[  OK  ] Reached target Graphical Interface.
         Starting Update UTMP about System Runlevel Changes...
         Starting Load/Save RF Kill Switch Status...
[  OK  ] Started Update UTMP about System Runlevel Changes.
[  OK  ] Started Load/Save RF Kill Switch Status.

Debian GNU/Linux 9 syzkaller ttyS0

Warning: Permanently added '10.128.1.3' (ECDSA) to the list of known hosts.
2022/02/24 13:33:46 fuzzer started
2022/02/24 13:33:46 dialing manager at 10.128.0.163:45943
2022/02/24 13:33:52 syscalls: 3475
2022/02/24 13:33:52 code coverage: enabled
2022/02/24 13:33:52 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument
2022/02/24 13:33:52 extra coverage: extra coverage is not supported by the kernel
2022/02/24 13:33:52 delay kcov mmap: mmap returned an invalid pointer
2022/02/24 13:33:52 setuid sandbox: enabled
2022/02/24 13:33:52 namespace sandbox: enabled
2022/02/24 13:33:52 Android sandbox: /sys/fs/selinux/policy does not exist
2022/02/24 13:33:52 fault injection: enabled
2022/02/24 13:33:52 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2022/02/24 13:33:52 net packet injection: enabled
2022/02/24 13:33:52 net device setup: enabled
2022/02/24 13:33:52 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2022/02/24 13:33:52 devlink PCI setup: PCI device 0000:00:10.0 is not available
2022/02/24 13:33:52 USB emulation: /dev/raw-gadget does not exist
2022/02/24 13:33:52 hci packet injection: enabled
2022/02/24 13:33:52 wifi device emulation: kernel 4.17 required (have 4.14.268-syzkaller�����������������������������������������������)
2022/02/24 13:33:52 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist
2022/02/24 13:33:52 fetching corpus: 0, signal 0/2000 (executing program)
2022/02/24 13:33:52 fetching corpus: 50, signal 50325/53896 (executing program)
2022/02/24 13:33:52 fetching corpus: 100, signal 76120/81137 (executing program)
2022/02/24 13:33:52 fetching corpus: 150, signal 93609/100025 (executing program)
2022/02/24 13:33:53 fetching corpus: 200, signal 106252/113994 (executing program)
2022/02/24 13:33:53 fetching corpus: 249, signal 121442/130299 (executing program)
2022/02/24 13:33:53 fetching corpus: 299, signal 130256/140296 (executing program)
2022/02/24 13:33:53 fetching corpus: 349, signal 136875/148110 (executing program)
2022/02/24 13:33:53 fetching corpus: 399, signal 145562/157884 (executing program)
2022/02/24 13:33:54 fetching corpus: 449, signal 154014/167379 (executing program)
2022/02/24 13:33:54 fetching corpus: 498, signal 160672/175074 (executing program)
2022/02/24 13:33:54 fetching corpus: 548, signal 167417/182749 (executing program)
2022/02/24 13:33:54 fetching corpus: 598, signal 173694/189972 (executing program)
2022/02/24 13:33:54 fetching corpus: 646, signal 179073/196241 (executing program)
2022/02/24 13:33:55 fetching corpus: 694, signal 185764/203695 (executing program)
2022/02/24 13:33:55 fetching corpus: 743, signal 191117/209877 (executing program)
2022/02/24 13:33:55 fetching corpus: 790, signal 194882/214466 (executing program)
2022/02/24 13:33:55 fetching corpus: 838, signal 200345/220706 (executing program)
2022/02/24 13:33:55 fetching corpus: 887, signal 204076/225272 (executing program)
2022/02/24 13:33:56 fetching corpus: 937, signal 208723/230596 (executing program)
2022/02/24 13:33:56 fetching corpus: 987, signal 213162/235704 (executing program)
2022/02/24 13:33:56 fetching corpus: 1037, signal 217417/240655 (executing program)
2022/02/24 13:33:56 fetching corpus: 1086, signal 221118/244997 (executing program)
2022/02/24 13:33:57 fetching corpus: 1135, signal 227442/251662 (executing program)
2022/02/24 13:33:57 fetching corpus: 1184, signal 231881/256617 (executing program)
2022/02/24 13:33:57 fetching corpus: 1232, signal 235642/260906 (executing program)
2022/02/24 13:33:57 fetching corpus: 1281, signal 239551/265318 (executing program)
2022/02/24 13:33:57 fetching corpus: 1330, signal 242545/268916 (executing program)
2022/02/24 13:33:57 fetching corpus: 1380, signal 246802/273575 (executing program)
2022/02/24 13:33:58 fetching corpus: 1429, signal 249431/276770 (executing program)
2022/02/24 13:33:58 fetching corpus: 1479, signal 252395/280296 (executing program)
2022/02/24 13:33:58 fetching corpus: 1529, signal 256151/284533 (executing program)
2022/02/24 13:33:58 fetching corpus: 1577, signal 258048/286999 (executing program)
2022/02/24 13:33:58 fetching corpus: 1625, signal 260987/290361 (executing program)
2022/02/24 13:33:58 fetching corpus: 1667, signal 263268/293144 (executing program)
2022/02/24 13:33:59 fetching corpus: 1717, signal 266475/296640 (executing program)
2022/02/24 13:33:59 fetching corpus: 1767, signal 269514/299994 (executing program)
2022/02/24 13:33:59 fetching corpus: 1817, signal 272800/303558 (executing program)
2022/02/24 13:33:59 fetching corpus: 1865, signal 275061/306304 (executing program)
2022/02/24 13:34:00 fetching corpus: 1915, signal 277436/309022 (executing program)
2022/02/24 13:34:00 fetching corpus: 1961, signal 279964/311869 (executing program)
2022/02/24 13:34:00 fetching corpus: 2011, signal 282693/314873 (executing program)
2022/02/24 13:34:00 fetching corpus: 2057, signal 284478/317108 (executing program)
2022/02/24 13:34:00 fetching corpus: 2107, signal 286433/319463 (executing program)
2022/02/24 13:34:00 fetching corpus: 2156, signal 288408/321802 (executing program)
2022/02/24 13:34:01 fetching corpus: 2204, signal 290843/324458 (executing program)
2022/02/24 13:34:01 fetching corpus: 2253, signal 293225/327136 (executing program)
2022/02/24 13:34:01 fetching corpus: 2298, signal 295591/329707 (executing program)
2022/02/24 13:34:01 fetching corpus: 2345, signal 297745/332035 (executing program)
2022/02/24 13:34:01 fetching corpus: 2394, signal 299536/334139 (executing program)
2022/02/24 13:34:02 fetching corpus: 2441, signal 301002/335964 (executing program)
2022/02/24 13:34:02 fetching corpus: 2489, signal 303307/338397 (executing program)
2022/02/24 13:34:02 fetching corpus: 2536, signal 305515/340802 (executing program)
2022/02/24 13:34:02 fetching corpus: 2586, signal 307385/342907 (executing program)
2022/02/24 13:34:02 fetching corpus: 2636, signal 309736/345373 (executing program)
2022/02/24 13:34:03 fetching corpus: 2685, signal 312308/347965 (executing program)
2022/02/24 13:34:03 fetching corpus: 2735, signal 313960/349862 (executing program)
2022/02/24 13:34:03 fetching corpus: 2785, signal 315445/351561 (executing program)
2022/02/24 13:34:03 fetching corpus: 2833, signal 316620/353032 (executing program)
2022/02/24 13:34:03 fetching corpus: 2882, signal 318110/354836 (executing program)
2022/02/24 13:34:04 fetching corpus: 2931, signal 320829/357435 (executing program)
2022/02/24 13:34:04 fetching corpus: 2978, signal 322573/359364 (executing program)
