] audit: type=1326 audit(1622679687.738:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9421 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:28 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:28 executing program 1: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x7}, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00J']) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r1 = io_uring_setup(0x32a2, 0x0) syz_io_uring_setup(0x5943, &(0x7f0000000680)={0x0, 0xdb6b, 0x8, 0x3, 0x109, 0x0, r1}, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000700), &(0x7f0000000740)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x12, r1, 0x8000000) getpeername$packet(r0, 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@FILEID_BTRFS_WITH_PARENT={0x28, 0x4e, {0x5, 0x800, 0x0, 0x3, 0x8, 0x7}}, &(0x7f0000000100), 0x1000) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000180)={@id={0x2, 0x0, @a}}) 00:21:28 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x60ed, 0x1, 0x3f, 0x7357}, {0x8000, 0x20, 0x1, 0x7f}, {0x0, 0xff, 0xf7, 0x8001}, {0x40, 0x6, 0x2}, {0x0, 0x8, 0x4, 0x2}]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) 00:21:28 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:28 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:28 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:28 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(0x0, 0x4000, 0x0) 00:21:28 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) 00:21:28 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1008f4, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:28 executing program 0: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x800, 0x5, 0x8, 0x7}]}) syslog(0x3, &(0x7f0000000100)=""/87, 0x57) pkey_alloc(0x0, 0x5) syslog(0xa, &(0x7f00000001c0)=""/126, 0x7e) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x20, 0xdb, 0x401}, {0x8f20, 0x2, 0x3}]}) 00:21:28 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(0x0, 0x4000, 0x0) 00:21:28 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) [ 727.841405][ T25] audit: type=1326 audit(1622679688.518:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9469 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 [ 727.938037][ T25] audit: type=1326 audit(1622679688.618:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9469 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:29 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={[0x6]}, 0x8}) 00:21:29 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)=ANY=[@ANYBLOB]) 00:21:29 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1008f4, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:29 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(0x0, 0x4000, 0x0) 00:21:29 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) 00:21:29 executing program 5: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x1008f4, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:29 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000000)=ANY=[@ANYBLOB="31a4c091602a50c567b05d272671d5e67dc494ae401f4c8f32b48acee9ccac2478508ab84280fda70768f2865901c98e9fcb24"]) 00:21:29 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 00:21:29 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) 00:21:29 executing program 0: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x800, 0x5, 0x8, 0x7}]}) syslog(0x3, &(0x7f0000000100)=""/87, 0x57) pkey_alloc(0x0, 0x5) syslog(0xa, &(0x7f00000001c0)=""/126, 0x7e) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x20, 0xdb, 0x401}, {0x8f20, 0x2, 0x3}]}) 00:21:29 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:29 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 728.712057][ T25] audit: type=1326 audit(1622679689.388:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9518 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 [ 728.805937][ T25] audit: type=1326 audit(1622679689.488:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9518 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:30 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 00:21:30 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 00:21:30 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 00:21:30 executing program 1: recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/199, 0xc7, 0x12161, &(0x7f0000000000)={0x11, 0x4, 0x0, 0x1, 0x63, 0x6, @random="b6357035d662"}, 0x14) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) bind$packet(r0, &(0x7f00000002c0)={0x11, 0x7, 0x0, 0x1, 0x6f, 0x6, @remote}, 0x14) r1 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14) getsockopt$packet_int(r1, 0x107, 0x13, &(0x7f0000000240), &(0x7f0000000280)=0x4) r2 = socket$inet6(0xa, 0x2, 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000640)={{{@in=@broadcast, @in6=@private1}}, {{@in6=@private2}, 0x0, @in6=@loopback}}, &(0x7f0000000540)=0xe8) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)=ANY=[@ANYBLOB='D']) syz_mount_image$nfs(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x8, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000380)="51991894ee5abb0e4b592597bff249d0319d5c2b334e8305f733a5667d0fdbc27f9df60dd66cba4c59a85d6229a06abd39fd3fb4aa620036", 0x38, 0x401}, {&(0x7f00000003c0)="2c49759058c5f5ac3dbc2830ccebb4c6dc03ba8244ba", 0x16, 0x2}, {&(0x7f0000000400)="3c51d88f31316ec56c44ca18b248a3283b53b32b24dafe383a2314fd21dab4fd66f49d9fdb", 0x25, 0x4}, {&(0x7f0000000440)="a6a4914664a09b62c73b3bdcffd650d1fc33df930b21578fca54fd4ee6119a69a9b5f3e4b0926c72cebaa56434e105333aa2b4809aad169eca9c1fdfcb72b40da5b656079c01d540b298a6", 0x4b, 0x8}], 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB='fowner=', @ANYRESDEC=0x0, @ANYBLOB="26002339d2e648aaa8224ccfdc473761db563c5157829bb195810e39f775a688c0b7bcb93e5a6fcf54a3d3d03cba2b510ef19e1ac9b1f2a1b17d7646c065877a6c2f0c7280d59405eb4c4efedef8dd3cf6eab4164e70dbf443d25e8f2ffe55"]) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000780)={0x3, &(0x7f0000000740)=[{0x3, 0x6, 0xf8, 0x1000}, {0x63e, 0x1, 0x5, 0xc77b}, {0x4, 0x3, 0x10}]}, 0x10) 00:21:30 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) 00:21:30 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) 00:21:30 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(0x0, 0x4000, 0x0) 00:21:30 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in6=@loopback}}, {{@in6=@private0}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000004c0)="ba8d62c2f0212d468fccc23d167234e26ca50c1ecdfde607534269bd266ab1d81110aabf5a7696ddbb257ab1c88ab08befc26c2fa175d0619112218578b2a4b36b1a0544ad8565ef3d1af4df125c1cda3541afa4d2079be1f7b8ebfcb08e0c7e3b2fc7b12371ba87edb90277b386fd50b9cf6f529211c4ebd77a88e5cd99b2553d7cf786053eae1fd8761b97d169392174729abb9adff6afa97f8919e19ea9e93d934a6d6958270448c72995408e2385c52360d51d2e64788f6a236fe7af80bc7128bbf6f8f23a8d3d3e0963f35a25858358b81fe259b07f4d9e1166b2d2a054f54734f25e41f9f8b5400ad9", 0xec) r0 = socket$inet6(0xa, 0x2, 0x7) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000005c0)={@loopback}, &(0x7f0000000600)=0x14) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000240)=ANY=[@ANYBLOB="736d61636b6673666c6f6f723d746d70667304d36d10d0721022922e002c61707072616973655f747970653d696d617369672c636f6e746578743d756e636f6e66696e6564"]) r1 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) r2 = getuid() setuid(r2) fchownat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', r2, 0xffffffffffffffff, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@private2, @in=@multicast1, 0x4e21, 0x6b, 0x4e21, 0x0, 0x2, 0x0, 0xa0, 0x3a, 0x0, r3}, {0x20, 0x3, 0x0, 0xcf3, 0x6, 0x0, 0x3f, 0x1}, {0x0, 0x6, 0x8}, 0x101, 0x6e6bb0, 0x1, 0x1, 0x3, 0x1}, {{@in=@multicast1, 0x4d3, 0x2b}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0x9, 0x5, 0x7407c49, 0x10001}}, 0xe8) 00:21:30 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) [ 729.487433][ T9538] loop1: detected capacity change from 0 to 4 [ 729.498952][ T9538] nfs: Unknown parameter 'fowner' 00:21:30 executing program 0: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x800, 0x5, 0x8, 0x7}]}) syslog(0x3, &(0x7f0000000100)=""/87, 0x57) pkey_alloc(0x0, 0x5) syslog(0xa, &(0x7f00000001c0)=""/126, 0x7e) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) 00:21:30 executing program 1: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x800, 0x5, 0x8, 0x7}]}) syslog(0x3, &(0x7f0000000100)=""/87, 0x57) pkey_alloc(0x0, 0x5) syslog(0xa, &(0x7f00000001c0)=""/126, 0x7e) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x20, 0xdb, 0x401}, {0x8f20, 0x2, 0x3}]}) 00:21:30 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(0x0, 0x4000, 0x0) 00:21:30 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0) 00:21:30 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={0x0}) 00:21:30 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) 00:21:30 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in6=@loopback}}, {{@in6=@private0}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000004c0)="ba8d62c2f0212d468fccc23d167234e26ca50c1ecdfde607534269bd266ab1d81110aabf5a7696ddbb257ab1c88ab08befc26c2fa175d0619112218578b2a4b36b1a0544ad8565ef3d1af4df125c1cda3541afa4d2079be1f7b8ebfcb08e0c7e3b2fc7b12371ba87edb90277b386fd50b9cf6f529211c4ebd77a88e5cd99b2553d7cf786053eae1fd8761b97d169392174729abb9adff6afa97f8919e19ea9e93d934a6d6958270448c72995408e2385c52360d51d2e64788f6a236fe7af80bc7128bbf6f8f23a8d3d3e0963f35a25858358b81fe259b07f4d9e1166b2d2a054f54734f25e41f9f8b5400ad9", 0xec) r0 = socket$inet6(0xa, 0x2, 0x7) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000005c0)={@loopback}, &(0x7f0000000600)=0x14) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000240)=ANY=[@ANYBLOB="736d61636b6673666c6f6f723d746d70667304d36d10d0721022922e002c61707072616973655f747970653d696d617369672c636f6e746578743d756e636f6e66696e6564"]) r1 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) r2 = getuid() setuid(r2) fchownat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', r2, 0xffffffffffffffff, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@private2, @in=@multicast1, 0x4e21, 0x6b, 0x4e21, 0x0, 0x2, 0x0, 0xa0, 0x3a, 0x0, r3}, {0x20, 0x3, 0x0, 0xcf3, 0x6, 0x0, 0x3f, 0x1}, {0x0, 0x6, 0x8}, 0x101, 0x6e6bb0, 0x1, 0x1, 0x3, 0x1}, {{@in=@multicast1, 0x4d3, 0x2b}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0x9, 0x5, 0x7407c49, 0x10001}}, 0xe8) [ 729.609733][ T25] audit: type=1326 audit(1622679690.288:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9567 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:30 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(0x0, 0x4000, 0x0) 00:21:30 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) [ 729.706778][ T25] audit: type=1326 audit(1622679690.288:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9570 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:30 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={0x0}) 00:21:30 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) 00:21:30 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 729.770725][ T25] audit: type=1326 audit(1622679690.448:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9570 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:31 executing program 0: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x800, 0x5, 0x8, 0x7}]}) syslog(0x3, &(0x7f0000000100)=""/87, 0x57) pkey_alloc(0x0, 0x5) syslog(0xa, &(0x7f00000001c0)=""/126, 0x7e) 00:21:31 executing program 1: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x800, 0x5, 0x8, 0x7}]}) syslog(0x3, &(0x7f0000000100)=""/87, 0x57) pkey_alloc(0x0, 0x5) syslog(0xa, &(0x7f00000001c0)=""/126, 0x7e) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x20, 0xdb, 0x401}, {0x8f20, 0x2, 0x3}]}) 00:21:31 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in6=@loopback}}, {{@in6=@private0}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000004c0)="ba8d62c2f0212d468fccc23d167234e26ca50c1ecdfde607534269bd266ab1d81110aabf5a7696ddbb257ab1c88ab08befc26c2fa175d0619112218578b2a4b36b1a0544ad8565ef3d1af4df125c1cda3541afa4d2079be1f7b8ebfcb08e0c7e3b2fc7b12371ba87edb90277b386fd50b9cf6f529211c4ebd77a88e5cd99b2553d7cf786053eae1fd8761b97d169392174729abb9adff6afa97f8919e19ea9e93d934a6d6958270448c72995408e2385c52360d51d2e64788f6a236fe7af80bc7128bbf6f8f23a8d3d3e0963f35a25858358b81fe259b07f4d9e1166b2d2a054f54734f25e41f9f8b5400ad9", 0xec) r0 = socket$inet6(0xa, 0x2, 0x7) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000005c0)={@loopback}, &(0x7f0000000600)=0x14) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000240)=ANY=[@ANYBLOB="736d61636b6673666c6f6f723d746d70667304d36d10d0721022922e002c61707072616973655f747970653d696d617369672c636f6e746578743d756e636f6e66696e6564"]) r1 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) r2 = getuid() setuid(r2) fchownat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', r2, 0xffffffffffffffff, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@private2, @in=@multicast1, 0x4e21, 0x6b, 0x4e21, 0x0, 0x2, 0x0, 0xa0, 0x3a, 0x0, r3}, {0x20, 0x3, 0x0, 0xcf3, 0x6, 0x0, 0x3f, 0x1}, {0x0, 0x6, 0x8}, 0x101, 0x6e6bb0, 0x1, 0x1, 0x3, 0x1}, {{@in=@multicast1, 0x4d3, 0x2b}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0x9, 0x5, 0x7407c49, 0x10001}}, 0xe8) 00:21:31 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={0x0}) 00:21:31 executing program 4: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) 00:21:31 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 730.456178][ T25] audit: type=1326 audit(1622679691.138:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9616 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:31 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 00:21:31 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 00:21:31 executing program 4: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) 00:21:31 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 00:21:31 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in6=@loopback}}, {{@in6=@private0}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000004c0)="ba8d62c2f0212d468fccc23d167234e26ca50c1ecdfde607534269bd266ab1d81110aabf5a7696ddbb257ab1c88ab08befc26c2fa175d0619112218578b2a4b36b1a0544ad8565ef3d1af4df125c1cda3541afa4d2079be1f7b8ebfcb08e0c7e3b2fc7b12371ba87edb90277b386fd50b9cf6f529211c4ebd77a88e5cd99b2553d7cf786053eae1fd8761b97d169392174729abb9adff6afa97f8919e19ea9e93d934a6d6958270448c72995408e2385c52360d51d2e64788f6a236fe7af80bc7128bbf6f8f23a8d3d3e0963f35a25858358b81fe259b07f4d9e1166b2d2a054f54734f25e41f9f8b5400ad9", 0xec) r0 = socket$inet6(0xa, 0x2, 0x7) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000005c0)={@loopback}, &(0x7f0000000600)=0x14) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000240)=ANY=[@ANYBLOB="736d61636b6673666c6f6f723d746d70667304d36d10d0721022922e002c61707072616973655f747970653d696d617369672c636f6e746578743d756e636f6e66696e6564"]) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) r1 = getuid() setuid(r1) fchownat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', r1, 0xffffffffffffffff, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@loopback}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) 00:21:31 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 00:21:31 executing program 0: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x800, 0x5, 0x8, 0x7}]}) syslog(0x3, &(0x7f0000000100)=""/87, 0x57) syslog(0xa, &(0x7f00000001c0)=""/126, 0x7e) 00:21:32 executing program 1: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x800, 0x5, 0x8, 0x7}]}) syslog(0x3, &(0x7f0000000100)=""/87, 0x57) pkey_alloc(0x0, 0x5) syslog(0xa, &(0x7f00000001c0)=""/126, 0x7e) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1ff, 0x20, 0xdb, 0x401}, {0x8f20, 0x2, 0x3}]}) 00:21:32 executing program 4: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, &(0x7f0000000740)=0x6, 0x4) 00:21:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r1) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000800)={'syztnl0\x00', &(0x7f00000006c0)={'syztnl2\x00', 0x0, 0x8000, 0x1, 0x3, 0xff, {{0x3a, 0x4, 0x3, 0x4, 0xe8, 0x64, 0x0, 0x3, 0x29, 0x0, @remote, @broadcast, {[@generic={0xc6, 0x5, "832588"}, @lsrr={0x83, 0xf, 0x2e, [@broadcast, @loopback, @multicast2]}, @timestamp_addr={0x44, 0x2c, 0x95, 0x1, 0x1, [{@rand_addr=0x64010100, 0xf6f}, {@loopback, 0x1f}, {@loopback}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffff000}, {@private=0xa010101, 0x82a}]}, @rr={0x7, 0x1b, 0x35, [@private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast2, @local, @loopback]}, @lsrr={0x83, 0x3, 0x4e}, @end, @lsrr={0x83, 0x1b, 0x74, [@dev={0xac, 0x14, 0x14, 0xe}, @multicast1, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x32}, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x2c, 0x20, 0x1, 0x6, [{@empty, 0x3}, {@private=0xa010100, 0x100}, {@dev={0xac, 0x14, 0x14, 0x2d}, 0x8}, {@loopback, 0xfffffffc}, {@empty, 0x7}]}, @cipso={0x86, 0x12, 0x3, [{0x1, 0xc, "b4f13afc47ab7021bfa4"}]}, @timestamp_addr={0x44, 0x1c, 0xd5, 0x1, 0x2, [{@multicast1, 0xff}, {@local, 0x5}, {@private=0xa010100, 0x1}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000008c0)={'ip_vti0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="003a002000000101800000004b09002c0068000008049078640101017f0000010717d57f000001ffffffff0a010102ac1e0101ac1414aa00"]}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000c40)={0x148, r4, 0x1, 0x0, 0x25dfdbfd, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0x18}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r7) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r8, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x58, r9, 0x1, 0x70bd25, 0x0, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x9, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0x58}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0)={@private2, 0x0}, &(0x7f0000000200)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[@ANYBLOB="b8000000", @ANYRES16=r9, @ANYBLOB="00042dbd7000fcdbdf250e0000006c0001801400020069703665727370610f163b43fb604f53236e3000000000000008000300040000001400020073797a5f74756e0000000000000000001400020076657468305f746f5f626f6e640000001400020076657468305f766c616e00", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="380001800800030002000000080003000300000008000100", @ANYRES32=r11, @ANYBLOB="08000300010000001400020076657468315f746f5f62726964676500"], 0xb8}}, 0x10) r12 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0x24, r9, 0x400, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_FEATURES_WANTED={0x4}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4004090) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r3, 0x4, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20040014}, 0x24000840) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) 00:21:32 executing program 2: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 00:21:32 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in6=@loopback}}, {{@in6=@private0}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000004c0)="ba8d62c2f0212d468fccc23d167234e26ca50c1ecdfde607534269bd266ab1d81110aabf5a7696ddbb257ab1c88ab08befc26c2fa175d0619112218578b2a4b36b1a0544ad8565ef3d1af4df125c1cda3541afa4d2079be1f7b8ebfcb08e0c7e3b2fc7b12371ba87edb90277b386fd50b9cf6f529211c4ebd77a88e5cd99b2553d7cf786053eae1fd8761b97d169392174729abb9adff6afa97f8919e19ea9e93d934a6d6958270448c72995408e2385c52360d51d2e64788f6a236fe7af80bc7128bbf6f8f23a8d3d3e0963f35a25858358b81fe259b07f4d9e1166b2d2a054f54734f25e41f9f8b5400ad9", 0xec) r0 = socket$inet6(0xa, 0x2, 0x7) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000005c0)={@loopback}, &(0x7f0000000600)=0x14) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000240)=ANY=[@ANYBLOB="736d61636b6673666c6f6f723d746d70667304d36d10d0721022922e002c61707072616973655f747970653d696d617369672c636f6e746578743d756e636f6e66696e6564"]) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) r1 = getuid() setuid(r1) fchownat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', r1, 0xffffffffffffffff, 0x800) 00:21:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000740)=0x6, 0x4) 00:21:32 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x1, 0x3, 0x1}]}) 00:21:32 executing program 5: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) accept$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@remote, @loopback, @local, 0x8, 0x5, 0x1ff, 0x500, 0x8, 0x80000004}) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/171) [ 731.449876][ T9683] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 731.466838][ T9683] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 00:21:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000740)=0x6, 0x4) 00:21:32 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in6=@loopback}}, {{@in6=@private0}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000004c0)="ba8d62c2f0212d468fccc23d167234e26ca50c1ecdfde607534269bd266ab1d81110aabf5a7696ddbb257ab1c88ab08befc26c2fa175d0619112218578b2a4b36b1a0544ad8565ef3d1af4df125c1cda3541afa4d2079be1f7b8ebfcb08e0c7e3b2fc7b12371ba87edb90277b386fd50b9cf6f529211c4ebd77a88e5cd99b2553d7cf786053eae1fd8761b97d169392174729abb9adff6afa97f8919e19ea9e93d934a6d6958270448c72995408e2385c52360d51d2e64788f6a236fe7af80bc7128bbf6f8f23a8d3d3e0963f35a25858358b81fe259b07f4d9e1166b2d2a054f54734f25e41f9f8b5400ad9", 0xec) r0 = socket$inet6(0xa, 0x2, 0x7) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000005c0)={@loopback}, &(0x7f0000000600)=0x14) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000240)=ANY=[@ANYBLOB="736d61636b6673666c6f6f723d746d70667304d36d10d0721022922e002c61707072616973655f747970653d696d617369672c636f6e746578743d756e636f6e66696e6564"]) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) r1 = getuid() setuid(r1) 00:21:32 executing program 5: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) accept$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@remote, @loopback, @local, 0x8, 0x5, 0x1ff, 0x500, 0x8, 0x80000004}) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/171) 00:21:32 executing program 0: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x800, 0x5, 0x8, 0x7}]}) syslog(0xa, &(0x7f00000001c0)=""/126, 0x7e) [ 732.169647][ T25] kauditd_printk_skb: 6 callbacks suppressed [ 732.169661][ T25] audit: type=1326 audit(1622679692.848:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9721 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:32 executing program 1: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x800, 0x5, 0x8, 0x7}]}) syslog(0x3, &(0x7f0000000100)=""/87, 0x57) pkey_alloc(0x0, 0x5) syslog(0xa, &(0x7f00000001c0)=""/126, 0x7e) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) 00:21:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000740)=0x6, 0x4) 00:21:32 executing program 2: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) clock_gettime(0x4, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0)={0x8, 0x7773, 0x8001, 0x8, 0x4, 0x3, 0x6, 0x3}, &(0x7f0000000040)={0x6, 0x3, 0xffffffffffff1220, 0x5, 0xffffffff, 0x9, 0x3, 0xfffffffffffff397}, &(0x7f0000000080)={0xc26b, 0x7f, 0xfc3, 0x0, 0x1, 0x9, 0x7a5, 0x70}, &(0x7f0000000100)={r0, r1+10000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x1]}, 0x8}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000280)={0x1c4, 0x0, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x40}, 0x14) 00:21:32 executing program 5: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) accept$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@remote, @loopback, @local, 0x8, 0x5, 0x1ff, 0x500, 0x8, 0x80000004}) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/171) 00:21:32 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in6=@loopback}}, {{@in6=@private0}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000004c0)="ba8d62c2f0212d468fccc23d167234e26ca50c1ecdfde607534269bd266ab1d81110aabf5a7696ddbb257ab1c88ab08befc26c2fa175d0619112218578b2a4b36b1a0544ad8565ef3d1af4df125c1cda3541afa4d2079be1f7b8ebfcb08e0c7e3b2fc7b12371ba87edb90277b386fd50b9cf6f529211c4ebd77a88e5cd99b2553d7cf786053eae1fd8761b97d169392174729abb9adff6afa97f8919e19ea9e93d934a6d6958270448c72995408e2385c52360d51d2e64788f6a236fe7af80bc7128bbf6f8f23a8d3d3e0963f35a25858358b81fe259b07f4d9e1166b2d2a054f54734f25e41f9f8b5400ad9", 0xec) r0 = socket$inet6(0xa, 0x2, 0x7) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000005c0)={@loopback}, &(0x7f0000000600)=0x14) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000240)=ANY=[@ANYBLOB="736d61636b6673666c6f6f723d746d70667304d36d10d0721022922e002c61707072616973655f747970653d696d617369672c636f6e746578743d756e636f6e66696e6564"]) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) getuid() 00:21:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0, 0xffffffffffffff90}}, 0x41) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x158, 0x0, 0x600, 0x70bd26, 0x25dfdbff, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0x9, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x83}}, {0x8, 0x9, 0xfffffffd}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x7}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x4}}]}, 0x158}, 0x1, 0x0, 0x0, 0x4008c00}, 0x20000080) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:33 executing program 5: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) accept$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/171) [ 732.335385][ T25] audit: type=1326 audit(1622679693.008:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9732 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:33 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, 0x0, 0x0) 00:21:33 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in6=@loopback}}, {{@in6=@private0}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000004c0)="ba8d62c2f0212d468fccc23d167234e26ca50c1ecdfde607534269bd266ab1d81110aabf5a7696ddbb257ab1c88ab08befc26c2fa175d0619112218578b2a4b36b1a0544ad8565ef3d1af4df125c1cda3541afa4d2079be1f7b8ebfcb08e0c7e3b2fc7b12371ba87edb90277b386fd50b9cf6f529211c4ebd77a88e5cd99b2553d7cf786053eae1fd8761b97d169392174729abb9adff6afa97f8919e19ea9e93d934a6d6958270448c72995408e2385c52360d51d2e64788f6a236fe7af80bc7128bbf6f8f23a8d3d3e0963f35a25858358b81fe259b07f4d9e1166b2d2a054f54734f25e41f9f8b5400ad9", 0xec) r0 = socket$inet6(0xa, 0x2, 0x7) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000005c0)={@loopback}, &(0x7f0000000600)=0x14) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000240)=ANY=[@ANYBLOB="736d61636b6673666c6f6f723d746d70667304d36d10d0721022922e002c61707072616973655f747970653d696d617369672c636f6e746578743d756e636f6e66696e6564"]) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) 00:21:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0, 0xffffffffffffff90}}, 0x41) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x158, 0x0, 0x600, 0x70bd26, 0x25dfdbff, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0x9, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x83}}, {0x8, 0x9, 0xfffffffd}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x7}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x4}}]}, 0x158}, 0x1, 0x0, 0x0, 0x4008c00}, 0x20000080) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:33 executing program 5: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) accept$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/171) 00:21:33 executing program 0: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) syslog(0xa, &(0x7f00000001c0)=""/126, 0x7e) 00:21:33 executing program 1: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x800, 0x5, 0x8, 0x7}]}) syslog(0x3, &(0x7f0000000100)=""/87, 0x57) pkey_alloc(0x0, 0x5) syslog(0xa, &(0x7f00000001c0)=""/126, 0x7e) 00:21:33 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, 0x0, 0x0) 00:21:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0, 0xffffffffffffff90}}, 0x41) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x158, 0x0, 0x600, 0x70bd26, 0x25dfdbff, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0x9, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x83}}, {0x8, 0x9, 0xfffffffd}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x7}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x4}}]}, 0x158}, 0x1, 0x0, 0x0, 0x4008c00}, 0x20000080) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:21:33 executing program 5: accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/171) 00:21:33 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in6=@loopback}}, {{@in6=@private0}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000004c0)="ba8d62c2f0212d468fccc23d167234e26ca50c1ecdfde607534269bd266ab1d81110aabf5a7696ddbb257ab1c88ab08befc26c2fa175d0619112218578b2a4b36b1a0544ad8565ef3d1af4df125c1cda3541afa4d2079be1f7b8ebfcb08e0c7e3b2fc7b12371ba87edb90277b386fd50b9cf6f529211c4ebd77a88e5cd99b2553d7cf786053eae1fd8761b97d169392174729abb9adff6afa97f8919e19ea9e93d934a6d6958270448c72995408e2385c52360d51d2e64788f6a236fe7af80bc7128bbf6f8f23a8d3d3e0963f35a25858358b81fe259b07f4d9e1166b2d2a054f54734f25e41f9f8b5400ad9", 0xec) r0 = socket$inet6(0xa, 0x2, 0x7) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000005c0)={@loopback}, &(0x7f0000000600)=0x14) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000240)=ANY=[@ANYBLOB="736d61636b6673666c6f6f723d746d70667304d36d10d0721022922e002c61707072616973655f747970653d696d617369672c636f6e746578743d756e636f6e66696e6564"]) 00:21:33 executing program 0: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) syslog(0xa, &(0x7f00000001c0)=""/126, 0x7e) 00:21:33 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, 0x0, 0x0) 00:21:33 executing program 0: syslog(0xa, &(0x7f00000001c0)=""/126, 0x7e) 00:21:33 executing program 5: mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/171) 00:21:33 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in6=@loopback}}, {{@in6=@private0}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000004c0)="ba8d62c2f0212d468fccc23d167234e26ca50c1ecdfde607534269bd266ab1d81110aabf5a7696ddbb257ab1c88ab08befc26c2fa175d0619112218578b2a4b36b1a0544ad8565ef3d1af4df125c1cda3541afa4d2079be1f7b8ebfcb08e0c7e3b2fc7b12371ba87edb90277b386fd50b9cf6f529211c4ebd77a88e5cd99b2553d7cf786053eae1fd8761b97d169392174729abb9adff6afa97f8919e19ea9e93d934a6d6958270448c72995408e2385c52360d51d2e64788f6a236fe7af80bc7128bbf6f8f23a8d3d3e0963f35a25858358b81fe259b07f4d9e1166b2d2a054f54734f25e41f9f8b5400ad9", 0xec) r0 = socket$inet6(0xa, 0x2, 0x7) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000005c0)={@loopback}, &(0x7f0000000600)=0x14) [ 733.203342][ T25] audit: type=1326 audit(1622679693.878:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9786 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0, 0xffffffffffffff90}}, 0x41) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x158, 0x0, 0x600, 0x70bd26, 0x25dfdbff, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0x9, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x83}}, {0x8, 0x9, 0xfffffffd}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x7}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x4}}]}, 0x158}, 0x1, 0x0, 0x0, 0x4008c00}, 0x20000080) 00:21:33 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000740), 0x4) 00:21:34 executing program 1: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x800, 0x5, 0x8, 0x7}]}) syslog(0x3, &(0x7f0000000100)=""/87, 0x57) pkey_alloc(0x0, 0x5) 00:21:34 executing program 0: syslog(0x0, &(0x7f00000001c0)=""/126, 0x7e) 00:21:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0, 0xffffffffffffff90}}, 0x41) 00:21:34 executing program 5: mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/171) 00:21:34 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, 0x0, 0x0) 00:21:34 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in6=@loopback}}, {{@in6=@private0}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000004c0)="ba8d62c2f0212d468fccc23d167234e26ca50c1ecdfde607534269bd266ab1d81110aabf5a7696ddbb257ab1c88ab08befc26c2fa175d0619112218578b2a4b36b1a0544ad8565ef3d1af4df125c1cda3541afa4d2079be1f7b8ebfcb08e0c7e3b2fc7b12371ba87edb90277b386fd50b9cf6f529211c4ebd77a88e5cd99b2553d7cf786053eae1fd8761b97d169392174729abb9adff6afa97f8919e19ea9e93d934a6d6958270448c72995408e2385c52360d51d2e64788f6a236fe7af80bc7128bbf6f8f23a8d3d3e0963f35a25858358b81fe259b07f4d9e1166b2d2a054f54734f25e41f9f8b5400ad9", 0xec) socket$inet6(0xa, 0x2, 0x7) 00:21:34 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in6=@loopback}}, {{@in6=@private0}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) socket$inet6(0xa, 0x2, 0x7) 00:21:34 executing program 0: syslog(0x0, &(0x7f00000001c0)=""/126, 0x7e) 00:21:34 executing program 5: mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/171) 00:21:34 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, 0x0, 0x0) 00:21:34 executing program 2: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0, 0xffffffffffffff90}}, 0x41) 00:21:34 executing program 3: socket$inet6(0xa, 0x2, 0x7) [ 734.107529][ T25] audit: type=1326 audit(1622679694.778:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9840 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:35 executing program 1: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x800, 0x5, 0x8, 0x7}]}) syslog(0x3, &(0x7f0000000100)=""/87, 0x57) 00:21:35 executing program 3: socket$inet6(0xa, 0x0, 0x7) 00:21:35 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, 0x0, 0x0) 00:21:35 executing program 0: syslog(0x0, &(0x7f00000001c0)=""/126, 0x7e) 00:21:35 executing program 5: accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000180)) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/171) 00:21:35 executing program 2: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0, 0xffffffffffffff90}}, 0x41) 00:21:35 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, 0x0, 0x0) 00:21:35 executing program 0: syslog(0xa, 0x0, 0x0) [ 734.949712][ T25] audit: type=1326 audit(1622679695.628:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9874 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:35 executing program 3: socket$inet6(0xa, 0x0, 0x7) 00:21:35 executing program 0: getrusage(0x1, &(0x7f0000000140)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000000c0)=""/114, 0x72) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000340)=ANY=[@ANYBLOB="79465e3dba10de9bd642d44241594fee5ade82b0d7a10ed7c765ca23b6b76c65a89e58415b4f4e8691d3f310e1f97262e378e24003dda055bb138b3c787d5c8346f39e8259407b0dae28a2e65616483a503867610bf1acea7acd0d4965fbcc23c0dbcab8a85fa96ff291f9381aad441737e2aa4a4da52ed89a55ecd641a2e32201eadc93e7aace7f98396dd56eb51f09afc3373dc1ed96f7ce4eff0515ff4bc433"]) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000002c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000300)={@mcast2, 0x74, r1}) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 00:21:35 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, 0x0, 0x0) 00:21:35 executing program 2: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0, 0xffffffffffffff90}}, 0x41) 00:21:36 executing program 1: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) syslog(0x3, &(0x7f0000000100)=""/87, 0x57) 00:21:36 executing program 5: accept$inet6(0xffffffffffffffff, 0x0, 0x0) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/171) 00:21:36 executing program 0: getrusage(0x1, &(0x7f0000000140)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000000c0)=""/114, 0x72) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000340)=ANY=[@ANYBLOB="79465e3dba10de9bd642d44241594fee5ade82b0d7a10ed7c765ca23b6b76c65a89e58415b4f4e8691d3f310e1f97262e378e24003dda055bb138b3c787d5c8346f39e8259407b0dae28a2e65616483a503867610bf1acea7acd0d4965fbcc23c0dbcab8a85fa96ff291f9381aad441737e2aa4a4da52ed89a55ecd641a2e32201eadc93e7aace7f98396dd56eb51f09afc3373dc1ed96f7ce4eff0515ff4bc433"]) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000002c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000300)={@mcast2, 0x74, r1}) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 00:21:36 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0, 0xffffffffffffff90}}, 0x41) 00:21:36 executing program 3: socket$inet6(0xa, 0x0, 0x7) 00:21:36 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, 0x0, 0x0) 00:21:36 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, 0x0, 0x0) 00:21:36 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, 0x0, 0x0) 00:21:36 executing program 3: socket$inet6(0xa, 0x2, 0x0) 00:21:36 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0, 0xffffffffffffff90}}, 0x41) 00:21:36 executing program 5: accept$inet6(0xffffffffffffffff, 0x0, 0x0) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/171) 00:21:36 executing program 0: getrusage(0x1, &(0x7f0000000140)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000000c0)=""/114, 0x72) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000340)=ANY=[@ANYBLOB="79465e3dba10de9bd642d44241594fee5ade82b0d7a10ed7c765ca23b6b76c65a89e58415b4f4e8691d3f310e1f97262e378e24003dda055bb138b3c787d5c8346f39e8259407b0dae28a2e65616483a503867610bf1acea7acd0d4965fbcc23c0dbcab8a85fa96ff291f9381aad441737e2aa4a4da52ed89a55ecd641a2e32201eadc93e7aace7f98396dd56eb51f09afc3373dc1ed96f7ce4eff0515ff4bc433"]) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000002c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000300)={@mcast2, 0x74, r1}) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 00:21:36 executing program 1: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) syslog(0x3, &(0x7f0000000100)=""/87, 0x57) 00:21:36 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, 0x0, 0x0) 00:21:36 executing program 3: socket$inet6(0xa, 0x2, 0x0) 00:21:36 executing program 5: accept$inet6(0xffffffffffffffff, 0x0, 0x0) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/171) 00:21:36 executing program 0: getrusage(0x1, &(0x7f0000000140)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000000c0)=""/114, 0x72) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000340)=ANY=[@ANYBLOB="79465e3dba10de9bd642d44241594fee5ade82b0d7a10ed7c765ca23b6b76c65a89e58415b4f4e8691d3f310e1f97262e378e24003dda055bb138b3c787d5c8346f39e8259407b0dae28a2e65616483a503867610bf1acea7acd0d4965fbcc23c0dbcab8a85fa96ff291f9381aad441737e2aa4a4da52ed89a55ecd641a2e32201eadc93e7aace7f98396dd56eb51f09afc3373dc1ed96f7ce4eff0515ff4bc433"]) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000002c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000300)={@mcast2, 0x74, r1}) 00:21:36 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0, 0xffffffffffffff90}}, 0x41) 00:21:36 executing program 0: getrusage(0x1, &(0x7f0000000140)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000000c0)=""/114, 0x72) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000340)=ANY=[@ANYBLOB="79465e3dba10de9bd642d44241594fee5ade82b0d7a10ed7c765ca23b6b76c65a89e58415b4f4e8691d3f310e1f97262e378e24003dda055bb138b3c787d5c8346f39e8259407b0dae28a2e65616483a503867610bf1acea7acd0d4965fbcc23c0dbcab8a85fa96ff291f9381aad441737e2aa4a4da52ed89a55ecd641a2e32201eadc93e7aace7f98396dd56eb51f09afc3373dc1ed96f7ce4eff0515ff4bc433"]) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000002c0)=0x14) 00:21:36 executing program 3: socket$inet6(0xa, 0x2, 0x0) 00:21:36 executing program 4: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, 0x0, 0x0) 00:21:36 executing program 5: accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000180)) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 00:21:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, 0x0, 0x41) 00:21:36 executing program 3: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x3f, 0x3, 0x10001}, {0xfff8, 0x4, 0x96, 0x91a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{0x6d9, 0x0, 0x7, 0x9}, {0x0, 0x9, 0x2, 0x2}, {0x9300, 0x40, 0x2, 0x5}, {0xf3f, 0x81, 0x3, 0x3}, {0x7ff, 0x2d, 0x96, 0x5}]}, 0x10) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x9, 0x4, 0xe2}]}) 00:21:36 executing program 1: syslog(0x3, &(0x7f0000000100)=""/87, 0x57) 00:21:36 executing program 0: getrusage(0x1, &(0x7f0000000140)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000000c0)=""/114, 0x72) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000340)=ANY=[@ANYBLOB="79465e3dba10de9bd642d44241594fee5ade82b0d7a10ed7c765ca23b6b76c65a89e58415b4f4e8691d3f310e1f97262e378e24003dda055bb138b3c787d5c8346f39e8259407b0dae28a2e65616483a503867610bf1acea7acd0d4965fbcc23c0dbcab8a85fa96ff291f9381aad441737e2aa4a4da52ed89a55ecd641a2e32201eadc93e7aace7f98396dd56eb51f09afc3373dc1ed96f7ce4eff0515ff4bc433"]) 00:21:36 executing program 4: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, 0x0, 0x0) 00:21:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, 0x0, 0x41) 00:21:36 executing program 5: accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000180)) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) [ 736.124524][ T25] audit: type=1326 audit(1622679696.798:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9981 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:36 executing program 5: accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000180)) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 00:21:36 executing program 4: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, 0x0, 0x0) 00:21:36 executing program 0: getrusage(0x1, &(0x7f0000000140)) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000000c0)=""/114, 0x72) 00:21:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) 00:21:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, 0x0, 0x41) 00:21:37 executing program 0: getrusage(0x1, &(0x7f0000000140)) 00:21:37 executing program 3: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x3f, 0x3, 0x10001}, {0xfff8, 0x4, 0x96, 0x91a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{0x6d9, 0x0, 0x7, 0x9}, {0x0, 0x9, 0x2, 0x2}, {0x9300, 0x40, 0x2, 0x5}, {0xf3f, 0x81, 0x3, 0x3}, {0x7ff, 0x2d, 0x96, 0x5}]}, 0x10) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x9, 0x4, 0xe2}]}) 00:21:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) 00:21:37 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000500)={[{@huge_advise}, {@mpol={'mpol', 0x3d, {'bind'}}}]}) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x1c, 0x800) syz_mount_image$nfs(&(0x7f0000000140), &(0x7f0000000180)='./file1\x00', 0x534, 0x3, &(0x7f0000000400)=[{&(0x7f00000001c0)="cd18f887f573e75c001a7784abbbc50baec47054141274489b4c36624e428e157df73dcd26b3038b5bd0088c1fd41a4478c7d12cd35a3824f785b70b95e9ec296270a635d11cec6cc783a8b5d81f01c0cb5020decf57a882a7f493a1a8394778ddd6f9565e76596be00563450828b026871ee6626b8d30988433aef5f1a4b1a8454674114c3ebc3f3012d83cc096bf6fb8b266416f327666bd3b3bf082d1a11c966a17cfc12dc26459a5154a933953c8b075c803fc7dfdb883bac188a08805992fa6d1dc8baca8c56d1311267fbd5a749e241ffe", 0xd4, 0x8001}, {&(0x7f00000002c0)="1e9dcb7edf19b9a0502d2422d84d618339b59189ee58ab657d809b37a478fd22fd92ec51868b82a7434e495d9802b68180b272c10aca643459b91714ed1744f35a5e4753b0ea0578f1723d3e40778822349369e796214554f90a4bdd817aba7c96d88e13faa761aa26745acfb56fe05a2d13524b100742a78de69a1922d4d8fe56058098c0e821c8c01b57e820102cb1e290346edb45070e99bbb22f99cc7fc1b633aa5ad3f729a87899176cc8805e25705c8540dab5e4a8e2d6116240f02b2d013097611414d86c754d933ce335fa5cf958f523e21dca0e5089c0e4291a428d", 0xe0, 0x10001}, {&(0x7f00000003c0)="f9819fbca93d1ec3321d720ecfa62d8d99ddb5191596c59183f014248cb3d9845a124dae7cbb0abdd69005e3d76ab62f", 0x30, 0x800}], 0x2810020, &(0x7f0000000480)={[{'tmpfs\x00'}, {'tmpfs\x00'}, {'tls\x00'}, {}], [{@subj_user={'subj_user', 0x3d, 'tmpfs\x00'}}]}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100), 0x4) open$dir(&(0x7f00000004c0)='./file0\x00', 0x2000, 0xb2) 00:21:37 executing program 1: syslog(0x0, &(0x7f0000000100)=""/87, 0x57) 00:21:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x41) 00:21:37 executing program 0: getrusage(0x0, &(0x7f0000000140)) [ 736.979910][T10031] loop5: detected capacity change from 0 to 256 00:21:37 executing program 1: syslog(0x0, &(0x7f0000000100)=""/87, 0x57) 00:21:37 executing program 0: getrusage(0x0, &(0x7f0000000140)) 00:21:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) 00:21:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x41) [ 737.007348][ T25] audit: type=1326 audit(1622679697.688:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10039 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:37 executing program 5: getrusage(0x0, &(0x7f0000000140)) 00:21:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x41) 00:21:38 executing program 3: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x3f, 0x3, 0x10001}, {0xfff8, 0x4, 0x96, 0x91a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{0x6d9, 0x0, 0x7, 0x9}, {0x0, 0x9, 0x2, 0x2}, {0x9300, 0x40, 0x2, 0x5}, {0xf3f, 0x81, 0x3, 0x3}, {0x7ff, 0x2d, 0x96, 0x5}]}, 0x10) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x9, 0x4, 0xe2}]}) 00:21:38 executing program 5: getrusage(0x0, &(0x7f0000000140)) 00:21:38 executing program 0: getrusage(0x0, &(0x7f0000000140)) 00:21:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, 0x0}, 0x41) 00:21:38 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x3b6bff, &(0x7f00000000c0)=ANY=[]) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1, 0xe15d, 0x6, 0x0, 0x1, 0x5, 0x3f}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) 00:21:38 executing program 1: syslog(0x0, &(0x7f0000000100)=""/87, 0x57) 00:21:38 executing program 1: syslog(0x3, 0x0, 0x0) 00:21:38 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x3b6bff, &(0x7f00000000c0)=ANY=[]) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1, 0xe15d, 0x6, 0x0, 0x1, 0x5, 0x3f}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) 00:21:38 executing program 0: getrusage(0x1, 0x0) 00:21:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, 0x0}, 0x41) 00:21:38 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x20010, r2, 0x0) [ 737.911510][ T25] audit: type=1326 audit(1622679698.588:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10080 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:38 executing program 1: syslog(0x3, 0x0, 0x0) [ 737.999462][ T25] audit: type=1326 audit(1622679698.668:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10091 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:39 executing program 3: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x3f, 0x3, 0x10001}, {0xfff8, 0x4, 0x96, 0x91a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{0x6d9, 0x0, 0x7, 0x9}, {0x0, 0x9, 0x2, 0x2}, {0x9300, 0x40, 0x2, 0x5}, {0xf3f, 0x81, 0x3, 0x3}, {0x7ff, 0x2d, 0x96, 0x5}]}, 0x10) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) 00:21:39 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x3b6bff, &(0x7f00000000c0)=ANY=[]) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1, 0xe15d, 0x6, 0x0, 0x1, 0x5, 0x3f}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) 00:21:39 executing program 0: getrusage(0x1, 0x0) 00:21:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, 0x0}, 0x41) 00:21:39 executing program 1: syslog(0x3, 0x0, 0x0) 00:21:39 executing program 1: syslog(0x3, 0x0, 0x0) 00:21:39 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x3b6bff, &(0x7f00000000c0)=ANY=[]) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1, 0xe15d, 0x6, 0x0, 0x1, 0x5, 0x3f}, 0x1c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2f, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) 00:21:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0, 0xffffffffffffff90}}, 0x0) 00:21:39 executing program 0: getrusage(0x1, 0x0) 00:21:39 executing program 3: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x3f, 0x3, 0x10001}, {0xfff8, 0x4, 0x96, 0x91a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{0x6d9, 0x0, 0x7, 0x9}, {0x0, 0x9, 0x2, 0x2}, {0x9300, 0x40, 0x2, 0x5}, {0xf3f, 0x81, 0x3, 0x3}, {0x7ff, 0x2d, 0x96, 0x5}]}, 0x10) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) 00:21:39 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x20010, r2, 0x0) 00:21:39 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x3b6bff, &(0x7f00000000c0)=ANY=[]) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1, 0xe15d, 0x6, 0x0, 0x1, 0x5, 0x3f}, 0x1c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2f, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) 00:21:39 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x3f, 0x3, 0x10001}, {0xfff8, 0x4, 0x96, 0x91a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{0x6d9, 0x0, 0x7, 0x9}, {0x0, 0x9, 0x2, 0x2}, {0x9300, 0x40, 0x2, 0x5}, {0xf3f, 0x81, 0x3, 0x3}, {0x7ff, 0x2d, 0x96, 0x5}]}, 0x10) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) 00:21:39 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x3b6bff, &(0x7f00000000c0)=ANY=[]) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1, 0xe15d, 0x6, 0x0, 0x1, 0x5, 0x3f}, 0x1c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2f, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) 00:21:39 executing program 2: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x20010, r2, 0x0) 00:21:39 executing program 1: syslog(0x3, 0x0, 0x0) [ 738.880195][ T25] audit: type=1326 audit(1622679699.558:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10131 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:39 executing program 3: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x3f, 0x3, 0x10001}, {0xfff8, 0x4, 0x96, 0x91a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{0x6d9, 0x0, 0x7, 0x9}, {0x0, 0x9, 0x2, 0x2}, {0x9300, 0x40, 0x2, 0x5}, {0xf3f, 0x81, 0x3, 0x3}, {0x7ff, 0x2d, 0x96, 0x5}]}, 0x10) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) 00:21:39 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x3f, 0x3, 0x10001}, {0xfff8, 0x4, 0x96, 0x91a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{0x6d9, 0x0, 0x7, 0x9}, {0x0, 0x9, 0x2, 0x2}, {0x9300, 0x40, 0x2, 0x5}, {0xf3f, 0x81, 0x3, 0x3}, {0x7ff, 0x2d, 0x96, 0x5}]}, 0x10) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) 00:21:39 executing program 1: syslog(0x3, 0x0, 0x0) 00:21:39 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x3b6bff, &(0x7f00000000c0)=ANY=[]) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) [ 738.976722][ T25] audit: type=1326 audit(1622679699.648:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10146 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:39 executing program 3: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x3f, 0x3, 0x10001}, {0xfff8, 0x4, 0x96, 0x91a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{0x6d9, 0x0, 0x7, 0x9}, {0x0, 0x9, 0x2, 0x2}, {0x9300, 0x40, 0x2, 0x5}, {0xf3f, 0x81, 0x3, 0x3}, {0x7ff, 0x2d, 0x96, 0x5}]}, 0x10) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) 00:21:39 executing program 1: syslog(0x0, 0x0, 0x0) 00:21:40 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x20010, r2, 0x0) 00:21:40 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x3f, 0x3, 0x10001}, {0xfff8, 0x4, 0x96, 0x91a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{0x6d9, 0x0, 0x7, 0x9}, {0x0, 0x9, 0x2, 0x2}, {0x9300, 0x40, 0x2, 0x5}, {0xf3f, 0x81, 0x3, 0x3}, {0x7ff, 0x2d, 0x96, 0x5}]}, 0x10) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) 00:21:40 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x3b6bff, &(0x7f00000000c0)=ANY=[]) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x2f, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) 00:21:40 executing program 3: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x3f, 0x3, 0x10001}, {0xfff8, 0x4, 0x96, 0x91a}]}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) 00:21:40 executing program 2: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x20010, r2, 0x0) 00:21:40 executing program 1: syslog(0x0, 0x0, 0x0) 00:21:40 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x3b6bff, &(0x7f00000000c0)=ANY=[]) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x2f, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) 00:21:40 executing program 3: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) 00:21:40 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x3f, 0x3, 0x10001}, {0xfff8, 0x4, 0x96, 0x91a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{0x6d9, 0x0, 0x7, 0x9}, {0x0, 0x9, 0x2, 0x2}, {0x9300, 0x40, 0x2, 0x5}, {0xf3f, 0x81, 0x3, 0x3}, {0x7ff, 0x2d, 0x96, 0x5}]}, 0x10) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) [ 739.752095][ T25] audit: type=1326 audit(1622679700.428:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10187 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:40 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x3f, 0x3, 0x10001}, {0xfff8, 0x4, 0x96, 0x91a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{0x6d9, 0x0, 0x7, 0x9}, {0x0, 0x9, 0x2, 0x2}, {0x9300, 0x40, 0x2, 0x5}, {0xf3f, 0x81, 0x3, 0x3}, {0x7ff, 0x2d, 0x96, 0x5}]}, 0x10) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) 00:21:40 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x2f, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) 00:21:40 executing program 3: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) [ 739.844840][ T25] audit: type=1326 audit(1622679700.518:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10200 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:41 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) 00:21:41 executing program 1: syslog(0x0, 0x0, 0x0) 00:21:41 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2f, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) 00:21:41 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) 00:21:41 executing program 2: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x20010, r2, 0x0) 00:21:41 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x3f, 0x3, 0x10001}, {0xfff8, 0x4, 0x96, 0x91a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{0x6d9, 0x0, 0x7, 0x9}, {0x0, 0x9, 0x2, 0x2}, {0x9300, 0x40, 0x2, 0x5}, {0xf3f, 0x81, 0x3, 0x3}, {0x7ff, 0x2d, 0x96, 0x5}]}, 0x10) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) 00:21:41 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) 00:21:41 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2f, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) 00:21:41 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x9, 0x3, 0x20, 0x200}, {0x7, 0x7, 0x1, 0x9}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x7, &(0x7f0000000100)=[{0x3, 0x2, 0x1, 0x3}, {0x1000, 0x5, 0x5, 0x2}, {0x3ff, 0xcb, 0x4, 0x6}, {0x5, 0xfb, 0x0, 0x3}, {0x2, 0x0, 0x4, 0x9}, {0xffff, 0xff, 0x9, 0xfffffffd}, {0xa11d, 0x2, 0x20, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x47b7, 0x3f, 0x81, 0xff}]}) prctl$PR_SET_SECCOMP(0xd, 0x0, 0x0) clock_gettime(0x4, &(0x7f0000000180)) clock_gettime(0x4, &(0x7f00000001c0)) [ 740.628705][ T25] audit: type=1326 audit(1622679701.308:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10229 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:41 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x3f, 0x3, 0x10001}, {0xfff8, 0x4, 0x96, 0x91a}]}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) 00:21:41 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) 00:21:41 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2f, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) [ 740.716308][ T25] audit: type=1326 audit(1622679701.398:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10244 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 [ 740.778113][ T25] audit: type=1326 audit(1622679701.428:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10245 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:42 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:42 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) 00:21:42 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="220826bd7000fcdbdf25020000000800ff0f0000010100000000060001004e200000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) 00:21:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) 00:21:42 executing program 2: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) 00:21:42 executing program 0: prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) 00:21:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) 00:21:42 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) 00:21:42 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x9, 0x3, 0x20, 0x200}, {0x7, 0x7, 0x1, 0x9}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x7, &(0x7f0000000100)=[{0x3, 0x2, 0x1, 0x3}, {0x1000, 0x5, 0x5, 0x2}, {0x3ff, 0xcb, 0x4, 0x6}, {0x5, 0xfb, 0x0, 0x3}, {0x2, 0x0, 0x4, 0x9}, {0xffff, 0xff, 0x9, 0xfffffffd}, {0xa11d, 0x2, 0x20, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x47b7, 0x3f, 0x81, 0xff}]}) prctl$PR_SET_SECCOMP(0xd, 0x0, 0x0) clock_gettime(0x4, &(0x7f0000000180)) clock_gettime(0x4, &(0x7f00000001c0)) [ 741.512441][ T25] audit: type=1326 audit(1622679702.188:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10276 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) 00:21:42 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f00000000c0)="c0e551dad218290786d356485225a9b1ef770473ce82df907d531922abbde9284f98296622ae979b72bbc9adac5a502f497ee67fd7f49801e9f1c3ae66791c99103a57edf6fe6e0db73a4559c3b8c61b7c", 0x51) 00:21:42 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) 00:21:43 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) 00:21:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) 00:21:43 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x2f, 0x0, 0x0) 00:21:43 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f0000000280)) 00:21:43 executing program 2: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:43 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) 00:21:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) 00:21:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) 00:21:43 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x9, 0x3, 0x20, 0x200}, {0x7, 0x7, 0x1, 0x9}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x7, &(0x7f0000000100)=[{0x3, 0x2, 0x1, 0x3}, {0x1000, 0x5, 0x5, 0x2}, {0x3ff, 0xcb, 0x4, 0x6}, {0x5, 0xfb, 0x0, 0x3}, {0x2, 0x0, 0x4, 0x9}, {0xffff, 0xff, 0x9, 0xfffffffd}, {0xa11d, 0x2, 0x20, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x47b7, 0x3f, 0x81, 0xff}]}) prctl$PR_SET_SECCOMP(0xd, 0x0, 0x0) clock_gettime(0x4, &(0x7f0000000180)) clock_gettime(0x4, &(0x7f00000001c0)) 00:21:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) 00:21:43 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) 00:21:43 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) 00:21:43 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) 00:21:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) 00:21:43 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) 00:21:43 executing program 4: ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, 0x0) 00:21:43 executing program 2: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) 00:21:43 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) 00:21:43 executing program 4: ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, 0x0) [ 743.239890][ T25] kauditd_printk_skb: 6 callbacks suppressed [ 743.239902][ T25] audit: type=1326 audit(1622679703.918:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10373 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:44 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x9, 0x3, 0x20, 0x200}, {0x7, 0x7, 0x1, 0x9}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x7, &(0x7f0000000100)=[{0x3, 0x2, 0x1, 0x3}, {0x1000, 0x5, 0x5, 0x2}, {0x3ff, 0xcb, 0x4, 0x6}, {0x5, 0xfb, 0x0, 0x3}, {0x2, 0x0, 0x4, 0x9}, {0xffff, 0xff, 0x9, 0xfffffffd}, {0xa11d, 0x2, 0x20, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x47b7, 0x3f, 0x81, 0xff}]}) prctl$PR_SET_SECCOMP(0xd, 0x0, 0x0) clock_gettime(0x4, &(0x7f0000000180)) 00:21:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) 00:21:44 executing program 4: ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, 0x0) 00:21:44 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) [ 743.340045][ T25] audit: type=1326 audit(1622679704.018:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10384 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) [ 743.423795][ T25] audit: type=1326 audit(1622679704.098:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10397 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 [ 743.473344][ T25] audit: type=1326 audit(1622679704.138:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10401 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:44 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) 00:21:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) 00:21:44 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x7, 0x1f, 0x20}, {0x2, 0x1, 0x3, 0x400}, {0x22e, 0x7f, 0x9, 0x3ff}, {0x3f, 0x82, 0x7, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{0x1f, 0x80, 0x1, 0x2df}, {0x9f1, 0x5, 0x3f, 0x101}, {0x5, 0x3f, 0x48, 0x9}, {0x7fff, 0xb7, 0x8, 0x3ff}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{0x72, 0x55, 0x80, 0xee}, {0x101, 0x1f, 0x4, 0xffff}, {0x6, 0x0, 0x5, 0x8}, {0x6, 0x7, 0x8, 0x9}, {0x1, 0x0, 0x7}, {0xfffe, 0x51, 0x9a, 0x3a5f}, {0x3, 0x0, 0x9, 0x8}, {0xc3, 0x2, 0x9, 0x10001}, {0xfdd0, 0x2, 0x8}]}, 0x10) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x7f, 0x6}, {0x2b, 0x3ff}]}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x82, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000480)={0x0, 0x0, {0x38, 0x19, 0x10, 0x1c, 0x2, 0xd8, 0x6, 0xbe, 0x1}}) r2 = accept$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000440)={0x8, &(0x7f0000000400)=[{0x1, 0x0, 0x1, 0x3}, {0x2, 0x40, 0x2, 0x8}, {0x8, 0x7c, 0x7, 0x1}, {0x2, 0x4, 0x81, 0x3}, {0x5, 0x5, 0x1, 0x10000}, {0x4, 0x20, 0x40, 0xfff}, {0xbd7e, 0x2, 0x1, 0x5}, {0x4, 0x9, 0x3f, 0x7f}]}, 0x10) getsockopt$packet_buf(r1, 0x107, 0x18, &(0x7f0000000300)=""/58, &(0x7f0000000340)=0x3a) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) 00:21:44 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, 0x0) 00:21:44 executing program 2: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) [ 744.097258][ T25] audit: type=1326 audit(1622679704.778:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10417 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 [ 744.121448][ T25] audit: type=1326 audit(1622679704.798:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10422 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:44 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, 0x0) 00:21:44 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, 0x0) [ 744.185968][ T25] audit: type=1326 audit(1622679704.868:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10430 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:44 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x9, 0x3, 0x20, 0x200}, {0x7, 0x7, 0x1, 0x9}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x7, &(0x7f0000000100)=[{0x3, 0x2, 0x1, 0x3}, {0x1000, 0x5, 0x5, 0x2}, {0x3ff, 0xcb, 0x4, 0x6}, {0x5, 0xfb, 0x0, 0x3}, {0x2, 0x0, 0x4, 0x9}, {0xffff, 0xff, 0x9, 0xfffffffd}, {0xa11d, 0x2, 0x20, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x47b7, 0x3f, 0x81, 0xff}]}) clock_gettime(0x4, &(0x7f0000000180)) 00:21:44 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x2, 0x0) mlock2(&(0x7f00003ff000/0xc00000)=nil, 0xc00000, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e23, 0x8001, @private2, 0x8}, {0xa, 0x4e22, 0x8291, @remote, 0xffff}, 0x8, [0x0, 0xc45, 0x9, 0x4, 0x1, 0x64e7, 0x8001, 0x3]}, 0x5c) 00:21:44 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) [ 744.278393][ T25] audit: type=1326 audit(1622679704.948:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10446 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:45 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x2, 0x0) mlock2(&(0x7f00003ff000/0xc00000)=nil, 0xc00000, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e23, 0x8001, @private2, 0x8}, {0xa, 0x4e22, 0x8291, @remote, 0xffff}, 0x8, [0x0, 0xc45, 0x9, 0x4, 0x1, 0x64e7, 0x8001, 0x3]}, 0x5c) [ 744.324931][ T25] audit: type=1326 audit(1622679704.998:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10451 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:45 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x2, 0x0) mlock2(&(0x7f00003ff000/0xc00000)=nil, 0xc00000, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e23, 0x8001, @private2, 0x8}, {0xa, 0x4e22, 0x8291, @remote, 0xffff}, 0x8, [0x0, 0xc45, 0x9, 0x4, 0x1, 0x64e7, 0x8001, 0x3]}, 0x5c) 00:21:45 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:45 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x2, 0x0) mlock2(&(0x7f00003ff000/0xc00000)=nil, 0xc00000, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) 00:21:45 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x7, 0x1f, 0x20}, {0x2, 0x1, 0x3, 0x400}, {0x22e, 0x7f, 0x9, 0x3ff}, {0x3f, 0x82, 0x7, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{0x1f, 0x80, 0x1, 0x2df}, {0x9f1, 0x5, 0x3f, 0x101}, {0x5, 0x3f, 0x48, 0x9}, {0x7fff, 0xb7, 0x8, 0x3ff}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{0x72, 0x55, 0x80, 0xee}, {0x101, 0x1f, 0x4, 0xffff}, {0x6, 0x0, 0x5, 0x8}, {0x6, 