2022/02/24 13:34:04 fetching corpus: 3028, signal 324926/361614 (executing program)
2022/02/24 13:34:04 fetching corpus: 3077, signal 326406/363278 (executing program)
2022/02/24 13:34:04 fetching corpus: 3127, signal 328615/365471 (executing program)
2022/02/24 13:34:05 fetching corpus: 3177, signal 330048/367043 (executing program)
2022/02/24 13:34:05 fetching corpus: 3226, signal 331818/368874 (executing program)
2022/02/24 13:34:05 fetching corpus: 3276, signal 333492/370595 (executing program)
2022/02/24 13:34:05 fetching corpus: 3325, signal 335253/372374 (executing program)
2022/02/24 13:34:05 fetching corpus: 3372, signal 336779/373996 (executing program)
2022/02/24 13:34:06 fetching corpus: 3421, signal 338513/375734 (executing program)
2022/02/24 13:34:06 fetching corpus: 3471, signal 339950/377264 (executing program)
2022/02/24 13:34:06 fetching corpus: 3519, signal 341361/378790 (executing program)
2022/02/24 13:34:06 fetching corpus: 3567, signal 342524/380161 (executing program)
2022/02/24 13:34:06 fetching corpus: 3617, signal 344008/381690 (executing program)
2022/02/24 13:34:06 fetching corpus: 3664, signal 345553/383217 (executing program)
2022/02/24 13:34:06 fetching corpus: 3713, signal 346761/384527 (executing program)
2022/02/24 13:34:07 fetching corpus: 3760, signal 348184/385941 (executing program)
2022/02/24 13:34:07 fetching corpus: 3808, signal 350030/387646 (executing program)
2022/02/24 13:34:07 fetching corpus: 3855, signal 351490/389060 (executing program)
2022/02/24 13:34:07 fetching corpus: 3904, signal 352664/390260 (executing program)
2022/02/24 13:34:07 fetching corpus: 3951, signal 354003/391624 (executing program)
2022/02/24 13:34:08 fetching corpus: 4000, signal 355299/392898 (executing program)
2022/02/24 13:34:08 fetching corpus: 4047, signal 357050/394468 (executing program)
2022/02/24 13:34:08 fetching corpus: 4097, signal 358397/395761 (executing program)
2022/02/24 13:34:08 fetching corpus: 4145, signal 359815/397117 (executing program)
2022/02/24 13:34:08 fetching corpus: 4194, signal 361250/398502 (executing program)
2022/02/24 13:34:09 fetching corpus: 4243, signal 362912/399988 (executing program)
2022/02/24 13:34:09 fetching corpus: 4292, signal 364085/401195 (executing program)
2022/02/24 13:34:09 fetching corpus: 4341, signal 365317/402345 (executing program)
2022/02/24 13:34:09 fetching corpus: 4386, signal 366696/403579 (executing program)
2022/02/24 13:34:09 fetching corpus: 4436, signal 367968/404780 (executing program)
2022/02/24 13:34:09 fetching corpus: 4486, signal 369198/405868 (executing program)
2022/02/24 13:34:10 fetching corpus: 4535, signal 370173/406841 (executing program)
2022/02/24 13:34:10 fetching corpus: 4583, signal 371160/407789 (executing program)
2022/02/24 13:34:10 fetching corpus: 4633, signal 372385/408861 (executing program)
2022/02/24 13:34:10 fetching corpus: 4681, signal 373422/409820 (executing program)
2022/02/24 13:34:10 fetching corpus: 4729, signal 374648/410867 (executing program)
2022/02/24 13:34:11 fetching corpus: 4778, signal 375765/411845 (executing program)
2022/02/24 13:34:11 fetching corpus: 4828, signal 376907/412837 (executing program)
2022/02/24 13:34:11 fetching corpus: 4875, signal 377922/413751 (executing program)
2022/02/24 13:34:11 fetching corpus: 4923, signal 379066/414773 (executing program)
2022/02/24 13:34:11 fetching corpus: 4973, signal 380574/415924 (executing program)
2022/02/24 13:34:12 fetching corpus: 5021, signal 382103/417109 (executing program)
2022/02/24 13:34:12 fetching corpus: 5070, signal 383105/417967 (executing program)
2022/02/24 13:34:12 fetching corpus: 5117, signal 384221/418887 (executing program)
2022/02/24 13:34:12 fetching corpus: 5167, signal 385106/419706 (executing program)
2022/02/24 13:34:13 fetching corpus: 5217, signal 386205/420620 (executing program)
2022/02/24 13:34:13 fetching corpus: 5261, signal 387132/421528 (executing program)
2022/02/24 13:34:13 fetching corpus: 5311, signal 388099/422322 (executing program)
2022/02/24 13:34:13 fetching corpus: 5359, signal 389002/423145 (executing program)
2022/02/24 13:34:14 fetching corpus: 5406, signal 390155/424056 (executing program)
2022/02/24 13:34:14 fetching corpus: 5455, signal 391184/424920 (executing program)
2022/02/24 13:34:14 fetching corpus: 5503, signal 392083/425733 (executing program)
2022/02/24 13:34:14 fetching corpus: 5552, signal 392983/426471 (executing program)
2022/02/24 13:34:14 fetching corpus: 5600, signal 393910/427233 (executing program)
2022/02/24 13:34:14 fetching corpus: 5649, signal 394848/427991 (executing program)
2022/02/24 13:34:15 fetching corpus: 5699, signal 396281/428977 (executing program)
2022/02/24 13:34:15 fetching corpus: 5747, signal 397504/429879 (executing program)
2022/02/24 13:34:15 fetching corpus: 5797, signal 398413/430542 (executing program)
2022/02/24 13:34:15 fetching corpus: 5847, signal 400211/431647 (executing program)
2022/02/24 13:34:15 fetching corpus: 5896, signal 401075/432294 (executing program)
2022/02/24 13:34:16 fetching corpus: 5946, signal 402072/433010 (executing program)
2022/02/24 13:34:16 fetching corpus: 5994, signal 403051/433718 (executing program)
2022/02/24 13:34:16 fetching corpus: 6044, signal 404012/434383 (executing program)
2022/02/24 13:34:16 fetching corpus: 6092, signal 404964/435051 (executing program)
2022/02/24 13:34:16 fetching corpus: 6140, signal 405908/435735 (executing program)
2022/02/24 13:34:17 fetching corpus: 6189, signal 406829/436385 (executing program)
2022/02/24 13:34:17 fetching corpus: 6239, signal 407597/436964 (executing program)
2022/02/24 13:34:17 fetching corpus: 6289, signal 408873/437763 (executing program)
2022/02/24 13:34:17 fetching corpus: 6337, signal 409727/438365 (executing program)
2022/02/24 13:34:17 fetching corpus: 6386, signal 410476/438905 (executing program)
2022/02/24 13:34:18 fetching corpus: 6434, signal 411199/439451 (executing program)
2022/02/24 13:34:18 fetching corpus: 6483, signal 411771/439901 (executing program)
2022/02/24 13:34:18 fetching corpus: 6531, signal 412692/440514 (executing program)
2022/02/24 13:34:18 fetching corpus: 6579, signal 413480/441035 (executing program)
2022/02/24 13:34:18 fetching corpus: 6627, signal 414421/441639 (executing program)
2022/02/24 13:34:19 fetching corpus: 6677, signal 415368/442208 (executing program)
2022/02/24 13:34:19 fetching corpus: 6725, signal 416397/442819 (executing program)
2022/02/24 13:34:19 fetching corpus: 6772, signal 417110/443325 (executing program)
2022/02/24 13:34:19 fetching corpus: 6822, signal 417959/443804 (executing program)
2022/02/24 13:34:19 fetching corpus: 6868, signal 418833/444332 (executing program)
2022/02/24 13:34:19 fetching corpus: 6917, signal 419835/444896 (executing program)
2022/02/24 13:34:20 fetching corpus: 6964, signal 420418/445317 (executing program)