0x7, 0x8, 0x9}, {0x1, 0x0, 0x7}, {0xfffe, 0x51, 0x9a, 0x3a5f}, {0x3, 0x0, 0x9, 0x8}, {0xc3, 0x2, 0x9, 0x10001}, {0xfdd0, 0x2, 0x8}]}, 0x10) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x7f, 0x6}, {0x2b, 0x3ff}]}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x82, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000480)={0x0, 0x0, {0x38, 0x19, 0x10, 0x1c, 0x2, 0xd8, 0x6, 0xbe, 0x1}}) r2 = accept$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000440)={0x8, &(0x7f0000000400)=[{0x1, 0x0, 0x1, 0x3}, {0x2, 0x40, 0x2, 0x8}, {0x8, 0x7c, 0x7, 0x1}, {0x2, 0x4, 0x81, 0x3}, {0x5, 0x5, 0x1, 0x10000}, {0x4, 0x20, 0x40, 0xfff}, {0xbd7e, 0x2, 0x1, 0x5}, {0x4, 0x9, 0x3f, 0x7f}]}, 0x10) getsockopt$packet_buf(r1, 0x107, 0x18, &(0x7f0000000300)=""/58, &(0x7f0000000340)=0x3a) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) 00:21:45 executing program 2: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) [ 744.989489][ T25] audit: type=1326 audit(1622679705.668:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10470 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:45 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x2, 0x0) mlock2(&(0x7f00003ff000/0xc00000)=nil, 0xc00000, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 00:21:45 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x9, 0x3, 0x20, 0x200}, {0x7, 0x7, 0x1, 0x9}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x7, &(0x7f0000000100)=[{0x3, 0x2, 0x1, 0x3}, {0x1000, 0x5, 0x5, 0x2}, {0x3ff, 0xcb, 0x4, 0x6}, {0x5, 0xfb, 0x0, 0x3}, {0x2, 0x0, 0x4, 0x9}, {0xffff, 0xff, 0x9, 0xfffffffd}, {0xa11d, 0x2, 0x20, 0x3}]}) clock_gettime(0x4, &(0x7f0000000180)) 00:21:45 executing program 4: prctl$PR_SET_SECCOMP(0x7, 0x2, 0x0) mlock2(&(0x7f00003ff000/0xc00000)=nil, 0xc00000, 0x0) 00:21:45 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:45 executing program 4: mlock2(&(0x7f00003ff000/0xc00000)=nil, 0xc00000, 0x0) 00:21:45 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) 00:21:46 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:46 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x7, 0x1f, 0x20}, {0x2, 0x1, 0x3, 0x400}, {0x22e, 0x7f, 0x9, 0x3ff}, {0x3f, 0x82, 0x7, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{0x1f, 0x80, 0x1, 0x2df}, {0x9f1, 0x5, 0x3f, 0x101}, {0x5, 0x3f, 0x48, 0x9}, {0x7fff, 0xb7, 0x8, 0x3ff}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{0x72, 0x55, 0x80, 0xee}, {0x101, 0x1f, 0x4, 0xffff}, {0x6, 0x0, 0x5, 0x8}, {0x6, 0x7, 0x8, 0x9}, {0x1, 0x0, 0x7}, {0xfffe, 0x51, 0x9a, 0x3a5f}, {0x3, 0x0, 0x9, 0x8}, {0xc3, 0x2, 0x9, 0x10001}, {0xfdd0, 0x2, 0x8}]}, 0x10) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x7f, 0x6}, {0x2b, 0x3ff}]}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x82, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000480)={0x0, 0x0, {0x38, 0x19, 0x10, 0x1c, 0x2, 0xd8, 0x6, 0xbe, 0x1}}) r2 = accept$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000440)={0x8, &(0x7f0000000400)=[{0x1, 0x0, 0x1, 0x3}, {0x2, 0x40, 0x2, 0x8}, {0x8, 0x7c, 0x7, 0x1}, {0x2, 0x4, 0x81, 0x3}, {0x5, 0x5, 0x1, 0x10000}, {0x4, 0x20, 0x40, 0xfff}, {0xbd7e, 0x2, 0x1, 0x5}, {0x4, 0x9, 0x3f, 0x7f}]}, 0x10) getsockopt$packet_buf(r1, 0x107, 0x18, &(0x7f0000000300)=""/58, &(0x7f0000000340)=0x3a) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) 00:21:46 executing program 2: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) socket$packet(0x11, 0x2, 0x300) 00:21:46 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x9, 0x3, 0x20, 0x200}, {0x7, 0x7, 0x1, 0x9}]}) clock_gettime(0x4, &(0x7f0000000180)) 00:21:46 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) clock_gettime(0x4, &(0x7f0000000180)) 00:21:46 executing program 1: clock_gettime(0x4, &(0x7f0000000180)) 00:21:46 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) 00:21:46 executing program 1: clock_gettime(0x0, &(0x7f0000000180)) 00:21:46 executing program 1: clock_gettime(0x0, &(0x7f0000000180)) 00:21:46 executing program 1: clock_gettime(0x0, &(0x7f0000000180)) 00:21:46 executing program 1: clock_gettime(0x4, 0x0) 00:21:46 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) 00:21:47 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:47 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x7, 0x1f, 0x20}, {0x2, 0x1, 0x3, 0x400}, {0x22e, 0x7f, 0x9, 0x3ff}, {0x3f, 0x82, 0x7, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{0x1f, 0x80, 0x1, 0x2df}, {0x9f1, 0x5, 0x3f, 0x101}, {0x5, 0x3f, 0x48, 0x9}, {0x7fff, 0xb7, 0x8, 0x3ff}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{0x72, 0x55, 0x80, 0xee}, {0x101, 0x1f, 0x4, 0xffff}, {0x6, 0x0, 0x5, 0x8}, {0x6, 0x7, 0x8, 0x9}, {0x1, 0x0, 0x7}, {0xfffe, 0x51, 0x9a, 0x3a5f}, {0x3, 0x0, 0x9, 0x8}, {0xc3, 0x2, 0x9, 0x10001}, {0xfdd0, 0x2, 0x8}]}, 0x10) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x7f, 0x6}, {0x2b, 0x3ff}]}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x82, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000480)={0x0, 0x0, {0x38, 0x19, 0x10, 0x1c, 0x2, 0xd8, 0x6, 0xbe, 0x1}}) r2 = accept$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000440)={0x8, &(0x7f0000000400)=[{0x1, 0x0, 0x1, 0x3}, {0x2, 0x40, 0x2, 0x8}, {0x8, 0x7c, 0x7, 0x1}, {0x2, 0x4, 0x81, 0x3}, {0x5, 0x5, 0x1, 0x10000}, {0x4, 0x20, 0x40, 0xfff}, {0xbd7e, 0x2, 0x1, 0x5}, {0x4, 0x9, 0x3f, 0x7f}]}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) 00:21:47 executing program 2: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) 00:21:47 executing program 1: clock_gettime(0x4, 0x0) 00:21:47 executing program 1: clock_gettime(0x4, 0x0) 00:21:47 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x9, 0x3, 0x20, 0x200}, {0x7, 0x7, 0x1, 0x9}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x7, &(0x7f0000000100)=[{0x3, 0x2, 0x1, 0x3}, {0x1000, 0x5, 0x5, 0x2}, {0x3ff, 0xcb, 0x4, 0x6}, {0x5, 0xfb, 0x0, 0x3}, {0x2, 0x0, 0x4, 0x9}, {0xffff, 0xff, 0x9, 0xfffffffd}, {0xa11d, 0x2, 0x20, 0x3}]}) clock_gettime(0x4, &(0x7f0000000180)) 00:21:47 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) 00:21:47 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) 00:21:48 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:48 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x7, 0x1f, 0x20}, {0x2, 0x1, 0x3, 0x400}, {0x22e, 0x7f, 0x9, 0x3ff}, {0x3f, 0x82, 0x7, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{0x1f, 0x80, 0x1, 0x2df}, {0x9f1, 0x5, 0x3f, 0x101}, {0x5, 0x3f, 0x48, 0x9}, {0x7fff, 0xb7, 0x8, 0x3ff}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{0x72, 0x55, 0x80, 0xee}, {0x101, 0x1f, 0x4, 0xffff}, {0x6, 0x0, 0x5, 0x8}, {0x6, 0x7, 0x8, 0x9}, {0x1, 0x0, 0x7}, {0xfffe, 0x51, 0x9a, 0x3a5f}, {0x3, 0x0, 0x9, 0x8}, {0xc3, 0x2, 0x9, 0x10001}, {0xfdd0, 0x2, 0x8}]}, 0x10) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x7f, 0x6}, {0x2b, 0x3ff}]}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x82, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000480)={0x0, 0x0, {0x38, 0x19, 0x10, 0x1c, 0x2, 0xd8, 0x6, 0xbe, 0x1}}) accept$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) 00:21:48 executing program 2: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) 00:21:48 executing program 1: r0 = syz_open_dev$rtc(&(0x7f0000000000), 0x1782, 0x2000) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) r1 = shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r1, &(0x7f0000c00000/0x400000)=nil, 0x4000) 00:21:48 executing program 1: r0 = syz_open_dev$rtc(&(0x7f0000000000), 0x1782, 0x2000) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) r1 = shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r1, &(0x7f0000c00000/0x400000)=nil, 0x4000) 00:21:48 executing program 1: r0 = syz_open_dev$rtc(&(0x7f0000000000), 0x1782, 0x2000) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) r1 = shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmat(r1, &(0x7f0000c00000/0x400000)=nil, 0x4000) 00:21:48 executing program 1: r0 = syz_open_dev$rtc(&(0x7f0000000000), 0x1782, 0x2000) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x4000) 00:21:48 executing program 1: syz_open_dev$rtc(&(0x7f0000000000), 0x1782, 0x2000) shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x4000) 00:21:48 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:48 executing program 1: shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x4000) 00:21:48 executing program 1: shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x0) 00:21:48 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:49 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x7, 0x1f, 0x20}, {0x2, 0x1, 0x3, 0x400}, {0x22e, 0x7f, 0x9, 0x3ff}, {0x3f, 0x82, 0x7, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{0x1f, 0x80, 0x1, 0x2df}, {0x9f1, 0x5, 0x3f, 0x101}, {0x5, 0x3f, 0x48, 0x9}, {0x7fff, 0xb7, 0x8, 0x3ff}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{0x72, 0x55, 0x80, 0xee}, {0x101, 0x1f, 0x4, 0xffff}, {0x6, 0x0, 0x5, 0x8}, {0x6, 0x7, 0x8, 0x9}, {0x1, 0x0, 0x7}, {0xfffe, 0x51, 0x9a, 0x3a5f}, {0x3, 0x0, 0x9, 0x8}, {0xc3, 0x2, 0x9, 0x10001}, {0xfdd0, 0x2, 0x8}]}, 0x10) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x7f, 0x6}, {0x2b, 0x3ff}]}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x82, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000480)={0x0, 0x0, {0x38, 0x19, 0x10, 0x1c, 0x2, 0xd8, 0x6, 0xbe, 0x1}}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) [ 748.419814][ T25] kauditd_printk_skb: 21 callbacks suppressed [ 748.419826][ T25] audit: type=1326 audit(1622679709.098:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10658 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:49 executing program 2: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) 00:21:49 executing program 1: shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x0) [ 748.460666][ T25] audit: type=1326 audit(1622679709.138:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10663 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:49 executing program 1: shmat(0x0, &(0x7f0000c00000/0x400000)=nil, 0x0) 00:21:49 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x10e, 0x9, 0x8, 0x6}]}, 0x10) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) [ 748.519647][ T25] audit: type=1326 audit(1622679709.198:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10669 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:49 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x10e, 0x9, 0x8, 0x6}]}, 0x10) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:21:49 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x10e, 0x9, 0x8, 0x6}]}, 0x10) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:21:49 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:49 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x10e, 0x9, 0x8, 0x6}]}, 0x10) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:21:49 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) [ 748.673835][ T25] audit: type=1326 audit(1622679709.348:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10694 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:49 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) [ 748.758055][ T25] audit: type=1326 audit(1622679709.438:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10706 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:49 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:49 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x7, 0x1f, 0x20}, {0x2, 0x1, 0x3, 0x400}, {0x22e, 0x7f, 0x9, 0x3ff}, {0x3f, 0x82, 0x7, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{0x1f, 0x80, 0x1, 0x2df}, {0x9f1, 0x5, 0x3f, 0x101}, {0x5, 0x3f, 0x48, 0x9}, {0x7fff, 0xb7, 0x8, 0x3ff}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{0x72, 0x55, 0x80, 0xee}, {0x101, 0x1f, 0x4, 0xffff}, {0x6, 0x0, 0x5, 0x8}, {0x6, 0x7, 0x8, 0x9}, {0x1, 0x0, 0x7}, {0xfffe, 0x51, 0x9a, 0x3a5f}, {0x3, 0x0, 0x9, 0x8}, {0xc3, 0x2, 0x9, 0x10001}, {0xfdd0, 0x2, 0x8}]}, 0x10) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x7f, 0x6}, {0x2b, 0x3ff}]}) openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x82, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) [ 749.268329][ T25] audit: type=1326 audit(1622679709.948:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10711 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:50 executing program 2: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) 00:21:50 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) [ 749.318783][ T25] audit: type=1326 audit(1622679709.998:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10716 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:50 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:21:50 executing program 2: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:50 executing program 1: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:21:50 executing program 2: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:50 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:21:50 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) [ 749.533021][ T25] audit: type=1326 audit(1622679710.208:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10747 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:50 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) [ 749.614740][ T25] audit: type=1326 audit(1622679710.288:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10758 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:50 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x7, 0x1f, 0x20}, {0x2, 0x1, 0x3, 0x400}, {0x22e, 0x7f, 0x9, 0x3ff}, {0x3f, 0x82, 0x7, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{0x1f, 0x80, 0x1, 0x2df}, {0x9f1, 0x5, 0x3f, 0x101}, {0x5, 0x3f, 0x48, 0x9}, {0x7fff, 0xb7, 0x8, 0x3ff}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{0x72, 0x55, 0x80, 0xee}, {0x101, 0x1f, 0x4, 0xffff}, {0x6, 0x0, 0x5, 0x8}, {0x6, 0x7, 0x8, 0x9}, {0x1, 0x0, 0x7}, {0xfffe, 0x51, 0x9a, 0x3a5f}, {0x3, 0x0, 0x9, 0x8}, {0xc3, 0x2, 0x9, 0x10001}, {0xfdd0, 0x2, 0x8}]}, 0x10) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x7f, 0x6}, {0x2b, 0x3ff}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) 00:21:50 executing program 2: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:50 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) [ 750.118457][ T25] audit: type=1326 audit(1622679710.798:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10763 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:50 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:21:50 executing program 2: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:50 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:21:50 executing program 2: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:51 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:51 executing program 1: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:21:51 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:51 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:51 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:51 executing program 1: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:21:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x7, 0x1f, 0x20}, {0x2, 0x1, 0x3, 0x400}, {0x22e, 0x7f, 0x9, 0x3ff}, {0x3f, 0x82, 0x7, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{0x1f, 0x80, 0x1, 0x2df}, {0x9f1, 0x5, 0x3f, 0x101}, {0x5, 0x3f, 0x48, 0x9}, {0x7fff, 0xb7, 0x8, 0x3ff}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{0x72, 0x55, 0x80, 0xee}, {0x101, 0x1f, 0x4, 0xffff}, {0x6, 0x0, 0x5, 0x8}, {0x6, 0x7, 0x8, 0x9}, {0x1, 0x0, 0x7}, {0xfffe, 0x51, 0x9a, 0x3a5f}, {0x3, 0x0, 0x9, 0x8}, {0xc3, 0x2, 0x9, 0x10001}, {0xfdd0, 0x2, 0x8}]}, 0x10) syz_open_dev$ttys(0xc, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) 00:21:51 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:51 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:51 executing program 1: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:21:51 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:21:51 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:51 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:21:51 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:52 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:21:52 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x7, 0x1f, 0x20}, {0x2, 0x1, 0x3, 0x400}, {0x22e, 0x7f, 0x9, 0x3ff}, {0x3f, 0x82, 0x7, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{0x1f, 0x80, 0x1, 0x2df}, {0x9f1, 0x5, 0x3f, 0x101}, {0x5, 0x3f, 0x48, 0x9}, {0x7fff, 0xb7, 0x8, 0x3ff}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{0x72, 0x55, 0x80, 0xee}, {0x101, 0x1f, 0x4, 0xffff}, {0x6, 0x0, 0x5, 0x8}, {0x6, 0x7, 0x8, 0x9}, {0x1, 0x0, 0x7}, {0xfffe, 0x51, 0x9a, 0x3a5f}, {0x3, 0x0, 0x9, 0x8}, {0xc3, 0x2, 0x9, 0x10001}, {0xfdd0, 0x2, 0x8}]}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) 00:21:52 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, 0x0, 0x0) 00:21:52 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, 0x0, 0x0) 00:21:52 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:52 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:52 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, 0x0, 0x0) 00:21:52 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:53 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0), 0x0) 00:21:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x7, 0x1f, 0x20}, {0x2, 0x1, 0x3, 0x400}, {0x22e, 0x7f, 0x9, 0x3ff}, {0x3f, 0x82, 0x7, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[{0x1f, 0x80, 0x1, 0x2df}, {0x9f1, 0x5, 0x3f, 0x101}, {0x5, 0x3f, 0x48, 0x9}, {0x7fff, 0xb7, 0x8, 0x3ff}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) 00:21:53 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0), 0x0) 00:21:53 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0), 0x0) 00:21:53 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:53 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:53 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f0", 0x45) 00:21:53 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:54 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b4", 0x1) [ 753.512920][ T25] kauditd_printk_skb: 15 callbacks suppressed [ 753.512954][ T25] audit: type=1326 audit(1622679714.188:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10963 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x7, 0x1f, 0x20}, {0x2, 0x1, 0x3, 0x400}, {0x22e, 0x7f, 0x9, 0x3ff}, {0x3f, 0x82, 0x7, 0x3}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) 00:21:54 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b4", 0x1) 00:21:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b4", 0x1) 00:21:54 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd", 0x23) [ 753.652388][ T25] audit: type=1326 audit(1622679714.328:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10975 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:54 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:54 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b4", 0x1) 00:21:54 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) [ 753.832520][ T25] audit: type=1326 audit(1622679714.508:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=10995 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 [ 753.885994][ T25] audit: type=1326 audit(1622679714.568:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11002 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:55 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x1f, 0x5f, 0x3f, 0xff, 0x0, 0xffffffffffffe195, 0x2000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, r0, 0x6) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b4", 0x1) [ 754.375124][ T25] audit: type=1326 audit(1622679715.048:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11016 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) 00:21:55 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b4", 0x1) 00:21:55 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9", 0x12) 00:21:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) 00:21:55 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) 00:21:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b4", 0x1) 00:21:55 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) [ 754.693266][ T25] audit: type=1326 audit(1622679715.368:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11049 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 [ 754.735295][ T25] audit: type=1326 audit(1622679715.408:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11058 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:55 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:55 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b4", 0x1) 00:21:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x8, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}, {0x8001, 0x80, 0x8, 0x1000}]}) 00:21:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 00:21:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b4", 0x1) 00:21:55 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) [ 755.260885][ T25] audit: type=1326 audit(1622679715.938:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11072 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:56 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf58", 0xa) 00:21:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 00:21:56 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:56 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) getpeername$packet(r0, 0x0, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:56 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf58", 0xa) 00:21:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, 0x0}) 00:21:56 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:56 