2022/02/24 13:34:20 fetching corpus: 7011, signal 421451/445895 (executing program)
2022/02/24 13:34:20 fetching corpus: 7060, signal 422460/446450 (executing program)
2022/02/24 13:34:20 fetching corpus: 7107, signal 423352/446912 (executing program)
2022/02/24 13:34:21 fetching corpus: 7157, signal 424111/447369 (executing program)
2022/02/24 13:34:21 fetching corpus: 7204, signal 425336/447998 (executing program)
2022/02/24 13:34:21 fetching corpus: 7252, signal 425911/448350 (executing program)
2022/02/24 13:34:21 fetching corpus: 7302, signal 426607/448759 (executing program)
2022/02/24 13:34:21 fetching corpus: 7351, signal 427182/449121 (executing program)
2022/02/24 13:34:21 fetching corpus: 7398, signal 428298/449621 (executing program)
2022/02/24 13:34:22 fetching corpus: 7447, signal 429280/450065 (executing program)
2022/02/24 13:34:22 fetching corpus: 7496, signal 429841/450396 (executing program)
2022/02/24 13:34:22 fetching corpus: 7546, signal 430616/450794 (executing program)
2022/02/24 13:34:22 fetching corpus: 7596, signal 431434/451185 (executing program)
2022/02/24 13:34:22 fetching corpus: 7646, signal 432471/451664 (executing program)
2022/02/24 13:34:23 fetching corpus: 7696, signal 433450/452082 (executing program)
2022/02/24 13:34:23 fetching corpus: 7746, signal 434507/452543 (executing program)
2022/02/24 13:34:23 fetching corpus: 7796, signal 435309/452898 (executing program)
2022/02/24 13:34:23 fetching corpus: 7846, signal 436191/453288 (executing program)
2022/02/24 13:34:23 fetching corpus: 7895, signal 436916/453619 (executing program)
2022/02/24 13:34:23 fetching corpus: 7944, signal 437504/453883 (executing program)
2022/02/24 13:34:24 fetching corpus: 7994, signal 438175/454185 (executing program)
2022/02/24 13:34:24 fetching corpus: 8044, signal 438724/454447 (executing program)
2022/02/24 13:34:24 fetching corpus: 8094, signal 439421/454734 (executing program)
2022/02/24 13:34:24 fetching corpus: 8142, signal 440131/455040 (executing program)
2022/02/24 13:34:24 fetching corpus: 8189, signal 440742/455341 (executing program)
2022/02/24 13:34:24 fetching corpus: 8238, signal 441221/455557 (executing program)
2022/02/24 13:34:25 fetching corpus: 8285, signal 441861/455819 (executing program)
2022/02/24 13:34:25 fetching corpus: 8333, signal 442670/456099 (executing program)
2022/02/24 13:34:25 fetching corpus: 8379, signal 443375/456419 (executing program)
2022/02/24 13:34:25 fetching corpus: 8428, signal 444097/456673 (executing program)
2022/02/24 13:34:25 fetching corpus: 8477, signal 444899/456946 (executing program)
2022/02/24 13:34:26 fetching corpus: 8527, signal 445593/457191 (executing program)
2022/02/24 13:34:26 fetching corpus: 8574, signal 446210/457407 (executing program)
2022/02/24 13:34:26 fetching corpus: 8622, signal 446664/457576 (executing program)
2022/02/24 13:34:26 fetching corpus: 8670, signal 447327/457782 (executing program)
2022/02/24 13:34:26 fetching corpus: 8720, signal 448002/458003 (executing program)
2022/02/24 13:34:27 fetching corpus: 8768, signal 448550/458208 (executing program)
2022/02/24 13:34:27 fetching corpus: 8817, signal 449397/458471 (executing program)
2022/02/24 13:34:27 fetching corpus: 8864, signal 450049/458660 (executing program)
2022/02/24 13:34:27 fetching corpus: 8914, signal 451237/458948 (executing program)
2022/02/24 13:34:27 fetching corpus: 8964, signal 451985/459143 (executing program)
2022/02/24 13:34:28 fetching corpus: 9014, signal 452632/459279 (executing program)
2022/02/24 13:34:28 fetching corpus: 9064, signal 453350/459443 (executing program)
2022/02/24 13:34:28 fetching corpus: 9112, signal 454175/459619 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/459664 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/459695 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/459734 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/459773 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/459801 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/459833 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/459863 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/459892 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/459913 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/459945 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/459966 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/459997 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460030 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460064 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460096 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460133 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460168 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460195 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460229 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460263 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460295 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460318 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460352 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460371 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460400 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460437 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460461 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460489 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460514 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460546 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460575 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460597 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460621 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460659 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460693 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460712 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460738 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460770 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460798 (executing program)
2022/02/24 13:34:28 fetching corpus: 9113, signal 454192/460826 (executing program)
2022/02/24 13:34:28 fetching corpus: 9114, signal 454202/460843 (executing program)
2022/02/24 13:34:28 fetching corpus: 9114, signal 454202/460876 (executing program)
2022/02/24 13:34:28 fetching corpus: 9114, signal 454202/460878 (executing program)
2022/02/24 13:34:28 fetching corpus: 9114, signal 454202/460878 (executing program)
2022/02/24 13:34:30 starting 6 fuzzer processes
13:34:30 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always'])
chdir(&(0x7f0000000380)='./bus\x00')
r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0)
ftruncate(r0, 0x208200)
r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000140)="a1", 0x1}], 0x1, 0x0)
ftruncate(r1, 0x546)