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, 0x0}) 00:21:56 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:56 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) [ 756.113525][ T25] audit: type=1326 audit(1622679716.788:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11119 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:56 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:56 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, 0x0}) 00:21:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf58", 0xa) 00:21:57 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:57 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:57 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x7, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}, {0xfff8, 0x9d, 0xe2, 0x1}]}) 00:21:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2", 0xe) 00:21:57 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:57 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x6, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}, {0x8, 0x7, 0x9, 0x6}]}) 00:21:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2", 0xe) 00:21:57 executing program 3: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) [ 756.991100][ T25] audit: type=1326 audit(1622679717.668:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11162 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:57 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:57 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2", 0xe) 00:21:58 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x5, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}, {0xfffc, 0x6, 0x3, 0xffff}]}) 00:21:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:58 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0", 0x10) 00:21:58 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:58 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5422, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}, {0x9, 0x4, 0x9, 0x26c}]}) 00:21:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2", 0xe) 00:21:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:58 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x4, 0x80, 0x80000000}]}) 00:21:58 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:59 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:21:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}]}) 00:21:59 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2", 0xe) 00:21:59 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300)}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:59 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2", 0xe) 00:21:59 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40860, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:59 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}]}) [ 758.772883][ T25] kauditd_printk_skb: 3 callbacks suppressed [ 758.772965][ T25] audit: type=1326 audit(1622679719.448:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11242 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:21:59 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:21:59 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffff, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:21:59 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) [ 758.829371][ T25] audit: type=1326 audit(1622679719.498:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11248 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:00 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9", 0xf) 00:22:00 executing program 3: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}]}) 00:22:00 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:00 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:00 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xe46, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:00 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9", 0xf) 00:22:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x0, 0x4, 0x80, 0x80000000}]}) 00:22:00 executing program 3: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:00 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) [ 759.661682][ T25] audit: type=1326 audit(1622679720.338:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11290 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:00 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x0, 0x4, 0x80, 0x80000000}]}) 00:22:00 executing program 3: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:00 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9", 0xf) 00:22:00 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:01 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:01 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 00:22:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x0, 0x4, 0x80, 0x80000000}]}) 00:22:01 executing program 5: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:01 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:01 executing program 1: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:01 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 00:22:01 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x0, 0x80, 0x80000000}]}) 00:22:01 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) [ 760.549892][ T25] audit: type=1326 audit(1622679721.228:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11333 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:01 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 00:22:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9, 0x0, 0x0, 0x80000000}]}) [ 760.629905][ T25] audit: type=1326 audit(1622679721.238:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11337 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:02 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:02 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:02 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x10) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x1, 0x3f, 0x80, 0x4}, {0x9}]}) 00:22:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x0, 0x1}, 0x4) 00:22:02 executing program 1: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x0, 0x1}, 0x4) 00:22:02 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) [ 761.431150][ T25] audit: type=1326 audit(1622679722.108:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11379 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x0, 0x1}, 0x4) 00:22:02 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {0x9}]}) 00:22:02 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) [ 761.474340][ T25] audit: type=1326 audit(1622679722.138:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11382 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:02 executing program 4: prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:02 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {}]}) 00:22:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3}, 0x4) 00:22:02 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:02 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:02 executing program 1: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:03 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {}]}) 00:22:03 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) 00:22:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3}, 0x4) [ 762.321427][ T25] audit: type=1326 audit(1622679722.998:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11422 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:03 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:03 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 762.372375][ T25] audit: type=1326 audit(1622679723.028:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11424 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:03 executing program 4: prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3}, 0x4) 00:22:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x7, 0x26, 0x2, 0x7}, {}]}) 00:22:03 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:03 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3}, 0x4) 00:22:03 executing program 1: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x0, 0x1}, 0x4) 00:22:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x9}]}) 00:22:03 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3}, 0x4) 00:22:03 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:03 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) [ 763.195119][ T25] audit: type=1326 audit(1622679723.868:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11465 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x9}]}) 00:22:04 executing program 4: prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:04 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3}, 0x4) 00:22:04 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:04 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x9}]}) 00:22:04 executing program 1: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:04 executing program 2: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3}, 0x4) 00:22:04 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x0, 0x26, 0x2, 0x7}, {0x9}]}) 00:22:04 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) [ 764.066782][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 764.066810][ T25] audit: type=1326 audit(1622679724.748:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11500 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:04 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:04 executing program 2: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3}, 0x4) 00:22:04 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) [ 764.111566][ T25] audit: type=1326 audit(1622679724.778:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11507 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:05 executing program 4: io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x0, 0x0, 0x2, 0x7}, {0x9}]}) 00:22:05 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:05 executing program 2: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3}, 0x4) 00:22:05 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x0, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:05 executing program 1: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:05 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) [ 764.932074][ T25] audit: type=1326 audit(1622679725.608:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11543 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:05 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3}, 0x4) 00:22:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x7}, {0x9}]}) 00:22:05 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0), 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:05 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) [ 764.981890][ T25] audit: type=1326 audit(1622679725.638:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11544 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{}, {0x9}]}) 00:22:06 executing program 4: io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:06 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3}, 0x4) 00:22:06 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0), 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:06 executing program 0: prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:06 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:06 executing program 1: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:06 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:06 executing program 1: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:06 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0), 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000100)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:06 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3}, 0x4) [ 765.823736][ T25] audit: type=1326 audit(1622679726.498:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11588 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:06 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x0, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:06 executing program 2: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3}, 0x4) [ 765.915055][ T25] audit: type=1326 audit(1622679726.528:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11586 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:07 executing program 4: io_uring_setup(0x0, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:07 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:07 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:07 executing program 2: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3}, 0x4) 00:22:07 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x0, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:07 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 00:22:07 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 00:22:07 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:07 executing program 2: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3}, 0x4) 00:22:07 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x0, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:22:07 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73da}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:07 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) [ 766.723801][ T25] audit: type=1326 audit(1622679727.398:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11630 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:08 executing program 4: io_uring_setup(0x1119, 0x0) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:08 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:08 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) 00:22:08 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 00:22:08 executing program 0: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:08 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x0, 0x1}, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:22:08 executing program 0: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:08 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, 0x0, 0x0) 00:22:08 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) 00:22:08 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 00:22:08 executing program 0: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) [ 767.614147][ T25] audit: type=1326 audit(1622679728.288:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11673 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:09 executing program 4: io_uring_setup(0x1119, 0x0) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:09 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:22:09 executing program 1: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, 0x0, 0x0) 00:22:09 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 00:22:09 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 00:22:09 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 00:22:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, 0x0, 0x0) 00:22:09 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0), 0x4) 00:22:09 executing program 3: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x10e, 0x9, 0x8, 0x6}]}, 0x10) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:22:09 executing program 1: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) [ 768.479990][ T25] audit: type=1326 audit(1622679729.158:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11714 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:09 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 00:22:10 executing program 4: io_uring_setup(0x1119, 0x0) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:10 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0), 0x4) 00:22:10 executing program 5: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 00:22:10 executing program 3: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x10e, 0x9, 0x8, 0x6}]}, 0x10) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:22:10 executing program 1: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:10 executing program 0: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:10 executing program 5: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 00:22:10 executing program 3: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x10e, 0x9, 0x8, 0x6}]}, 0x10) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000000c0)="b410e189212764adbf5853f4d0d2c9e0aac9dd75e12d384c9cfc315a80bf91c7190cdd699e611fad685e6639733f257ab3bc9994f077058ca8603a48e56ab9f9071ba8e9f07991989d2faf5e373d17fb167babe9ea7875a09fb65704061fb6f389f071ebde6026a4c9d637c21db37d3c02ccf84c54ba543e76af7a2225cdcd88fde66e123d75fd8091", 0x89) 00:22:10 executing program 0: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:10 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 00:22:10 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x88280, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req3={0x6, 0x45f, 0x14000000, 0x2, 0x40000000, 0x8, 0x2}, 0x1c) [ 769.374030][ T25] audit: type=1326 audit(1622679730.048:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11752 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:10 executing program 5: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 00:22:10 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:10 executing program 3: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x10e, 0x9, 0x8, 0x6}]}, 0x10) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) 00:22:10 executing program 0: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) 00:22:10 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x88280, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req3={0x6, 0x45f, 0x14000000, 0x2, 0x40000000, 0x8, 0x2}, 0x1c) 00:22:10 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 00:22:10 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, 0x0, 0x0) 00:22:10 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x88280, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req3={0x6, 0x45f, 0x14000000, 0x2, 0x40000000, 0x8, 0x2}, 0x1c) 00:22:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x370}}], 0x1, 0x4010) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000340)={@remote, r1}, 0xfffffffffffffc99) socket$inet6_udplite(0xa, 0x2, 0x88) 00:22:10 executing program 3: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) 00:22:10 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) 00:22:11 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, 0x0, 0x0) 00:22:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x370}}], 0x1, 0x4010) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000340)={@remote, r1}, 0xfffffffffffffc99) socket$inet6_udplite(0xa, 0x2, 0x88) [ 770.297506][ T25] audit: type=1326 audit(1622679730.978:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11798 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:11 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:11 executing program 3: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) 00:22:11 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x88280, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) 00:22:11 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x0, 0x1}, 0x4) 00:22:11 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, 0x0, 0x0) 00:22:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x370}}], 0x1, 0x4010) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000340)={@remote, r1}, 0xfffffffffffffc99) socket$inet6_udplite(0xa, 0x2, 0x88) 00:22:11 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0), 0x4) 00:22:11 executing program 5: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 00:22:11 executing program 3: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) [ 771.134608][ T25] audit: type=1326 audit(1622679731.808:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11832 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:11 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0), 0x4) 00:22:11 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x88280, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="1400000000000000290000000b0000008000000100000000c0010000000000002900000037000000163400000000000007200000000306fc80000000000000000000ff0000000000000004000000000000000502003501020000c204000000050740000000010e8005000100000000000000f2d0d30b00000000040000000000000003000000000000001f00000000000000070000000000000004000000000000000892e1b5c73fc3177bee534b0a5b58399723bc1e15cc457d6bf50b2e48aa0e6b74919678a79f1001f20600ab10d868ec196e1543433e1a0379a5942c78a9b64d4f21e5e1cf6e57fbfa7f3f3201a49b6341c8f468a5a12764b1ee9fd35cd63264339f100b62bc3ebcf0f5fedf6d1479d44334207c0ec9d36349a7335adc4eeac36ff32c2535fc12d3aecfb61dbe3487a5cbf40a5e029d1a02dd5de669f32e12569a183dd8ada6be204716f7e50ecab0e8d268af5281d44311994cf498e59092b9dcfe742c1011854408c676544bb125bae396ea1c31f7db037d92352bae8be02f808d3453eff887b02cb5d843b84a2556c4b1ce42123e25f08199789b93534d97782921bb6e714372a050d70e1cde4d1da8c8ac45997d05f575dabed2561882793064437e1b36b20088b32ed250e5bd0d9a4c591e01e55e27cd86adf677239800000090000000000000002900000004000000890e0000000000000401811f6096d063b567d0b8b607804826a5ae5b9a55b8ec9e35065db52346eaa02e9a8f72cdb651a2835f441a1fead1c80a16a2b7630ad0132e5298c8bd7c7d9eeb2cb359dbf21aa8a1a5f35bf4910362be74cb76176633115e15ffa769eebeb5b150c54e0001000107000000000000000000000000000078000000000000000000390000002b0c000000000000ff010000000000000000000000000001fe80000000000000000000000000001200000000000000000000000000000000ff020000000000000000000000000001fe800000000000000000000000000011fe80000000000000000000000000003c600000000000000029000000360000003a0800000000000005020007c910fc0000000000000000000000000000010502002007180000000204ff030009000000000000000800000000000000c910fc01000000000000000000000000000000001400000000000000290000000b00000000000007000000001400000000000000290000000800"], 