13:34:30 executing program 2:
syz_clone(0x91020000, &(0x7f0000001100), 0x0, 0x0, 0x0, 0x0)

13:34:30 executing program 5:
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8)
syz_open_dev$vcsn(0x0, 0x0, 0x101800)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001aee4285a7c572fb51ba1ad1577ef6d7ed1a10daf5bba642c13d963b71a9666011edcc6"], 0x94}}, 0x0)
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)={0x3f00})
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002800)={{0x14}, [@NFT_MSG_DELOBJ={0x68, 0x14, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x7}, @NFT_OBJECT_SYNPROXY=@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELSETELEM={0x258, 0xe, 0xa, 0x5, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x230, 0x3, 0x0, 0x1, [{0xc0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xac, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa5, 0x1, "7c87f9e608137b7f719a42c8b57c09a3da6447178a8fbea0890fd74c5896f722b26faa9ea718783fcaae9a6d6dd827d3a422804c8c0a9b38d33f3cbea40a24a9dca14eef4ac64aad7d2eaede6381f8b96fb0e1afa5209a477b9931e03bc0559a5040131b9c691e40471c77e02d8f88d3303fa3500b3730f244652354b420401a8ee8b3ff5c2957f0d48fb3e141a9b68db4aaf61648a2eafdd00851e25e669fb45d"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x24, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x8, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1}]}, {0x114, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xdc, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x18, 0x1, "b8d74e69d819ee4618015b2a95ed47535915c307"}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0x62, 0x1, "3132345a6142b882782402fc60d7a9024026be24205ad0f70033ed0881531f4adc0237acdc33ceb50e96e02d2b585a366739f8719a1371243c2eaed110b9097cfcba3054b11c9c13dda643dbded1ae34d51dfd236631ad742aa344cc3d29"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}, {0x4}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}], {0x14}}, 0x348}, 0x1, 0x0, 0x0, 0x20000000}, 0xc0)
r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0xc05c5340, &(0x7f00000000c0))

13:34:30 executing program 3:
r0 = socket$phonet_pipe(0x23, 0x5, 0x2)
accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14)
setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000000)=0x1, 0x4)

13:34:30 executing program 4:
syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400040001000240000004f8", 0x16}, {0x0, 0x0, 0x600}], 0x2a0cc10, &(0x7f0000000880))

13:34:30 executing program 1:
openat$sysctl(0xffffffffffffff9c, 0x0, 0x1, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x4010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x3, 0x2)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x3, 0x2}}, 0x2e)
setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000200)={0x1, 'macvlan1\x00', 0x3}, 0x18)
setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000580)={0x2, 'sit0\x00', 0x2}, 0x18)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000006c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=<r1=>0xffffffffffffffff, @ANYBLOB="f4b333cc15d2f1b25532ed5eacca2291f0f03771609851c00d9fd2beffcbb04ed97c42e050284c9feca97d24816331212cb2a08c0d83119354f5296f586949058a503e6dd79e4000000000000000662e11497fcaedb90b93aeb9f230d46f3e886f8857e3580b55d14ad3ddc60b904c25ac337c341cca0170aabf72feba003e72a5e4dcb251c346c686330a0f646a458df3780000f90ba28267253eea6a0e3ac5563e1aab30baadd75d66521dfdeb354b7156513c218c5fe076"])
accept4(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, <r2=>0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x80, 0x40000)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr, @dev}, &(0x7f0000000280)=0xc)
ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000080))
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10)
socket$inet(0x2, 0x3, 0x2)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4801}, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
recvfrom(0xffffffffffffffff, &(0x7f0000000540)=""/42, 0x2a, 0x40000143, 0x0, 0x0)
r3 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg(r3, &(0x7f0000000500)={&(0x7f00000002c0)=@generic={0xa, "8492bad618c9fae911de206775d1db105b5d7454a8dba9e1f9ac875f09063ac4970d69dc0b427da0011927d0d47a9938e05a8c4d990e02163e0f6ac09b0de8d76b89f535d638c0f52e956fa289c924576640bd6e7a481d028597a20c76f1290b7852faab352ce3bb9ae1f211d5c6e3ef89f68c483adfed3ac2e7d59ce21a"}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)="f917a6918b78d1a9a37b93ed6a3e05c6c1e61b9c2028", 0x16}, {&(0x7f0000000380)="1ad417f6148ea62de52df7c6879c81b69578470aaa7faf15452edb7401b78eb982fd3728269c5de5", 0x28}, {&(0x7f00000003c0)="51f998156ef54f772ed7441e239b0aef52a4f2ac378f16ad974f60bcacb8aa495d67f9142232c7f1bdad76d0", 0x2c}], 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="88000000000000000c01000000000000fc04d8bccaaa175d962f49ace97c3c90b47e7f49f6336fb9ce45ad83efe48ca81e3801fc9cde80fc89bb7df10635dc1f973609f80fbd3acfc51751590fe046bfe8b733d4a9245bb6807466097369e7306801b05ee15dbfd4179882efdacf148e48d5dfacd08c200fe6e44d24456c022d23f4caf1286a60047797ee3e51439900000000"], 0x88}, 0x8044)