0x370}}], 0x1, 0x4010) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000340)={@remote, r1}, 0xfffffffffffffc99) 00:22:12 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:12 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x88280, 0x0) 00:22:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="1400000000000000290000000b0000008000000100000000c0010000000000002900000037000000163400000000000007200000000306fc80000000000000000000ff0000000000000004000000000000000502003501020000c204000000050740000000010e8005000100000000000000f2d0d30b00000000040000000000000003000000000000001f00000000000000070000000000000004000000000000000892e1b5c73fc3177bee534b0a5b58399723bc1e15cc457d6bf50b2e48aa0e6b74919678a79f1001f20600ab10d868ec196e1543433e1a0379a5942c78a9b64d4f21e5e1cf6e57fbfa7f3f3201a49b6341c8f468a5a12764b1ee9fd35cd63264339f100b62bc3ebcf0f5fedf6d1479d44334207c0ec9d36349a7335adc4eeac36ff32c2535fc12d3aecfb61dbe3487a5cbf40a5e029d1a02dd5de669f32e12569a183dd8ada6be204716f7e50ecab0e8d268af5281d44311994cf498e59092b9dcfe742c1011854408c676544bb125bae396ea1c31f7db037d92352bae8be02f808d3453eff887b02cb5d843b84a2556c4b1ce42123e25f08199789b93534d97782921bb6e714372a050d70e1cde4d1da8c8ac45997d05f575dabed2561882793064437e1b36b20088b32ed250e5bd0d9a4c591e01e55e27cd86adf677239800000090000000000000002900000004000000890e0000000000000401811f6096d063b567d0b8b607804826a5ae5b9a55b8ec9e35065db52346eaa02e9a8f72cdb651a2835f441a1fead1c80a16a2b7630ad0132e5298c8bd7c7d9eeb2cb359dbf21aa8a1a5f35bf4910362be74cb76176633115e15ffa769eebeb5b150c54e0001000107000000000000000000000000000078000000000000000000390000002b0c000000000000ff010000000000000000000000000001fe80000000000000000000000000001200000000000000000000000000000000ff020000000000000000000000000001fe800000000000000000000000000011fe80000000000000000000000000003c600000000000000029000000360000003a0800000000000005020007c910fc0000000000000000000000000000010502002007180000000204ff030009000000000000000800000000000000c910fc01000000000000000000000000000000001400000000000000290000000b00000000000007000000001400000000000000290000000800"], 0x370}}], 0x1, 0x4010) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000340)={@remote}, 0xfffffffffffffc99) 00:22:12 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0), 0x4) 00:22:12 executing program 3: prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) 00:22:12 executing program 5: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 00:22:12 executing program 5: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 00:22:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x370}}], 0x1, 0x4010) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000340)={@remote}, 0xfffffffffffffc99) 00:22:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="1400000000000000290000000b0000008000000100000000c0010000000000002900000037000000163400000000000007200000000306fc80000000000000000000ff0000000000000004000000000000000502003501020000c204000000050740000000010e8005000100000000000000f2d0d30b00000000040000000000000003000000000000001f00000000000000070000000000000004000000000000000892e1b5c73fc3177bee534b0a5b58399723bc1e15cc457d6bf50b2e48aa0e6b74919678a79f1001f20600ab10d868ec196e1543433e1a0379a5942c78a9b64d4f21e5e1cf6e57fbfa7f3f3201a49b6341c8f468a5a12764b1ee9fd35cd63264339f100b62bc3ebcf0f5fedf6d1479d44334207c0ec9d36349a7335adc4eeac36ff32c2535fc12d3aecfb61dbe3487a5cbf40a5e029d1a02dd5de669f32e12569a183dd8ada6be204716f7e50ecab0e8d268af5281d44311994cf498e59092b9dcfe742c1011854408c676544bb125bae396ea1c31f7db037d92352bae8be02f808d3453eff887b02cb5d843b84a2556c4b1ce42123e25f08199789b93534d97782921bb6e714372a050d70e1cde4d1da8c8ac45997d05f575dabed2561882793064437e1b36b20088b32ed250e5bd0d9a4c591e01e55e27cd86adf677239800000090000000000000002900000004000000890e0000000000000401811f6096d063b567d0b8b607804826a5ae5b9a55b8ec9e35065db52346eaa02e9a8f72cdb651a2835f441a1fead1c80a16a2b7630ad0132e5298c8bd7c7d9eeb2cb359dbf21aa8a1a5f35bf4910362be74cb76176633115e15ffa769eebeb5b150c54e0001000107000000000000000000000000000078000000000000000000390000002b0c000000000000ff010000000000000000000000000001fe80000000000000000000000000001200000000000000000000000000000000ff020000000000000000000000000001fe800000000000000000000000000011fe80000000000000000000000000003c600000000000000029000000360000003a0800000000000005020007c910fc0000000000000000000000000000010502002007180000000204ff030009000000000000000800000000000000c910fc01000000000000000000000000000000001400000000000000290000000b00000000000007000000001400000000000000290000000800"], 0x370}}], 0x1, 0x4010) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000340)={@remote, r1}, 0xfffffffffffffc99) socket$inet6_udplite(0xa, 0x2, 0x88) 00:22:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) 00:22:12 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) [ 772.017820][ T25] audit: type=1326 audit(1622679732.698:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11876 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:12 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) 00:22:13 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x0, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000340)={@remote}, 0xfffffffffffffc99) 00:22:13 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) 00:22:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 00:22:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="1400000000000000290000000b0000008000000100000000c0010000000000002900000037000000163400000000000007200000000306fc80000000000000000000ff0000000000000004000000000000000502003501020000c204000000050740000000010e8005000100000000000000f2d0d30b00000000040000000000000003000000000000001f00000000000000070000000000000004000000000000000892e1b5c73fc3177bee534b0a5b58399723bc1e15cc457d6bf50b2e48aa0e6b74919678a79f1001f20600ab10d868ec196e1543433e1a0379a5942c78a9b64d4f21e5e1cf6e57fbfa7f3f3201a49b6341c8f468a5a12764b1ee9fd35cd63264339f100b62bc3ebcf0f5fedf6d1479d44334207c0ec9d36349a7335adc4eeac36ff32c2535fc12d3aecfb61dbe3487a5cbf40a5e029d1a02dd5de669f32e12569a183dd8ada6be204716f7e50ecab0e8d268af5281d44311994cf498e59092b9dcfe742c1011854408c676544bb125bae396ea1c31f7db037d92352bae8be02f808d3453eff887b02cb5d843b84a2556c4b1ce42123e25f08199789b93534d97782921bb6e714372a050d70e1cde4d1da8c8ac45997d05f575dabed2561882793064437e1b36b20088b32ed250e5bd0d9a4c591e01e55e27cd86adf677239800000090000000000000002900000004000000890e0000000000000401811f6096d063b567d0b8b607804826a5ae5b9a55b8ec9e35065db52346eaa02e9a8f72cdb651a2835f441a1fead1c80a16a2b7630ad0132e5298c8bd7c7d9eeb2cb359dbf21aa8a1a5f35bf4910362be74cb76176633115e15ffa769eebeb5b150c54e0001000107000000000000000000000000000078000000000000000000390000002b0c000000000000ff010000000000000000000000000001fe80000000000000000000000000001200000000000000000000000000000000ff020000000000000000000000000001fe800000000000000000000000000011fe80000000000000000000000000003c600000000000000029000000360000003a0800000000000005020007c910fc0000000000000000000000000000010502002007180000000204ff030009000000000000000800000000000000c910fc01000000000000000000000000000000001400000000000000290000000b00000000000007000000001400000000000000290000000800"], 0x370}}], 0x1, 0x4010) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000340)={@remote, r1}, 0xfffffffffffffc99) socket$inet6_udplite(0xa, 0x2, 0x88) 00:22:13 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x370}}], 0x1, 0x4010) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000340)={@remote, r1}, 0xfffffffffffffc99) socket$inet6_udplite(0xa, 0x2, 0x88) 00:22:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000340)={@remote}, 0xfffffffffffffc99) 00:22:13 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) [ 772.909482][ T25] audit: type=1326 audit(1622679733.588:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11911 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:13 executing program 0: setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000340)={@remote}, 0xfffffffffffffc99) 00:22:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 00:22:13 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:14 executing program 3: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) 00:22:14 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x0, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x370}}], 0x1, 0x4010) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000340)={@remote, r1}, 0xfffffffffffffc99) 00:22:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 00:22:14 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:14 executing program 0: setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340)={@remote}, 0xfffffffffffffc99) 00:22:14 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f00000008c0)=""/4096, &(0x7f0000000180)=0x1000) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r2) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="13000000", @ANYRES16=r4, @ANYBLOB="10002bbd7000ffdbdf251900000014000180080003000200000008000100", @ANYRES32=0x0, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x24000084}, 0x4010) ioctl$KDSKBLED(r1, 0x4b65, 0x1) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r5, 0x0, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f0000000080)=""/140, &(0x7f0000000140)=0x8c) 00:22:14 executing program 3: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) 00:22:14 executing program 0: setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 00:22:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="1400000000000000290000000b0000008000000100000000c0010000000000002900000037000000163400000000000007200000000306fc80000000000000000000ff0000000000000004000000000000000502003501020000c204000000050740000000010e8005000100000000000000f2d0d30b00000000040000000000000003000000000000001f00000000000000070000000000000004000000000000000892e1b5c73fc3177bee534b0a5b58399723bc1e15cc457d6bf50b2e48aa0e6b74919678a79f1001f20600ab10d868ec196e1543433e1a0379a5942c78a9b64d4f21e5e1cf6e57fbfa7f3f3201a49b6341c8f468a5a12764b1ee9fd35cd63264339f100b62bc3ebcf0f5fedf6d1479d44334207c0ec9d36349a7335adc4eeac36ff32c2535fc12d3aecfb61dbe3487a5cbf40a5e029d1a02dd5de669f32e12569a183dd8ada6be204716f7e50ecab0e8d268af5281d44311994cf498e59092b9dcfe742c1011854408c676544bb125bae396ea1c31f7db037d92352bae8be02f808d3453eff887b02cb5d843b84a2556c4b1ce42123e25f08199789b93534d97782921bb6e714372a050d70e1cde4d1da8c8ac45997d05f575dabed2561882793064437e1b36b20088b32ed250e5bd0d9a4c591e01e55e27cd86adf677239800000090000000000000002900000004000000890e0000000000000401811f6096d063b567d0b8b607804826a5ae5b9a55b8ec9e35065db52346eaa02e9a8f72cdb651a2835f441a1fead1c80a16a2b7630ad0132e5298c8bd7c7d9eeb2cb359dbf21aa8a1a5f35bf4910362be74cb76176633115e15ffa769eebeb5b150c54e0001000107000000000000000000000000000078000000000000000000390000002b0c000000000000ff010000000000000000000000000001fe80000000000000000000000000001200000000000000000000000000000000ff020000000000000000000000000001fe800000000000000000000000000011fe80000000000000000000000000003c600000000000000029000000360000003a0800000000000005020007c910fc0000000000000000000000000000010502002007180000000204ff030009000000000000000800000000000000c910fc01000000000000000000000000000000001400000000000000290000000b00000000000007000000001400000000000000290000000800"], 0x370}}], 0x1, 0x4010) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) 00:22:14 executing program 2: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) [ 773.821868][ T25] audit: type=1326 audit(1622679734.498:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11952 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:14 executing program 0: setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 00:22:14 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f00000008c0)=""/4096, &(0x7f0000000180)=0x1000) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r2) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="13000000", @ANYRES16=r4, @ANYBLOB="10002bbd7000ffdbdf251900000014000180080003000200000008000100", @ANYRES32=0x0, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x24000084}, 0x4010) ioctl$KDSKBLED(r1, 0x4b65, 0x1) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r5, 0x0, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f0000000080)=""/140, &(0x7f0000000140)=0x8c) 00:22:14 executing program 3: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x7, 0x1, 0x9, 0x100}, 0x10) 00:22:15 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x0, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x370}}], 0x1, 0x4010) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fffff, &(0x7f0000000580)) 00:22:15 executing program 0: setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 00:22:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 00:22:15 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f00000008c0)=""/4096, &(0x7f0000000180)=0x1000) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r2) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="13000000", @ANYRES16=r4, @ANYBLOB="10002bbd7000ffdbdf251900000014000180080003000200000008000100", @ANYRES32=0x0, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x24000084}, 0x4010) ioctl$KDSKBLED(r1, 0x4b65, 0x1) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r5, 0x0, 0x0) getsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f0000000080)=""/140, &(0x7f0000000140)=0x8c) 00:22:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="1400000000000000290000000b0000008000000100000000c0010000000000002900000037000000163400000000000007200000000306fc80000000000000000000ff0000000000000004000000000000000502003501020000c204000000050740000000010e8005000100000000000000f2d0d30b00000000040000000000000003000000000000001f00000000000000070000000000000004000000000000000892e1b5c73fc3177bee534b0a5b58399723bc1e15cc457d6bf50b2e48aa0e6b74919678a79f1001f20600ab10d868ec196e1543433e1a0379a5942c78a9b64d4f21e5e1cf6e57fbfa7f3f3201a49b6341c8f468a5a12764b1ee9fd35cd63264339f100b62bc3ebcf0f5fedf6d1479d44334207c0ec9d36349a7335adc4eeac36ff32c2535fc12d3aecfb61dbe3487a5cbf40a5e029d1a02dd5de669f32e12569a183dd8ada6be204716f7e50ecab0e8d268af5281d44311994cf498e59092b9dcfe742c1011854408c676544bb125bae396ea1c31f7db037d92352bae8be02f808d3453eff887b02cb5d843b84a2556c4b1ce42123e25f08199789b93534d97782921bb6e714372a050d70e1cde4d1da8c8ac45997d05f575dabed2561882793064437e1b36b20088b32ed250e5bd0d9a4c591e01e55e27cd86adf677239800000090000000000000002900000004000000890e0000000000000401811f6096d063b567d0b8b607804826a5ae5b9a55b8ec9e35065db52346eaa02e9a8f72cdb651a2835f441a1fead1c80a16a2b7630ad0132e5298c8bd7c7d9eeb2cb359dbf21aa8a1a5f35bf4910362be74cb76176633115e15ffa769eebeb5b150c54e0001000107000000000000000000000000000078000000000000000000390000002b0c000000000000ff010000000000000000000000000001fe80000000000000000000000000001200000000000000000000000000000000ff020000000000000000000000000001fe800000000000000000000000000011fe80000000000000000000000000003c600000000000000029000000360000003a0800000000000005020007c910fc0000000000000000000000000000010502002007180000000204ff030009000000000000000800000000000000c910fc01000000000000000000000000000000001400000000000000290000000b00000000000007000000001400000000000000290000000800"], 0x370}}], 0x1, 0x4010) 00:22:15 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f00000008c0)=""/4096, &(0x7f0000000180)=0x1000) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r2) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="13000000", @ANYRES16=r4, @ANYBLOB="10002bbd7000ffdbdf251900000014000180080003000200000008000100", @ANYRES32=0x0, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x24000084}, 0x4010) ioctl$KDSKBLED(r1, 0x4b65, 0x1) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r5, 0x0, 0x0) [ 774.674605][ T25] audit: type=1326 audit(1622679735.348:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=11994 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:15 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 00:22:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) syz_genetlink_get_family_id$devlink(&(0x7f0000000180), r0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x9efff7, &(0x7f00000000c0)=ANY=[@ANYBLOB="ef95687349e0e6e72b73aa312c026010834bec08b2bfb70086ab6eee4f7bcc645fba69ab8646c335bb82574b5deae007369d65f60d28b0a29deb5fd3d2ac3ce3b29e834078815e16f03f888bee6a3c754c540bfff8a1022b383bf35b33921e9f2b0cf9eeacd3a61391b4e4a0c6293f7951651516138d53eca1cc2fb135d360fb156b02994961"]) faccessat(r1, &(0x7f0000000000)='\x00', 0x1) 00:22:15 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x370}}], 0x1, 0x4010) 00:22:16 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 00:22:16 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) syz_genetlink_get_family_id$devlink(&(0x7f0000000180), r0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x9efff7, &(0x7f00000000c0)=ANY=[@ANYBLOB="ef95687349e0e6e72b73aa312c026010834bec08b2bfb70086ab6eee4f7bcc645fba69ab8646c335bb82574b5deae007369d65f60d28b0a29deb5fd3d2ac3ce3b29e834078815e16f03f888bee6a3c754c540bfff8a1022b383bf35b33921e9f2b0cf9eeacd3a61391b4e4a0c6293f7951651516138d53eca1cc2fb135d360fb156b02994961"]) faccessat(r1, &(0x7f0000000000)='\x00', 0x1) 00:22:16 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f00000008c0)=""/4096, &(0x7f0000000180)=0x1000) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r2) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="13000000", @ANYRES16=r4, @ANYBLOB="10002bbd7000ffdbdf251900000014000180080003000200000008000100", @ANYRES32=0x0, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x24000084}, 0x4010) ioctl$KDSKBLED(r1, 0x4b65, 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:16 executing program 1: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x370}}], 0x1, 0x4010) 00:22:16 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:16 executing program 1: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x370}}], 0x1, 0x4010) 00:22:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) syz_genetlink_get_family_id$devlink(&(0x7f0000000180), r0) r1 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x9efff7, &(0x7f00000000c0)=ANY=[@ANYBLOB="ef95687349e0e6e72b73aa312c026010834bec08b2bfb70086ab6eee4f7bcc645fba69ab8646c335bb82574b5deae007369d65f60d28b0a29deb5fd3d2ac3ce3b29e834078815e16f03f888bee6a3c754c540bfff8a1022b383bf35b33921e9f2b0cf9eeacd3a61391b4e4a0c6293f7951651516138d53eca1cc2fb135d360fb156b02994961"]) faccessat(r1, &(0x7f0000000000)='\x00', 0x1) 00:22:16 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x1, 0x9, 0x100}, 0x10) [ 775.552638][ T25] audit: type=1326 audit(1622679736.228:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12042 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:16 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:16 executing program 1: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x370}}], 0x1, 0x4010) 00:22:16 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r2, 0x0, 0x0) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f00000008c0)=""/4096, &(0x7f0000000180)=0x1000) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r2) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="13000000", @ANYRES16=r4, @ANYBLOB="10002bbd7000ffdbdf251900000014000180080003000200000008000100", @ANYRES32=0x0, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x24000084}, 0x4010) ioctl$KDSKBLED(r1, 0x4b65, 0x1) 00:22:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) syz_genetlink_get_family_id$devlink(&(0x7f0000000180), r0) faccessat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x1) 00:22:17 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:17 executing program 2: socket$packet(0x11, 0x3, 0x300) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x9, 0x100}, 0x10) 00:22:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) faccessat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x1) 00:22:17 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x370}}], 0x1, 0x4010) 00:22:17 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) syz_open_dev$ttys(0xc, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) getsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f00000008c0)=""/4096, &(0x7f0000000180)=0x1000) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r1) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="13000000", @ANYRES16=r3, @ANYBLOB="10002bbd7000ffdbdf251900000014000180080003000200000008000100", @ANYRES32=0x0, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x24000084}, 0x4010) 00:22:17 executing program 2: socket$packet(0x11, 0x3, 0x300) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:17 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) syz_open_dev$ttys(0xc, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) getsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f00000008c0)=""/4096, &(0x7f0000000180)=0x1000) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r1) 00:22:17 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) faccessat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x1) 00:22:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x9, 0x100}, 0x10) [ 776.436289][ T25] audit: type=1326 audit(1622679737.118:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12081 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:17 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="1400000000000000290000000b0000008000000100000000c0010000000000002900000037000000163400000000000007200000000306fc80000000000000000000ff0000000000000004000000000000000502003501020000c204000000050740000000010e8005000100000000000000f2d0d30b00000000040000000000000003000000000000001f00000000000000070000000000000004000000000000000892e1b5c73fc3177bee534b0a5b58399723bc1e15cc457d6bf50b2e48aa0e6b74919678a79f1001f20600ab10d868ec196e1543433e1a0379a5942c78a9b64d4f21e5e1cf6e57fbfa7f3f3201a49b6341c8f468a5a12764b1ee9fd35cd63264339f100b62bc3ebcf0f5fedf6d1479d44334207c0ec9d36349a7335adc4eeac36ff32c2535fc12d3aecfb61dbe3487a5cbf40a5e029d1a02dd5de669f32e12569a183dd8ada6be204716f7e50ecab0e8d268af5281d44311994cf498e59092b9dcfe742c1011854408c676544bb125bae396ea1c31f7db037d92352bae8be02f808d3453eff887b02cb5d843b84a2556c4b1ce42123e25f08199789b93534d97782921bb6e714372a050d70e1cde4d1da8c8ac45997d05f575dabed2561882793064437e1b36b20088b32ed250e5bd0d9a4c591e01e55e27cd86adf677239800000090000000000000002900000004000000890e0000000000000401811f6096d063b567d0b8b607804826a5ae5b9a55b8ec9e35065db52346eaa02e9a8f72cdb651a2835f441a1fead1c80a16a2b7630ad0132e5298c8bd7c7d9eeb2cb359dbf21aa8a1a5f35bf4910362be74cb76176633115e15ffa769eebeb5b150c54e0001000107000000000000000000000000000078000000000000000000390000002b0c000000000000ff010000000000000000000000000001fe80000000000000000000000000001200000000000000000000000000000000ff020000000000000000000000000001fe800000000000000000000000000011fe80000000000000000000000000003c600000000000000029000000360000003a0800000000000005020007c910fc0000000000000000000000000000010502002007180000000204ff030009000000000000000800000000000000c910fc01000000000000000000000000000000001400000000000000290000000b00000000000007000000001400000000000000290000000800"], 0x370}}], 0x1, 0x4010) 00:22:17 executing program 2: socket$packet(0x11, 0x3, 0x300) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/141, 0x8d, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:17 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:17 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) syz_open_dev$ttys(0xc, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) getsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f00000008c0)=""/4096, &(0x7f0000000180)=0x1000) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) 00:22:17 executing program 0: faccessat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x1) 00:22:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x9, 0x100}, 0x10) 00:22:17 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="050b81f05b887d82df3d3bcd294528d20401b069e66d7b74dbdfe2f5a29fe195a75d1a869a945096aa8045fd2d6345e587f740a57f50d98a625a5fb04dd3ce1fd1098d7489e4852d3f49a883874a8127878aed59b2dbdb48d575dbd3fa5333576cc02d40930f14aa7d252451157af68e65ace49ff04d616c970383ab6de0857e15628e14436bf0c1fbdc432a78d78b83f2b7932dd6795c8b6147dd1d8ed8bf61b4", 0xa1}, {&(0x7f0000000040)="11db59a4f19071b33a1977902e564defb83a50bc58f5177dcf838866f8a161b09104f6c214fc2feebb31e3e4ca24aae562b6df", 0x33}, {&(0x7f0000000180)="81eee947b0844da6657c59f6ba55aad5419db714fbe139b18fc7329c9b521e027353e25de12de0d20c3635a2e9368ddf0ed589fee91933f7b8d2d70bf12faab47480bd5ee1be559207560d4290c1681c54b6160acdcb4c251436c2710c5b15de466d4bfbed4a294ea20210eaf8f4156be88d5ba8a127d8ebf26245ec14efea68d3ccaadbcbb46d544d192957192a7cf3fafc40", 0x93}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x370}}], 0x1, 0x4010) 00:22:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x41, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x1, 0x0, 0x100}, 0x10) 00:22:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x4010) 00:22:18 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x1) 00:22:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x4010) 00:22:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:18 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) syz_open_dev$ttys(0xc, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) getsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f00000008c0)=""/4096, &(0x7f0000000180)=0x1000) socket$nl_generic(0x10, 0x3, 0x10) [ 777.344688][ T25] audit: type=1326 audit(1622679738.018:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12128 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:18 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:18 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x1) 00:22:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x1}, 0x10) 00:22:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x4010) 00:22:18 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) syz_open_dev$ttys(0xc, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) getsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f00000008c0)=""/4096, &(0x7f0000000180)=0x1000) 00:22:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000280), 0x0, 0x4010) 00:22:18 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x1) 00:22:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000280), 0x0, 0x4010) 00:22:18 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) syz_open_dev$ttys(0xc, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) 00:22:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:18 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:18 executing program 0: faccessat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0) [ 778.245874][ T25] audit: type=1326 audit(1622679738.928:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12168 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:19 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000280), 0x0, 0x4010) 00:22:19 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) syz_open_dev$ttys(0xc, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x9, 0x100}, 0x10) 00:22:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x370}}], 0x1, 0x4010) 00:22:19 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) syz_open_dev$ttys(0xc, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x24, 0x0, 0x0) 00:22:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x9, 0x100}, 0x10) [ 779.081000][ T25] audit: type=1326 audit(1622679739.758:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12205 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:19 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x370}}], 0x1, 0x4010) 00:22:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x9, 0x100}, 0x10) 00:22:19 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) syz_open_dev$ttys(0xc, 0x2, 0x0) 00:22:20 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:20 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x9, 0x100}, 0x10) 00:22:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x370}}], 0x1, 0x4010) 00:22:20 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x20, 0x7f, 0x7}]}, 0x10) 00:22:20 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x9, 0x100}, 0x10) 00:22:20 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) getpeername$packet(r0, 0x0, 0x0) 00:22:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x370}}], 0x1, 0x4010) [ 779.925196][ T25] audit: type=1326 audit(1622679740.598:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12246 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x41, 0x0, 0x0) 00:22:20 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[], 0x370}}], 0x1, 0x4010) 00:22:20 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x9, 0x100}, 0x10) 00:22:20 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x161840, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) [ 780.215731][ C0] ================================================================== [ 780.223815][ C0] BUG: KCSAN: data-race in tick_nohz_stop_tick / tick_sched_timer [ 780.231615][ C0] [ 780.233925][ C0] write to 0xffffffff83cbf110 of 4 bytes by task 0 on cpu 1: [ 780.241270][ C0] tick_nohz_stop_tick+0x99/0x3e0 [ 780.246672][ C0] tick_nohz_idle_stop_tick+0x15d/0x310 [ 780.252199][ C0] do_idle+0x186/0x240 [ 780.256252][ C0] cpu_startup_entry+0x15/0x20 [ 780.260989][ C0] secondary_startup_64_no_verify+0xb0/0xbb [ 780.266870][ C0] [ 780.269167][ C0] read to 0xffffffff83cbf110 of 4 bytes by interrupt on cpu 0: [ 780.276681][ C0] tick_sched_timer+0x35/0x210 [ 780.281421][ C0] __run_hrtimer+0x160/0x480 [ 780.285980][ C0] hrtimer_interrupt+0x380/0xaf0 [ 780.290890][ C0] __sysvec_apic_timer_interrupt+0x6f/0x1c0 [ 780.296769][ C0] sysvec_apic_timer_interrupt+0x64/0x80 [ 780.302404][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 780.308365][ C0] acpi_idle_enter+0x25b/0x2e0 [ 780.313111][ C0] cpuidle_enter_state+0x2b6/0x750 [ 780.318202][ C0] cpuidle_enter+0x3c/0x60 [ 780.322601][ C0] do_idle+0x1a3/0x240 [ 780.326646][ C0] cpu_startup_entry+0x15/0x20 [ 780.331385][ C0] rest_init+0xc9/0xd0 [ 780.335434][ C0] arch_call_rest_init+0xa/0xb [ 780.340177][ C0] start_kernel+0x59e/0x623 [ 780.344655][ C0] secondary_startup_64_no_verify+0xb0/0xbb [ 780.350537][ C0] [ 780.352836][ C0] value changed: 0x00000001 -> 0xffffffff [ 780.358526][ C0] [ 780.360825][ C0] Reported by Kernel Concurrency Sanitizer on: [ 780.366944][ C0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.13.0-rc4-syzkaller #0 [ 780.374896][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 780.384929][ C0] ================================================================== 00:22:21 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) ioperm(0x0, 0x81, 0xfffffffffffffffa) 00:22:21 executing program 2: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x7f, 0xb6, 0x9, 0x4, 0x0, 0x8, 0x4, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_config_ext={0x100000000}, 0x4c094, 0xa0e5, 0x8, 0x5, 0xdc, 0x23e455f, 0x8, 0x0, 0x1, 0x0, 0xcc5}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x49, 0x6, 0x0, 0xa0, 0x0, 0x401, 0x2004, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, r0, 0x9) 00:22:21 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:21 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x9, 0x100}, 0x10) 00:22:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[], 0x370}}], 0x1, 0x0) 00:22:21 executing program 2: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x7f, 0xb6, 0x9, 0x4, 0x0, 0x8, 0x4, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_config_ext={0x100000000}, 0x4c094, 0xa0e5, 0x8, 0x5, 0xdc, 0x23e455f, 0x8, 0x0, 0x1, 0x0, 0xcc5}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x49, 0x6, 0x0, 0xa0, 0x0, 0x401, 0x2004, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, r0, 0x9) 00:22:21 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x9, 0x100}, 0x10) 00:22:21 executing program 5: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000340)) ioperm(0x0, 0x81, 0xfffffffffffffffa) [ 780.788282][ T25] audit: type=1326 audit(1622679741.468:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12295 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:21 executing program 3: recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:21 executing program 2: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x7f, 0xb6, 0x9, 0x4, 0x0, 0x8, 0x4, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_config_ext={0x100000000}, 0x4c094, 0xa0e5, 0x8, 0x5, 0xdc, 0x23e455f, 0x8, 0x0, 0x1, 0x0, 0xcc5}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x49, 0x6, 0x0, 0xa0, 0x0, 0x401, 0x2004, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, r0, 0x9) 00:22:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[], 0x370}}], 0x1, 0x0) 00:22:21 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x9, 0x100}, 0x10) 00:22:21 executing program 5: ioperm(0x0, 0x81, 0xfffffffffffffffa) 00:22:21 executing program 3: recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:22 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[], 0x370}}], 0x1, 0x0) 00:22:22 executing program 0: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x9, 0x100}, 0x10) 00:22:22 executing program 5: ioperm(0x0, 0x0, 0xfffffffffffffffa) 00:22:22 executing program 2: prctl$PR_SET_SECCOMP(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x49, 0x6, 0x0, 0xa0, 0x0, 0x401, 0x2004, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:22 executing program 3: recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:22 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:22 executing program 5: ioperm(0x0, 0x0, 0xfffffffffffffffa) 00:22:22 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) [ 781.662343][ T25] audit: type=1326 audit(1622679742.338:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12344 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:22 executing program 5: ioperm(0x0, 0x0, 0xfffffffffffffffa) 00:22:22 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11, 0x0, r2}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r3, 0x0, 0x0) sendto$packet(r3, &(0x7f00000008c0)="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", 0x1000, 0x4000000, &(0x7f0000000380)={0x11, 0xc, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}}, 0x14) ioctl$RTC_UIE_ON(r0, 0x7003) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="58010000", @ANYRES16=r4, @ANYBLOB="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"], 0x158}, 0x1, 0x0, 0x0, 0x800}, 0x40) 00:22:22 executing program 0: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x9, 0x100}, 0x10) 00:22:23 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x49, 0x6, 0x0, 0xa0, 0x0, 0x401, 0x2004, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:23 executing program 5: ioperm(0x0, 0x81, 0x0) 00:22:23 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:23 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11, 0x0, r2}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r3, 0x0, 0x0) sendto$packet(r3, &(0x7f00000008c0)="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", 0x1000, 0x4000000, &(0x7f0000000380)={0x11, 0xc, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}}, 0x14) ioctl$RTC_UIE_ON(r0, 0x7003) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="58010000", @ANYRES16=r4, @ANYBLOB="000225bd7000fbdbdf25410000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e65746465e41adcf30a52ff37b508100bfa7673696d3000000d0087006c325f64726f707300000000080001007063690011000200303030303a30303a31302e30000000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087006c325f64726f7073000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000d0087"], 0x158}, 0x1, 0x0, 0x0, 0x800}, 0x40) 00:22:23 executing program 0: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x9, 0x100}, 0x10) 00:22:23 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11, 0x0, r2}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r3, 0x0, 0x0) sendto$packet(r3, &(0x7f00000008c0)="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", 0x1000, 0x4000000, &(0x7f0000000380)={0x11, 0xc, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}}, 0x14) ioctl$RTC_UIE_ON(r0, 0x7003) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="58010000", @ANYRES16=r4, @ANYBLOB="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"], 0x158}, 0x1, 0x0, 0x0, 0x800}, 0x40) 00:22:23 executing program 5: ioperm(0x0, 0x81, 0x0) 00:22:23 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 00:22:23 executing program 3: socket$packet(0x11, 0x3, 0x300) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:23 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) [ 782.561754][ T25] audit: type=1326 audit(1622679743.238:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12390 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:23 executing program 5: ioperm(0x0, 0x81, 0x0) 00:22:24 executing program 3: socket$packet(0x11, 0x3, 0x300) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:24 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 00:22:24 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:24 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11, 0x0, r2}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r3, 0x0, 0x0) sendto$packet(r3, &(0x7f00000008c0)="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", 0x1000, 0x4000000, &(0x7f0000000380)={0x11, 0xc, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}}, 0x14) ioctl$RTC_UIE_ON(r0, 0x7003) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) 00:22:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@multicast1, 0x4e21, 0x7, 0x4e23, 0x0, 0x2, 0xa0, 0x80, 0x0, r1, r2}, {0x6, 0x5c, 0x5, 0x7, 0x0, 0x5, 0x7, 0x37d}, {0x5, 0xa2, 0x2, 0x9}, 0x8, 0x6e6bb8, 0x1, 0x1, 0x1, 0x3}, {{@in6=@loopback, 0x4d2, 0x2b}, 0xa, @in=@empty, 0x3502, 0x2, 0x0, 0x0, 0x1, 0x6, 0x6a0}}, 0xe8) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)={0x7fff4, 0x81, 0x4, 0x2, 0x0, 0x7f, 0x40000000000006}) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={""/10, ""/2, @dev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e20, 0x4, 0x4e20, 0x1, 0xa, 0x80, 0xe0, 0x32, r1, r4}, {0x6, 0x7, 0x400, 0x4, 0x1ff, 0x5, 0x1, 0x6}, {0xdfa4, 0x5, 0x1, 0x7}, 0x7ff, 0x6e6bbf, 0x1, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d5, 0xff}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0xf8, 0x3, 0x7, 0x100}}, 0xe8) 00:22:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 00:22:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@multicast1, 0x4e21, 0x7, 0x4e23, 0x0, 0x2, 0xa0, 0x80, 0x0, r1, r2}, {0x6, 0x5c, 0x5, 0x7, 0x0, 0x5, 0x7, 0x37d}, {0x5, 0xa2, 0x2, 0x9}, 0x8, 0x6e6bb8, 0x1, 0x1, 0x1, 0x3}, {{@in6=@loopback, 0x4d2, 0x2b}, 0xa, @in=@empty, 0x3502, 0x2, 0x0, 0x0, 0x1, 0x6, 0x6a0}}, 0xe8) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)={0x7fff4, 0x81, 0x4, 0x2, 0x0, 0x7f, 0x40000000000006}) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={""/10, ""/2, @dev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e20, 0x4, 0x4e20, 0x1, 0xa, 0x80, 0xe0, 0x32, r1, r4}, {0x6, 0x7, 0x400, 0x4, 0x1ff, 0x5, 0x1, 0x6}, {0xdfa4, 0x5, 0x1, 0x7}, 0x7ff, 0x6e6bbf, 0x1, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d5, 0xff}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0xf8, 0x3, 0x7, 0x100}}, 0xe8) 00:22:24 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:24 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11, 0x0, r2}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r3, 0x0, 0x0) sendto$packet(r3, &(0x7f00000008c0)="27b276943e1da78576c280d4791d71a76b7819932e121e416163e9051efda80f45c466d9b91bca287c91f307738af12969ca6b0f6e1ee4a21cfb2fbd40a49cd37555b67792e99ab08f0e0bd44313119b7c31217448da55600f5eb2e020ed206e64825804ecf075b01c768a37432d7fdf10cabe81edcd1148f168252d0892aed8a64b5e5b2406db0f730fe235439836e93797f8900a05f0f761ab0bee0c3acf6d6225db8d71b5c74090b612999bd4f56ceb88808982c8998e2132e6a37c75182e5598996346040dcb995a8abe2730a5560a75b3dcb2b83785387516e0b8d8dcafdd0ac503be15b600a27ac31e1a992d8f67dc26892221827a214657c55c7654668ed56eb73a69f6387f2922453cd792c871a03f52b2d8a08d512a3309c016d6f215514c27be705ae6020057306e5a83952b32271d5e1bd4b825bd2f3eaaa320ab4a34379b05a2a84b30d3b4edfac9444f94add2e317b66909089063dbb356eefc24d6983adcb5a71b0190f7d20ee1b0c4a0b9a190d69777f230d6c28fa2664241707e6f495b1e02684158ddc2b60c60b11cab832fdb2b49ac7beda85433a509bca82ba01bc19f56c3cef24f264798ac0dd03346614b3360bf0462b9341bb0d1beb64eaf250c8cf467791f0414d99a512d8d7f8c592711e0e3a44d49108297257976f3ffe76d5df6e444473486905b240681f29404cad1bb18b51143bed67b060a6acedf81c795fa96435422c2519b666e6ee1c7f4e3aa3f0e1e8388da426fd094ffda938719adee22b4f36fa4d35377261d144943ac94cd17b8ca4f7af96fa0fa14828a56c590c502608f6c5c03d5757c40281440cc67fe5d1be2d48d21a08f6b010a421001bf3cdfcc8965ddf825fe59753d69c64cfaf6087eea9616cfb7f1f58807935aaca0c0f38423dd35199390ac0bdb8ede683fc11e6370151d6753dfd506d223161876dbd9bb87c1ec67454085eec9a0e8f61600652180d370136707109028383251c0e37d368f99fc619b8fe28875cf9df21ed5e5d09f4c0da78772f779ecdab05f022054f387828ca8b8805c116e830aed5d5457904f3641c05fc9872c5c8006b992114bcec7abde92cce8f293ea58624a61241cc92af79f3769cabc0607450ef8f175d869a941af0ae8c5da09b3b6453f50332697cad3277db0025531e2170859629570927be9691427ff08d63a0bac77470be749b755c9d2583c0452afe04eaac3a07e863d281065b469000c415df5e9a14c8d0aff9325f3cf1713aac2642737a6e1f808d61a0471534d1d28af24f2768059e5b1b36288d8393fdae042779380108bf2f2175d0fe6aba27383d8b63acd817fe4691f6274425641655b86037c9d9e3201f51953e252c42ca8ca31b90ecac8b31453f81e3b63a3dc0061f7bf2abbf586163dad62031907388fa3fd1bb5dba8af9b419cdbb531b2752888b18a45aa43212249e0757dda6d6d99bb72bdcb39195216ad87fbc78f648a9e40431064ef3ec89d3cce3fd03a8997583b92606c1fd9d51a26b2b9c4472f623bcd099b23a33535776ecc516483a2b68347c5e7e1d9147b4a81d63ac0e51a3169d7b6bcd34172de4f3b6b79a66439c6aae51aa3c4f9ead2be010e176b7f354869daa0c877a2d7c3008079a466786bf53427f40511bc05be99c358501473124d619fb205e9823b83b9751d0f665e4eb67f03f48344fb7f6da6d4c6a57fb07517a37ec6e9b7fa09614b6dcffc5a9940afb7a2c54d507793a6b0eb8b30239943b9b4af5e8c65af8bbc3738302e37cff350e8dbefd6276a7c14ea8752cac956f8dd3e61c613342bb7816a23028843fa723764f1289a805baaa943a31c5089e4e17efdc2f3a50f8c1d9789a547845d621e4713140fe00282c423993c88dbe658ad8110451543c06f3f2ec8a1a83f627dc78c73aa51148881f78dc5c7a40e12c34c29e3e0c8cba174eb604a112db4cc8dcd0cc4542f190634668ea779330ab10f2ff5ccb12b289cb56fc33b6743be22544510521c90e508c8d5fe5bcb54a022167bc026173ffc5e7351755115adc2643b721a249cab5f7d318d23cc70cae7e1be9a52082ee4432e089bfdf4e3fdd60a331a7524e5dcbbd35846976c4b01f4ef29b1545a7907ec84f7588caf870690a176e760e163d45002e508716eea9bb906700ecd302b53835638f56e0601e562b174f96c60171701e1b6ab9beb898577cb993cd793ebf5a5371f8dac9f5cf6ffa34e108a482f7b026fd83f31ea82c482e7013f1ea80ad33a9bf709db61479e8cf4ed903c240e60ca1e681edb6f657c5e7115f3f014253496becba21ad6a53d21e87f31e6e4569e9405bbc6010ed10df44331176c4d0764930844fd03ca75b804453ba787305f129848768a89e9ee21070552b681de5cb8b3893dfd4d6c281db824c4cdfe08ecff20d673ef9cf7274f6ea77f6ddcf1db587ea0ef10dc5f37ea714c1b84443822d1a93c18da5aff02fb6956407c834fc4ae545daa1c4718e5f0676d5b1fe67c4e7f19a989b6f15007d71a03b3c448009469bdd23e68c1e68cfa011754278