syzkaller login: [   72.520593] IPVS: ftp: loaded support on port[0] = 21
[   72.597200] IPVS: ftp: loaded support on port[0] = 21
[   72.669683] chnl_net:caif_netlink_parms(): no params data found
[   72.695615] IPVS: ftp: loaded support on port[0] = 21
[   72.777385] chnl_net:caif_netlink_parms(): no params data found
[   72.824370] IPVS: ftp: loaded support on port[0] = 21
[   72.895278] chnl_net:caif_netlink_parms(): no params data found
[   72.920967] bridge0: port 1(bridge_slave_0) entered blocking state
[   72.927754] bridge0: port 1(bridge_slave_0) entered disabled state
[   72.935744] device bridge_slave_0 entered promiscuous mode
[   72.947646] bridge0: port 2(bridge_slave_1) entered blocking state
[   72.954687] bridge0: port 2(bridge_slave_1) entered disabled state
[   72.963312] device bridge_slave_1 entered promiscuous mode
[   73.015043] bridge0: port 1(bridge_slave_0) entered blocking state
[   73.021401] bridge0: port 1(bridge_slave_0) entered disabled state
[   73.029305] device bridge_slave_0 entered promiscuous mode
[   73.043930] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   73.055391] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   73.063402] bridge0: port 2(bridge_slave_1) entered blocking state
[   73.069775] bridge0: port 2(bridge_slave_1) entered disabled state
[   73.077008] device bridge_slave_1 entered promiscuous mode
[   73.097984] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   73.114756] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   73.118440] IPVS: ftp: loaded support on port[0] = 21
[   73.154873] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   73.162389] team0: Port device team_slave_0 added
[   73.173011] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   73.179992] team0: Port device team_slave_0 added
[   73.196694] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   73.204662] team0: Port device team_slave_1 added
[   73.214796] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   73.222032] team0: Port device team_slave_1 added
[   73.258473] bridge0: port 1(bridge_slave_0) entered blocking state
[   73.264875] bridge0: port 1(bridge_slave_0) entered disabled state
[   73.272955] device bridge_slave_0 entered promiscuous mode
[   73.334558] bridge0: port 2(bridge_slave_1) entered blocking state
[   73.340889] bridge0: port 2(bridge_slave_1) entered disabled state
[   73.348268] device bridge_slave_1 entered promiscuous mode
[   73.361222] batman_adv: batadv0: Adding interface: batadv_slave_0
[   73.368313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   73.393686] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   73.407495] batman_adv: batadv0: Adding interface: batadv_slave_1
[   73.414341] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   73.439540] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   73.450340] batman_adv: batadv0: Adding interface: batadv_slave_0
[   73.456894] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   73.482138] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   73.495673] batman_adv: batadv0: Adding interface: batadv_slave_1
[   73.501984] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   73.527173] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   73.546551] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   73.554609] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   73.565911] IPVS: ftp: loaded support on port[0] = 21
[   73.566934] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   73.578277] chnl_net:caif_netlink_parms(): no params data found
[   73.589530] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   73.597417] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   73.611387] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   73.655790] device hsr_slave_0 entered promiscuous mode
[   73.661330] device hsr_slave_1 entered promiscuous mode
[   73.680177] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   73.687774] team0: Port device team_slave_0 added
[   73.699246] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[   73.707801] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[   73.728893] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   73.736335] team0: Port device team_slave_1 added
[   73.745607] device hsr_slave_0 entered promiscuous mode
[   73.751154] device hsr_slave_1 entered promiscuous mode
[   73.779601] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[   73.803254] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[   73.847062] batman_adv: batadv0: Adding interface: batadv_slave_0
[   73.853515] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   73.879647] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   73.928656] chnl_net:caif_netlink_parms(): no params data found
[   73.939277] batman_adv: batadv0: Adding interface: batadv_slave_1
[   73.945699] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   73.970922] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   73.981849] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   74.010123] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   74.120420] chnl_net:caif_netlink_parms(): no params data found
[   74.149829] device hsr_slave_0 entered promiscuous mode
[   74.155586] device hsr_slave_1 entered promiscuous mode
[   74.184904] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[   74.197528] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[   74.209874] bridge0: port 1(bridge_slave_0) entered blocking state
[   74.216637] bridge0: port 1(bridge_slave_0) entered disabled state
[   74.223764] device bridge_slave_0 entered promiscuous mode
[   74.244647] bridge0: port 2(bridge_slave_1) entered blocking state
[   74.251793] bridge0: port 2(bridge_slave_1) entered disabled state
[   74.259535] device bridge_slave_1 entered promiscuous mode
[   74.318105] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   74.353787] bridge0: port 1(bridge_slave_0) entered blocking state
[   74.360176] bridge0: port 1(bridge_slave_0) entered disabled state
[   74.367491] device bridge_slave_0 entered promiscuous mode
[   74.377641] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   74.405614] bridge0: port 2(bridge_slave_1) entered blocking state
[   74.412144] bridge0: port 2(bridge_slave_1) entered disabled state
[   74.418950] device bridge_slave_1 entered promiscuous mode
[   74.456689] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   74.463948] team0: Port device team_slave_0 added
[   74.469367] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   74.477209] team0: Port device team_slave_1 added
[   74.521891] Bluetooth: hci5 command 0x0409 tx timeout
[   74.526813] Bluetooth: hci0 command 0x0409 tx timeout
[   74.527306] Bluetooth: hci1 command 0x0409 tx timeout
[   74.534408] Bluetooth: hci4 command 0x0409 tx timeout
[   74.538778] Bluetooth: hci3 command 0x0409 tx timeout
[   74.551461] Bluetooth: hci2 command 0x0409 tx timeout
[   74.554998] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   74.563678] bridge0: port 1(bridge_slave_0) entered blocking state
[   74.569999] bridge0: port 1(bridge_slave_0) entered disabled state
[   74.577575] device bridge_slave_0 entered promiscuous mode
[   74.586284] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   74.594629] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   74.607671] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   74.635764] bridge0: port 2(bridge_slave_1) entered blocking state
[   74.642344] bridge0: port 2(bridge_slave_1) entered disabled state
[   74.649140] device bridge_slave_1 entered promiscuous mode
[   74.665054] batman_adv: batadv0: Adding interface: batadv_slave_0
[   74.671269] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   74.697381] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   74.708760] batman_adv: batadv0: Adding interface: batadv_slave_1
[   74.715380] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   74.740952] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   74.753625] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   74.760804] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   74.768365] team0: Port device team_slave_0 added
[   74.773964] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   74.780978] team0: Port device team_slave_1 added
[   74.795814] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   74.804713] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   74.813682] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   74.852319] batman_adv: batadv0: Adding interface: batadv_slave_0
[   74.858546] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   74.884551] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   74.896578] batman_adv: batadv0: Adding interface: batadv_slave_1
[   74.903187] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   74.928719] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   74.940250] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   74.948031] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   74.980034] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   74.987717] team0: Port device team_slave_0 added
[   74.996401] device hsr_slave_0 entered promiscuous mode
[   75.002146] device hsr_slave_1 entered promiscuous mode
[   75.008334] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[   75.016885] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[   75.037647] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   75.044939] team0: Port device team_slave_1 added
[   75.052935] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   75.068286] device hsr_slave_0 entered promiscuous mode
[   75.074375] device hsr_slave_1 entered promiscuous mode
[   75.080363] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[   75.113797] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[   75.121028] batman_adv: batadv0: Adding interface: batadv_slave_0
[   75.127292] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   75.152641] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   75.165181] batman_adv: batadv0: Adding interface: batadv_slave_1
[   75.172048] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   75.197246] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   75.235645] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   75.244253] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   75.318978] 8021q: adding VLAN 0 to HW filter on device bond0
[   75.331132] device hsr_slave_0 entered promiscuous mode
[   75.337302] device hsr_slave_1 entered promiscuous mode
[   75.344143] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[   75.351201] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[   75.362138] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   75.393412] 8021q: adding VLAN 0 to HW filter on device bond0
[   75.403002] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   75.424542] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   75.432757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   75.439950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   75.453073] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[   75.459125] 8021q: adding VLAN 0 to HW filter on device team0
[   75.475261] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   75.488608] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   75.515834] 8021q: adding VLAN 0 to HW filter on device bond0
[   75.522101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   75.529700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   75.538263] bridge0: port 1(bridge_slave_0) entered blocking state
[   75.544718] bridge0: port 1(bridge_slave_0) entered forwarding state
[   75.553783] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   75.567913] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   75.578222] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   75.588067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   75.596824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   75.604615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   75.612284] bridge0: port 2(bridge_slave_1) entered blocking state
[   75.618603] bridge0: port 2(bridge_slave_1) entered forwarding state
[   75.626027] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   75.632984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   75.646910] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   75.664483] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   75.673477] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[   75.679534] 8021q: adding VLAN 0 to HW filter on device team0
[   75.686796] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[   75.712149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   75.718964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   75.726322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   75.736095] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[   75.742494] 8021q: adding VLAN 0 to HW filter on device team0
[   75.751497] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[   75.760704] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[   75.771138] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   75.780604] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   75.790175] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[   75.797841] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   75.807181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   75.815152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   75.822943] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   75.830374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   75.838150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   75.845892] bridge0: port 1(bridge_slave_0) entered blocking state
[   75.852258] bridge0: port 1(bridge_slave_0) entered forwarding state
[   75.858955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   75.867251] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   75.875051] bridge0: port 2(bridge_slave_1) entered blocking state
[   75.881435] bridge0: port 2(bridge_slave_1) entered forwarding state
[   75.888164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   75.895954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   75.903741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   75.911211] bridge0: port 1(bridge_slave_0) entered blocking state
[   75.917571] bridge0: port 1(bridge_slave_0) entered forwarding state
[   75.924457] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   75.931285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   75.938831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   75.950423] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[   75.964675] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[   75.974075] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   75.981527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   75.989014] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   75.997686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   76.005617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   76.013566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   76.021037] bridge0: port 2(bridge_slave_1) entered blocking state
[   76.027394] bridge0: port 2(bridge_slave_1) entered forwarding state
[   76.036976] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[   76.047222] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[   76.055570] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[   76.072544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   76.079911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   76.088637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   76.096204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   76.103825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   76.112131] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   76.119800] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   76.129956] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[   76.136030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   76.143590] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[   76.153731] 8021q: adding VLAN 0 to HW filter on device bond0
[   76.160982] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   76.173824] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   76.181463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   76.188991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   76.196118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   76.204411] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[   76.213654] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[   76.225369] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[   76.233131] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[   76.239181] 8021q: adding VLAN 0 to HW filter on device team0
[   76.245390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   76.254845] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   76.263430] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[   76.276836] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[   76.285533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   76.293295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   76.300750] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   76.308396] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   76.317595] 8021q: adding VLAN 0 to HW filter on device bond0
[   76.328078] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[   76.335632] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[   76.344360] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   76.352238] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[   76.362215] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   76.368354] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   76.375214] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   76.381958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   76.389450] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   76.397063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   76.404842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   76.412681] bridge0: port 1(bridge_slave_0) entered blocking state
[   76.419010] bridge0: port 1(bridge_slave_0) entered forwarding state
[   76.426031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   76.433976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   76.442052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   76.450201] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[   76.459318] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[   76.467805] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[   76.477000] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   76.485515] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   76.492899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   76.500233] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   76.507987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   76.515475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   76.523175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   76.530505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   76.537949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   76.544911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   76.551781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   76.559376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   76.567021] bridge0: port 2(bridge_slave_1) entered blocking state
[   76.573393] bridge0: port 2(bridge_slave_1) entered forwarding state
[   76.593946] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[   76.599923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   76.601474] Bluetooth: hci2 command 0x041b tx timeout
[   76.607863] Bluetooth: hci3 command 0x041b tx timeout
[   76.617286] Bluetooth: hci4 command 0x041b tx timeout
[   76.619359] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[   76.623288] Bluetooth: hci1 command 0x041b tx timeout
[   76.630097] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   76.634434] Bluetooth: hci0 command 0x041b tx timeout
[   76.646142] Bluetooth: hci5 command 0x041b tx timeout
[   76.648761] 8021q: adding VLAN 0 to HW filter on device batadv0
[   76.660305] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[   76.667425] 8021q: adding VLAN 0 to HW filter on device team0
[   76.676007] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   76.687753] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[   76.696080] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[   76.712339] 8021q: adding VLAN 0 to HW filter on device bond0
[   76.721127] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   76.728788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   76.737598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   76.745478] bridge0: port 1(bridge_slave_0) entered blocking state
[   76.751874] bridge0: port 1(bridge_slave_0) entered forwarding state
[   76.758617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   76.768376] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   76.776887] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[   76.786576] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[   76.795235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   76.802619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   76.810192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   76.817807] bridge0: port 2(bridge_slave_1) entered blocking state
[   76.824184] bridge0: port 2(bridge_slave_1) entered forwarding state
[   76.831206] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   76.838242] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   76.847442] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[   76.855627] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[   76.864876] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[   76.873382] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[   76.879967] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[   76.887027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   76.895215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   76.903213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   76.910691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   76.918712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   76.926199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   76.933181] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   76.939835] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   76.949162] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[   76.958414] 8021q: adding VLAN 0 to HW filter on device batadv0
[   76.967543] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[   76.978285] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[   76.986594] 8021q: adding VLAN 0 to HW filter on device team0
[   76.994684] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   77.002420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   77.009950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   77.018272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   77.028359] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[   77.037292] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[   77.049994] 8021q: adding VLAN 0 to HW filter on device batadv0
[   77.057754] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[   77.067613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   77.075616] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   77.083782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   77.091569] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   77.098988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   77.106889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   77.114505] bridge0: port 1(bridge_slave_0) entered blocking state
[   77.120840] bridge0: port 1(bridge_slave_0) entered forwarding state
[   77.127747] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   77.134751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   77.142738] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[   77.160037] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready
[   77.169020] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[   77.177137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   77.187922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   77.195427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   77.203650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   77.211118] bridge0: port 2(bridge_slave_1) entered blocking state
[   77.217507] bridge0: port 2(bridge_slave_1) entered forwarding state
[   77.226806] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[   77.238219] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[   77.248731] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[   77.256096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   77.263945] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   77.279604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   77.287204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   77.294870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   77.302537] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   77.316055] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready
[   77.325411] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[   77.338409] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[   77.346209] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   77.354237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   77.362785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   77.370440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   77.379390] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[   77.385629] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   77.402103] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[   77.416839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   77.432604] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[   77.439279] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[   77.447033] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[   77.459314] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready
[   77.467923] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[   77.482090] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready
[   77.494771] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready
[   77.502681] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready
[   77.509131] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready
[   77.516470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   77.524331] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   77.532423] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   77.539045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   77.546307] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   77.555423] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[   77.565866] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[   77.576428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   77.584083] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   77.591796] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   77.598452] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   77.606899] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready
[   77.615877] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[   77.626881] 8021q: adding VLAN 0 to HW filter on device batadv0
[   77.635142] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready
[   77.646477] device veth0_vlan entered promiscuous mode
[   77.655326] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready
[   77.662722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   77.670468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   77.678475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   77.686124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   77.693852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   77.701017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   77.708912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   77.717023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   77.726109] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   77.733394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   77.742817] 8021q: adding VLAN 0 to HW filter on device batadv0
[   77.751229] device veth1_vlan entered promiscuous mode
[   77.758388] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready
[   77.767981] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[   77.783853] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[   77.798204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   77.806929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   77.821872] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[   77.828222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   77.837117] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready
[   77.848058] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready
[   77.856702] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready
[   77.863508] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready
[   77.876035] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready
[   77.884108] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready
[   77.890781] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready
[   77.900649] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready
[   77.909826] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready
[   77.921804] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[   77.929060] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[   77.936829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   77.944906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   77.953016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   77.960186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   77.968778] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   77.975968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   77.983068] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   77.989846] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   77.998477] device veth0_vlan entered promiscuous mode
[   78.008725] device veth0_vlan entered promiscuous mode
[   78.015280] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[   78.022724] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   78.029403] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   78.044309] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready
[   78.055125] device veth1_vlan entered promiscuous mode
[   78.062919] device veth1_vlan entered promiscuous mode
[   78.100044] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready
[   78.108369] 8021q: adding VLAN 0 to HW filter on device batadv0
[   78.122097] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready
[   78.134612] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready
[   78.144489] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready
[   78.154072] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   78.163389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   78.170834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   78.178926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   78.191141] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready
[   78.203076] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready
[   78.210935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   78.219897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   78.236006] device veth0_macvtap entered promiscuous mode
[   78.242971] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready
[   78.251054] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready
[   78.265848] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready
[   78.274483] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   78.282509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   78.290136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   78.299678] device veth0_macvtap entered promiscuous mode
[   78.305986] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready
[   78.315913] device veth1_macvtap entered promiscuous mode
[   78.322534] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready
[   78.332928] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready
[   78.340749] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready
[   78.350330] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready
[   78.357365] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready
[   78.365756] device veth1_macvtap entered promiscuous mode
[   78.373319] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready
[   78.380214] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   78.387653] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   78.394803] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   78.401941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   78.409382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   78.419094] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready
[   78.429369] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready
[   78.437711] device veth0_macvtap entered promiscuous mode
[   78.444411] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready
[   78.453036] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready
[   78.459873] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready
[   78.466957] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready
[   78.474788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready
[   78.487912] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready
[   78.495077] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   78.502335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   78.509515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   78.518053] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready
[   78.529797] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready
[   78.539074] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready
[   78.546621] batman_adv: batadv0: Interface activated: batadv_slave_0
[   78.554458] device veth0_vlan entered promiscuous mode
[   78.559965] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   78.566872] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   78.574053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   78.581216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   78.588786] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   78.596431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   78.604662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   78.611643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   78.619320] device veth1_macvtap entered promiscuous mode
[   78.625584] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready
[   78.633261] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready
[   78.642904] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   78.652780] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   78.663225] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready
[   78.670099] batman_adv: batadv0: Interface activated: batadv_slave_0
[   78.678315] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready
[   78.681386] Bluetooth: hci2 command 0x040f tx timeout
[   78.685949] Bluetooth: hci5 command 0x040f tx timeout
[   78.695840] Bluetooth: hci0 command 0x040f tx timeout
[   78.700896] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready
[   78.701084] Bluetooth: hci1 command 0x040f tx timeout
[   78.709326] batman_adv: batadv0: Interface activated: batadv_slave_1
[   78.716946] Bluetooth: hci4 command 0x040f tx timeout
[   78.726184] Bluetooth: hci3 command 0x040f tx timeout
[   78.728252] device veth1_vlan entered promiscuous mode
[   78.738678] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready
[   78.747269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready
[   78.758264] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready
[   78.766884] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   78.774378] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[   78.782270] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   78.789792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   78.797839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   78.805744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   78.813836] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   78.821488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   78.830343] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   78.840263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   78.851143] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready
[   78.858062] batman_adv: batadv0: Interface activated: batadv_slave_1
[   78.873727] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready
[   78.894819] device veth0_vlan entered promiscuous mode
[   78.904432] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[   78.913866] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   78.922791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   78.937242] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready
[   78.951031] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   78.961468] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   78.970555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   78.980496] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   78.990983] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready
[   78.998454] batman_adv: batadv0: Interface activated: batadv_slave_0
[   79.013391] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready
[   79.022889] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready
[   79.029749] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready
[   79.037141] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready
[   79.044386] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   79.054857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   79.063140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   79.070604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   79.080760] device veth1_vlan entered promiscuous mode
[   79.093302] device veth0_macvtap entered promiscuous mode
[   79.099266] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready
[   79.108731] device veth1_macvtap entered promiscuous mode
[   79.118143] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   79.128414] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   79.137613] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   79.147355] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   79.157276] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready
[   79.165115] batman_adv: batadv0: Interface activated: batadv_slave_1
[   79.172868] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready
[   79.187537] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready
[   79.196309] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   79.206423] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   79.215248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   79.223475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   79.230655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   79.238582] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   79.246993] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   79.262651] device veth0_vlan entered promiscuous mode
[   79.277283] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready
[   79.286135] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready
[   79.302250] device veth1_vlan entered promiscuous mode
[   79.308299] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready
[   79.317229] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[   79.325352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   79.333045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   79.343397] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready
[   79.357342] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready
[   79.369043] device veth0_macvtap entered promiscuous mode
[   79.376632] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready
[   79.385695] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   79.396020] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   79.405843] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   79.415956] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   79.425464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   79.435229] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   79.445049] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready
[   79.452491] batman_adv: batadv0: Interface activated: batadv_slave_0
[   79.460681] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   79.470987] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   79.480327] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   79.490653] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   79.500209] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   79.509988] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   79.520002] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready
[   79.527155] batman_adv: batadv0: Interface activated: batadv_slave_1
[   79.535632] device veth1_macvtap entered promiscuous mode
[   79.542148] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready
[   79.548855] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[   79.556259] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   79.564152] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   79.571070] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   79.578878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   79.586787] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   79.594669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   79.614136] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready
[   79.624084] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready
[   79.636141] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready
[   79.654635] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready
[   79.668184] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   79.678603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   79.688483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   79.698253] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   79.707509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   79.717323] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   79.726947] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   79.737537] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   79.747725] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready
[   79.755182] batman_adv: batadv0: Interface activated: batadv_slave_0
[   79.761904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   79.769744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   79.777830] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   79.785738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   79.796380] device veth0_macvtap entered promiscuous mode
[   79.811855] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready
[   79.822150] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   79.834251] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   79.847948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   79.857753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   79.867311] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   79.877269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   79.887179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   79.896945] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   79.907283] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready
[   79.915029] batman_adv: batadv0: Interface activated: batadv_slave_1
13:34:39 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000040)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78)