ed124ae977ed6a69c43cca76413268c9deb2601cffbea17f609ba85e0110c49f3795838451ccbc53e972b8c1a98e607c539a7bbe1b1fb95766a1bb0fb52da5127fa98e1fba5180cf363b41168e2eccbcf9deb2295f5d5ea89fe72edc059e34c57e23dbfb5f26874e5bdf3f6c705cafe2fa8d7fbad2022524fa755566a5762782a805de76716cd68964053509e5cf2bcb8cc45a2d20787a4532a912e8485cdde2a2b2f70403480cac31410362f7c71edb0ded0b7a095c2d339ae24db1bfb758c323021f55eb3077eb75693429c807b1051f6634b6e5eacdb16c242c01dbd9b50ce9fe0aab61c33a878136d86127ee81b46febb4bdd8dfafe0707fdc93c5676cee9e5acf3e7ef60613432b173dcbfb1a72fbcb668dda01ad39a8041a2b1972d9cb082c7e2d428428283420baf750ac260a36d8145bd3d755775c59dbb2e918047e9290df7bec6b96c036105d4b76c60a881524d1b38339a8712f54816c3dcdc582be6b5ec034ba071d61384eab95a95badf42d7e2f6d480141342b4f299151654475f24d96b8660543cd26bd83d6c968021355497835f1fa9c9dddfdf448ced2ee1c62d10c13b266314b8a7ef9f9978bef3505fc62e0cd79aa16952311eafae57d2077d65bc5b5cc4e10bbb191f4d12e1d93995b4fda3b00a492d0e9787d7280340b108fb93e4e935c405e34ac66f741d2e2a579333f31a8115a03025aad64ce62432fddc22517c96f52e566b71bbc353bfc53d2a94d6ff3dc16c1d23bff744f6e0528e5fa5f67b74d39d7baaf9f113b0ec74301b3f7e448a9b6932731cd129a9ddf2ec9aee46f367a77c9db8bfe155c8477e92cbcafc2f7b528f5c06eb0b93ee7aa601e59a0eda37cadf9cac2ae968794352e884e8ed63977b919864fbc5a38933387b1dffc29abeac3ecfcf8b801ddb8eee1b058b661bd7be5782672a18bdbd7bb9164f3c9c6b130c7def47c23157bdcbcce8c2069726b06286a6674882e5d0a0300f15b89780bc5895601937e9aedd00aa022b85dfadac6b3761267082c53d623621fccbcb0c464b9d7dadf47994e0d08654da031b883d5f563368cf934d9e495e9b98c8b4bede9625d660a21cc4fdc5f4ea9d71e424b5441a0a7167e647f583e0ba9cdd9b55b79354aebaa43b0796ec439efcbe51d29136155e98689542e250cc1ee6387327bd9d08f044f105ec70a7993dc927e945fa6ea546d90e35af3fadf3727abb2a5e63ae040239c69db3c3ab300edf85b4e175b70c824e44578619fb0b34bcac2a70e6da86400e6fbd2647f6b57d385b75190f834afafd600cc707049ce5d9cc45d21e39c32b39d48ac03f10c9d54f83d7237d085594b3239e8a83a380b8eb0ea709fcc3e7705fc2de3cc512781306e938ac94ff0d88f92f4e3df53c25846eb1e633e97ed70f9e920602e773b6cda55beb74d5242a7dc23ae2a775a6fd9715162a7f9df60646d201485141efa924caa49f4f6047e857f50f507397044359a7f8cea806c0003329bf7ac8212f1895b7408ea69fe4a2ec3691cc3e4848f53f31e1a78697971a5f2408dcb2700da86052da52f43c5dcd2e9a1b3eec10a2a475601ba37f3b28c411b795d1886f04eb1e0651bb681fd0cc27c2300b939316398fb3d50029b51232b67b405808728d2c27743bf1b50b500cf95ddf9966043ae24f6b7f4eddc18c2002b9dfb5d40f859768afd6fbc125ae95ca174567793ae512ae705d5d0eee5ca501be9d8c18cdd68c05a0d9713f848d5b4c6b25666770fd8e9613c883f659d3cedc147a4c2acce3572b0fd4cdbdf141013f39b650c47ea18a050a41c6fe8053147140f3929f73418ec09dac3cdae1239c6e8f55e718f272febedc62255ca7f6a7018fdebd2e7441076edf86a67a143d2126a3ac84b72b57511561824cd5f13c6250e1af26ac0ecf9cd0434d6ae5e5edcb822fb8567bfbcea940290699318a62342ed0b6e03bb2058d42e7443f59c4563236789eddc70c50be87fca2a672fc747e86cbfd38a280d7b4364d05a7925fca70cb1e10823b583fac135fe862ae52144051eb62cc090e9d77ac7754c5484b67d3fa11ef8ff48203f71123da345f6f2ab1ce90b4f82b246af4f134243fd2c5fadef3461623a614d90b48b2cb4a57190bce6abb294bad5e257bc6f188e2937aa4cdcc3c2042532f68c931f755a7ecf6b46c3a13c4778fd54776d989e2654407d5e8c895df7d1543f4f97ace45b5389dc894fc306d91ad2b6b8505a8150eb95bb47fa130dd1cb36a99c6751fc5ba8ff8ec4dc0b9aaae6c2ae125f7704cf722f91cb9248ac4579b520c66b1e66ecc07dbec339e83770a976aa4f273e5c955f97873b92a3d202a773ff55f353ab5ed4619c4895cf5f266fef725e676c88a4945579f61b518983b81ea7616e518f58b3e2a792a95d3fbc2f248019ffeedb2dd9f0c2042db6d294eddacb312d8c71bd4007110788b8fe278fef96e21fe62de43542f3b5273ff9c488c415efaa8c7354ef4e5f8b15a339f1e963340007f83a38155a825052b4a54904fe74075e7463f65a41f9ba686abf2f551d9c6d07907f316cd9a8c7f84807a3db275e7f6e636e6f053a1acd7a66522f74beccff99a543f843ac5f914002196d502aab90199cd2b0b688d2a90931c7d07e897c2c4d54aec83abd1f92b86770a6f2d0db5e73038374b78760e8dfa181c63cadce1cd045e2248ad2b785ac3f36a8ffd096863cfd50a25fcef20754909fb4e9eb947633fbce02f01833beb2d087aaa9256483a47f9145f3a82b9ef42653e444a5086465a3282da712cf5fb5a4e2976bec1f141c80487e36802414e12924d6500e23af5fa1c07749956a447f1296caa844fb7f61ea0095140c8aec21e71373ec963f59547ad6ec8adbf55c3d06ab5da76d5df546067e652d36ae877f08d165e9eec5feded3c0b88b10bf295b7763ae77855d1d8f3543b5385f74b5b103879a6621c69d92a0b76b9b64e7f9f1ebd88c80b25f717ab669e979d469364d02a6d4433282680f321b0be860c5af6cdb45ed1365060f3bc2af1d879603e343e4bef994474848e70129e7b534e5ed723d99631a7bed65c9c49145ae676bf748b308518bb688f6d0be4e4c481b16fc1a52625afb9387fbc8305767028edd0fba5d7b7e6d5737c3fab94f03759573cde7907bcd99757b7382cc8fe8ab65d60937fd158c1e063b465279159805cdbbc6c8c33bcc5a5f5426f30b0094d8d5ee0013ce4906ba1aa352e", 0x1000, 0x4000000, &(0x7f0000000380)={0x11, 0xc, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}}, 0x14) ioctl$RTC_UIE_ON(r0, 0x7003) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) 00:22:24 executing program 3: socket$packet(0x11, 0x3, 0x300) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x16, 0x0, 0x1, 0x1, 0x6, @multicast}, 0x14) 00:22:24 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x49, 0x6, 0x0, 0xa0, 0x0, 0x401, 0x2004, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x0, 0x100}, 0x10) 00:22:24 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x6, 0x7f, 0x5}]}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@multicast1, 0x4e21, 0x7, 0x4e23, 0x0, 0x2, 0xa0, 0x80, 0x0, r1, r2}, {0x6, 0x5c, 0x5, 0x7, 0x0, 0x5, 0x7, 0x37d}, {0x5, 0xa2, 0x2, 0x9}, 0x8, 0x6e6bb8, 0x1, 0x1, 0x1, 0x3}, {{@in6=@loopback, 0x4d2, 0x2b}, 0xa, @in=@empty, 0x3502, 0x2, 0x0, 0x0, 0x1, 0x6, 0x6a0}}, 0xe8) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)={0x7fff4, 0x81, 0x4, 0x2, 0x0, 0x7f, 0x40000000000006}) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@ipv4={""/10, ""/2, @dev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e20, 0x4, 0x4e20, 0x1, 0xa, 0x80, 0xe0, 0x32, r1, r4}, {0x6, 0x7, 0x400, 0x4, 0x1ff, 0x5, 0x1, 0x6}, {0xdfa4, 0x5, 0x1, 0x7}, 0x7ff, 0x6e6bbf, 0x1, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d5, 0xff}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0xf8, 0x3, 0x7, 0x100}}, 0xe8) 00:22:24 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11, 0x0, r2}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r3, 0x0, 0x0) sendto$packet(r3, &(0x7f00000008c0)="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", 0x1000, 0x4000000, &(0x7f0000000380)={0x11, 0xc, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}}, 0x14) ioctl$RTC_UIE_ON(r0, 0x7003) 00:22:24 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:22:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080), 0x10) 00:22:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@multicast1, 0x4e21, 0x7, 0x4e23, 0x0, 0x2, 0xa0, 0x80, 0x0, r1, r2}, {0x6, 0x5c, 0x5, 0x7, 0x0, 0x5, 0x7, 0x37d}, {0x5, 0xa2, 0x2, 0x9}, 0x8, 0x6e6bb8, 0x1, 0x1, 0x1, 0x3}, {{@in6=@loopback, 0x4d2, 0x2b}, 0xa, @in=@empty, 0x3502, 0x2, 0x0, 0x0, 0x1, 0x6, 0x6a0}}, 0xe8) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)={0x7fff4, 0x81, 0x4, 0x2, 0x0, 0x7f, 0x40000000000006}) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e20, 0x4, 0x4e20, 0x1, 0xa, 0x80, 0xe0, 0x32, r1}, {0x6, 0x7, 0x400, 0x4, 0x1ff, 0x5, 0x1, 0x6}, {0xdfa4, 0x5, 0x1, 0x7}, 0x7ff, 0x6e6bbf, 0x1, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d5, 0xff}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0xf8, 0x3, 0x7, 0x100}}, 0xe8) 00:22:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x6, 0x0, 0xa0, 0x0, 0x401, 0x2004, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:24 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11, 0x0, r2}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r3, 0x0, 0x0) sendto$packet(r3, &(0x7f00000008c0)="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", 0x1000, 0x4000000, &(0x7f0000000380)={0x11, 0xc, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}}, 0x14) 00:22:24 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080), 0x10) 00:22:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@multicast1, 0x4e21, 0x7, 0x4e23, 0x0, 0x2, 0xa0, 0x80, 0x0, r1, r2}, {0x6, 0x5c, 0x5, 0x7, 0x0, 0x5, 0x7, 0x37d}, {0x5, 0xa2, 0x2, 0x9}, 0x8, 0x6e6bb8, 0x1, 0x1, 0x1, 0x3}, {{@in6=@loopback, 0x4d2, 0x2b}, 0xa, @in=@empty, 0x3502, 0x2, 0x0, 0x0, 0x1, 0x6, 0x6a0}}, 0xe8) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)={0x7fff4, 0x81, 0x4, 0x2, 0x0, 0x7f, 0x40000000000006}) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e20, 0x4, 0x4e20, 0x1, 0xa, 0x80, 0xe0, 0x32, r1}, {0x6, 0x7, 0x400, 0x4, 0x1ff, 0x5, 0x1, 0x6}, {0xdfa4, 0x5, 0x1, 0x7}, 0x7ff, 0x6e6bbf, 0x1, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d5, 0xff}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0xf8, 0x3, 0x7, 0x100}}, 0xe8) 00:22:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0xa0, 0x0, 0x401, 0x2004, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:24 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11, 0x0, r2}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r3, 0x0, 0x0) [ 783.690238][ T25] audit: type=1326 audit(1622679744.368:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12482 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080), 0x10) 00:22:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x2004, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:25 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11, 0x0, r2}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 00:22:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@multicast1, 0x4e21, 0x7, 0x4e23, 0x0, 0x2, 0xa0, 0x80, 0x0, r1, r2}, {0x6, 0x5c, 0x5, 0x7, 0x0, 0x5, 0x7, 0x37d}, {0x5, 0xa2, 0x2, 0x9}, 0x8, 0x6e6bb8, 0x1, 0x1, 0x1, 0x3}, {{@in6=@loopback, 0x4d2, 0x2b}, 0xa, @in=@empty, 0x3502, 0x2, 0x0, 0x0, 0x1, 0x6, 0x6a0}}, 0xe8) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)={0x7fff4, 0x81, 0x4, 0x2, 0x0, 0x7f, 0x40000000000006}) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e20, 0x4, 0x4e20, 0x1, 0xa, 0x80, 0xe0, 0x32, r1}, {0x6, 0x7, 0x400, 0x4, 0x1ff, 0x5, 0x1, 0x6}, {0xdfa4, 0x5, 0x1, 0x7}, 0x7ff, 0x6e6bbf, 0x1, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d5, 0xff}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0xf8, 0x3, 0x7, 0x100}}, 0xe8) 00:22:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080), 0x10) 00:22:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:25 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11, 0x0, r2}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r3, 0x0, 0x0) sendto$packet(r3, &(0x7f00000008c0)="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", 0x1000, 0x4000000, &(0x7f0000000380)={0x11, 0xc, 0x0, 0x1, 0x3, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}}, 0x14) ioctl$RTC_UIE_ON(r0, 0x7003) prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) 00:22:25 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:25 executing program 3: ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000000)=0xb5a) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x4, 0x0, 0xfe, 0x7}, {0x80, 0x6d, 0x80, 0xff7}]}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000100)=0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x9, 0x1, 0x200}]}) 00:22:25 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11, 0x0, r2}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) 00:22:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080), 0x10) 00:22:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@multicast1, 0x4e21, 0x7, 0x4e23, 0x0, 0x2, 0xa0, 0x80, 0x0, r1, r2}, {0x6, 0x5c, 0x5, 0x7, 0x0, 0x5, 0x7, 0x37d}, {0x5, 0xa2, 0x2, 0x9}, 0x8, 0x6e6bb8, 0x1, 0x1, 0x1, 0x3}, {{@in6=@loopback, 0x4d2, 0x2b}, 0xa, @in=@empty, 0x3502, 0x2, 0x0, 0x0, 0x1, 0x6, 0x6a0}}, 0xe8) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)={0x7fff4, 0x81, 0x4, 0x2, 0x0, 0x7f, 0x40000000000006}) prctl$PR_SET_SECCOMP(0x4, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e20, 0x4, 0x4e20, 0x1, 0xa, 0x80, 0xe0, 0x32, r1}, {0x6, 0x7, 0x400, 0x4, 0x1ff, 0x5, 0x1, 0x6}, {0xdfa4, 0x5, 0x1, 0x7}, 0x7ff, 0x6e6bbf, 0x1, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d5, 0xff}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0xf8, 0x3, 0x7, 0x100}}, 0xe8) [ 784.567288][ T25] audit: type=1326 audit(1622679745.248:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12530 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:25 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11, 0x0, r2}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) 00:22:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080), 0x10) 00:22:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:25 executing program 3: ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000000)=0xb5a) prctl$PR_SET_SECCOMP(0x3, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x4, 0x0, 0xfe, 0x7}, {0x80, 0x6d, 0x80, 0xff7}]}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000100)=0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x9, 0x1, 0x200}]}) 00:22:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) [ 784.660398][ T25] audit: type=1326 audit(1622679745.298:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12531 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 784.732828][ T25] audit: type=1326 audit(1622679745.378:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12557 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 00:22:26 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@multicast1, 0x4e21, 0x7, 0x4e23, 0x0, 0x2, 0xa0, 0x80, 0x0, r1, r2}, {0x6, 0x5c, 0x5, 0x7, 0x0, 0x5, 0x7, 0x37d}, {0x5, 0xa2, 0x2, 0x9}, 0x8, 0x6e6bb8, 0x1, 0x1, 0x1, 0x3}, {{@in6=@loopback, 0x4d2, 0x2b}, 0xa, @in=@empty, 0x3502, 0x2, 0x0, 0x0, 0x1, 0x6, 0x6a0}}, 0xe8) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)={0x7fff4, 0x81, 0x4, 0x2, 0x0, 0x7f, 0x40000000000006}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e20, 0x4, 0x4e20, 0x1, 0xa, 0x80, 0xe0, 0x32, r1}, {0x6, 0x7, 0x400, 0x4, 0x1ff, 0x5, 0x1, 0x6}, {0xdfa4, 0x5, 0x1, 0x7}, 0x7ff, 0x6e6bbf, 0x1, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d5, 0xff}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0xf8, 0x3, 0x7, 0x100}}, 0xe8) 00:22:26 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000540)={@private2}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) 00:22:26 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080), 0x10) 00:22:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:26 executing program 3: syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff7000/0x8000)=nil, &(0x7f0000000000)="1a65fb62e7111a411d315325fc0e8ab3a5648777f6d5585a1b4ed9b0b8e817a757d1d1ba222f97c5b46d651e6fa8d6f5b87b2611e86be99ba570ad4df9500105d7944aeff9031b42cb6aad8cc78a9debc9e7644fcd2071d66846506fc6602f6788cc87ec7acbfb904f0203e92aec449abb10b05cc4", 0x75}, 0x68) prctl$PR_SET_SECCOMP(0x7, 0x1, 0x0) 00:22:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:26 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) 00:22:26 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080), 0x10) [ 785.446424][ T25] audit: type=1326 audit(1622679746.128:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12582 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r2 = getuid() setuid(r2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@multicast1, 0x4e21, 0x7, 0x4e23, 0x0, 0x2, 0xa0, 0x80, 0x0, r1, r2}, {0x6, 0x5c, 0x5, 0x7, 0x0, 0x5, 0x7, 0x37d}, {0x5, 0xa2, 0x2, 0x9}, 0x8, 0x6e6bb8, 0x1, 0x1, 0x1, 0x3}, {{@in6=@loopback, 0x4d2, 0x2b}, 0xa, @in=@empty, 0x3502, 0x2, 0x0, 0x0, 0x1, 0x6, 0x6a0}}, 0xe8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e20, 0x4, 0x4e20, 0x1, 0xa, 0x80, 0xe0, 0x32, r1}, {0x6, 0x7, 0x400, 0x4, 0x1ff, 0x5, 0x1, 0x6}, {0xdfa4, 0x5, 0x1, 0x7}, 0x7ff, 0x6e6bbf, 0x1, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d5, 0xff}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0xf8, 0x3, 0x7, 0x100}}, 0xe8) 00:22:26 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) 00:22:26 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x0, 0x0}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:26 executing program 3: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x1000) r0 = socket$nl_generic(0x10, 0x3, 0x10) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fff7f, &(0x7f0000000000)=ANY=[@ANYRES16=r0]) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) getsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f0000000040)=""/39, &(0x7f0000000100)=0x27) 00:22:26 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080), 0x10) 00:22:26 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) 00:22:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r2 = getuid() setuid(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e20, 0x4, 0x4e20, 0x1, 0xa, 0x80, 0xe0, 0x32, r1}, {0x6, 0x7, 0x400, 0x4, 0x1ff, 0x5, 0x1, 0x6}, {0xdfa4, 0x5, 0x1, 0x7}, 0x7ff, 0x6e6bbf, 0x1, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d5, 0xff}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0xf8, 0x3, 0x7, 0x100}}, 0xe8) 00:22:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:27 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080), 0x10) 00:22:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) getuid() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e20, 0x4, 0x4e20, 0x1, 0xa, 0x80, 0xe0, 0x32, r1}, {0x6, 0x7, 0x400, 0x4, 0x1ff, 0x5, 0x1, 0x6}, {0xdfa4, 0x5, 0x1, 0x7}, 0x7ff, 0x6e6bbf, 0x1, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d5, 0xff}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0xf8, 0x3, 0x7, 0x100}}, 0xe8) 00:22:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:27 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) 00:22:27 executing program 3: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x1000) r0 = socket$nl_generic(0x10, 0x3, 0x10) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fff7f, &(0x7f0000000000)=ANY=[@ANYRES16=r0]) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) getsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f0000000040)=""/39, &(0x7f0000000100)=0x27) [ 786.354964][ T25] audit: type=1326 audit(1622679747.028:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12625 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:27 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x0, 0x0}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:27 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080), 0x10) 00:22:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e20, 0x4, 0x4e20, 0x1, 0xa, 0x80, 0xe0, 0x32, r1}, {0x6, 0x7, 0x400, 0x4, 0x1ff, 0x5, 0x1, 0x6}, {0xdfa4, 0x5, 0x1, 0x7}, 0x7ff, 0x6e6bbf, 0x1, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d5, 0xff}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0xf8, 0x3, 0x7, 0x100}}, 0xe8) 00:22:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:27 executing program 3: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x1000) r0 = socket$nl_generic(0x10, 0x3, 0x10) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fff7f, &(0x7f0000000000)=ANY=[@ANYRES16=r0]) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) getsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f0000000040)=""/39, &(0x7f0000000100)=0x27) 00:22:27 executing program 1: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) 00:22:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000540)={@private2}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e20, 0x4, 0x4e20, 0x1, 0xa, 0x80, 0xe0, 0x32}, {0x6, 0x7, 0x400, 0x4, 0x1ff, 0x5, 0x1, 0x6}, {0xdfa4, 0x5, 0x1, 0x7}, 0x7ff, 0x6e6bbf, 0x1, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d5, 0xff}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0xf8, 0x3, 0x7, 0x100}}, 0xe8) 00:22:27 executing program 3: shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x1000) r0 = socket$nl_generic(0x10, 0x3, 0x10) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000c00)={&(0x7f0000000a00), 0xc, &(0x7f0000000bc0)={0x0}}, 0x41) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1fff7f, &(0x7f0000000000)=ANY=[@ANYRES16=r0]) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) [ 787.209025][ T25] audit: type=1326 audit(1622679747.888:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12660 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:22:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) 00:22:27 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080), 0x10) 00:22:27 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev={0xfe, 0x80, '\x00', 0x1d}, 0x4e20, 0x4, 0x4e20, 0x1, 0xa, 0x80, 0xe0, 0x32}, {0x6, 0x7, 0x400, 0x4, 0x1ff, 0x5, 0x1, 0x6}, {0xdfa4, 0x5, 0x1, 0x7}, 0x7ff, 0x6e6bbf, 0x1, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d5, 0xff}, 0x2, @in=@private=0xa010102, 0x3504, 0x3, 0x2, 0xf8, 0x3, 0x7, 0x100}}, 0xe8) 00:22:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:28 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0x4, 0x4e22, 0x1, 0xa, 0xa0, 0x20, 0x11}, {0x5, 0x1d1, 0x7, 0x2, 0x81, 0x5, 0x2, 0x15fd99e3}, {0x6, 0x6, 0x400, 0x8}, 0x8, 0x6e6bb1, 0x1, 0x0, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, 0x4d3, 0x6c}, 0xa, @in6=@remote, 0x0, 0x1, 0x3, 0x8, 0x8, 0x1, 0x40}}, 0xe8) 00:22:28 executing program 0: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080), 0x10) 00:22:28 executing program 4: io_uring_setup(0x1119, &(0x7f0000000140)={0x0, 0xc070, 0x4, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x2, 0x1, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x0, 0x0}) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x3, 0x1}, 0x4) 00:22:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0x8000, 0x336, 0x8, 0x3, 0x3, 0x5, 0x0, 0x5, 0x0, 0x4a3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) 00:22:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) set