[   79.930403] device veth1_macvtap entered promiscuous mode
[   79.937599] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready
[   79.948643] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   79.963937] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
13:34:39 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000040)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78)

[   79.997557] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   80.007497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
13:34:39 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000040)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78)

[   80.052438] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready
[   80.082021] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready
13:34:39 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000040)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78)

[   80.118252] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
13:34:39 executing program 2:
r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x4, 0x4d032, 0xffffffffffffffff, 0x0)
sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000180)={{0x20, 0x5}, 0x100, './file0\x00'})

[   80.159611] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   80.169381] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   80.182223] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   80.191405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   80.202120] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   80.211491] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   80.221247] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   80.230336] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   80.240094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   80.251770] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready
13:34:39 executing program 3:
r0 = socket$phonet_pipe(0x23, 0x5, 0x2)
accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14)
setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000000)=0x1, 0x4)

[   80.259262] batman_adv: batadv0: Interface activated: batadv_slave_0
[   80.271754] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   80.279576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   80.309676] hrtimer: interrupt took 49248 ns
[   80.318207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   80.339594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   80.359904] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   80.376765] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   80.395706] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   80.405692] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   80.418700] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   80.428521] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   80.443777] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   80.465357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   80.479867] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready
[   80.503673] batman_adv: batadv0: Interface activated: batadv_slave_1
[   80.539106] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   80.561687] IPVS: sync thread started: state = MASTER, mcast_ifn = macvlan1, syncid = 3, id = 0
[   80.573628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   80.774427] Bluetooth: hci3 command 0x0419 tx timeout
[   80.779682] Bluetooth: hci4 command 0x0419 tx timeout
[   80.814029] Bluetooth: hci1 command 0x0419 tx timeout
[   80.825313] Bluetooth: hci0 command 0x0419 tx timeout
[   80.861240] Bluetooth: hci5 command 0x0419 tx timeout
[   80.881498] Bluetooth: hci2 command 0x0419 tx timeout
[   81.063529] print_req_error: I/O error, dev loop4, sector 1
[   81.069414] Buffer I/O error on dev loop4, logical block 1, async page read
[   81.077525] print_req_error: I/O error, dev loop4, sector 2
[   81.083805] Buffer I/O error on dev loop4, logical block 2, async page read
[   81.090918] print_req_error: I/O error, dev loop4, sector 3
[   81.096830] Buffer I/O error on dev loop4, logical block 3, async page read
[   81.104005] print_req_error: I/O error, dev loop4, sector 4
[   81.109698] Buffer I/O error on dev loop4, logical block 4, async page read
[   81.117896] print_req_error: I/O error, dev loop4, sector 5
[   81.123668] Buffer I/O error on dev loop4, logical block 5, async page read
13:34:40 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always'])
chdir(&(0x7f0000000380)='./bus\x00')
r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0)
ftruncate(r0, 0x208200)
r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000140)="a1", 0x1}], 0x1, 0x0)
ftruncate(r1, 0x546)

13:34:40 executing program 1:
openat$sysctl(0xffffffffffffff9c, 0x0, 0x1, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x4010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x3, 0x2)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x3, 0x2}}, 0x2e)
setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000200)={0x1, 'macvlan1\x00', 0x3}, 0x18)
setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000580)={0x2, 'sit0\x00', 0x2}, 0x18)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000006c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=<r1=>0xffffffffffffffff, @ANYBLOB="f4b333cc15d2f1b25532ed5eacca2291f0f03771609851c00d9fd2beffcbb04ed97c42e050284c9feca97d24816331212cb2a08c0d83119354f5296f586949058a503e6dd79e4000000000000000662e11497fcaedb90b93aeb9f230d46f3e886f8857e3580b55d14ad3ddc60b904c25ac337c341cca0170aabf72feba003e72a5e4dcb251c346c686330a0f646a458df3780000f90ba28267253eea6a0e3ac5563e1aab30baadd75d66521dfdeb354b7156513c218c5fe076"])
accept4(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, <r2=>0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x80, 0x40000)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr, @dev}, &(0x7f0000000280)=0xc)
ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000080))
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10)
socket$inet(0x2, 0x3, 0x2)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4801}, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
recvfrom(0xffffffffffffffff, &(0x7f0000000540)=""/42, 0x2a, 0x40000143, 0x0, 0x0)
r3 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg(r3, &(0x7f0000000500)={&(0x7f00000002c0)=@generic={0xa, "8492bad618c9fae911de206775d1db105b5d7454a8dba9e1f9ac875f09063ac4970d69dc0b427da0011927d0d47a9938e05a8c4d990e02163e0f6ac09b0de8d76b89f535d638c0f52e956fa289c924576640bd6e7a481d028597a20c76f1290b7852faab352ce3bb9ae1f211d5c6e3ef89f68c483adfed3ac2e7d59ce21a"}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)="f917a6918b78d1a9a37b93ed6a3e05c6c1e61b9c2028", 0x16}, {&(0x7f0000000380)="1ad417f6148ea62de52df7c6879c81b69578470aaa7faf15452edb7401b78eb982fd3728269c5de5", 0x28}, {&(0x7f00000003c0)="51f998156ef54f772ed7441e239b0aef52a4f2ac378f16ad974f60bcacb8aa495d67f9142232c7f1bdad76d0", 0x2c}], 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="88000000000000000c01000000000000fc04d8bccaaa175d962f49ace97c3c90b47e7f49f6336fb9ce45ad83efe48ca81e3801fc9cde80fc89bb7df10635dc1f973609f80fbd3acfc51751590fe046bfe8b733d4a9245bb6807466097369e7306801b05ee15dbfd4179882efdacf148e48d5dfacd08c200fe6e44d24456c022d23f4caf1286a60047797ee3e51439900000000"], 0x88}, 0x8044)

13:34:40 executing program 3:
r0 = socket$phonet_pipe(0x23, 0x5, 0x2)
accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14)
setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000000)=0x1, 0x4)

13:34:40 executing program 5:
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8)
syz_open_dev$vcsn(0x0, 0x0, 0x101800)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001aee4285a7c572fb51ba1ad1577ef6d7ed1a10daf5bba642c13d963b71a9666011edcc6"], 0x94}}, 0x0)
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)={0x3f00})
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002800)={{0x14}, [@NFT_MSG_DELOBJ={0x68, 0x14, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x7}, @NFT_OBJECT_SYNPROXY=@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELSETELEM={0x258, 0xe, 0xa, 0x5, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x230, 0x3, 0x0, 0x1, [{0xc0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xac, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa5, 0x1, "7c87f9e608137b7f719a42c8b57c09a3da6447178a8fbea0890fd74c5896f722b26faa9ea718783fcaae9a6d6dd827d3a422804c8c0a9b38d33f3cbea40a24a9dca14eef4ac64aad7d2eaede6381f8b96fb0e1afa5209a477b9931e03bc0559a5040131b9c691e40471c77e02d8f88d3303fa3500b3730f244652354b420401a8ee8b3ff5c2957f0d48fb3e141a9b68db4aaf61648a2eafdd00851e25e669fb45d"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x24, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x8, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1}]}, {0x114, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xdc, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x18, 0x1, "b8d74e69d819ee4618015b2a95ed47535915c307"}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0x62, 0x1, "3132345a6142b882782402fc60d7a9024026be24205ad0f70033ed0881531f4adc0237acdc33ceb50e96e02d2b585a366739f8719a1371243c2eaed110b9097cfcba3054b11c9c13dda643dbded1ae34d51dfd236631ad742aa344cc3d29"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}, {0x4}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}], {0x14}}, 0x348}, 0x1, 0x0, 0x0, 0x20000000}, 0xc0)
r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0xc05c5340, &(0x7f00000000c0))

13:34:40 executing program 2:
r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x4, 0x4d032, 0xffffffffffffffff, 0x0)
sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000180)={{0x20, 0x5}, 0x100, './file0\x00'})

13:34:40 executing program 4:
syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400040001000240000004f8", 0x16}, {0x0, 0x0, 0x600}], 0x2a0cc10, &(0x7f0000000880))

13:34:40 executing program 4:
syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400040001000240000004f8", 0x16}, {0x0, 0x0, 0x600}], 0x2a0cc10, &(0x7f0000000880))

13:34:40 executing program 5:
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8)
syz_open_dev$vcsn(0x0, 0x0, 0x101800)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001aee4285a7c572fb51ba1ad1577ef6d7ed1a10daf5bba642c13d963b71a9666011edcc6"], 0x94}}, 0x0)
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)={0x3f00})
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002800)={{0x14}, [@NFT_MSG_DELOBJ={0x68, 0x14, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x7}, @NFT_OBJECT_SYNPROXY=@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELSETELEM={0x258, 0xe, 0xa, 0x5, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x230, 0x3, 0x0, 0x1, [{0xc0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xac, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa5, 0x1, "7c87f9e608137b7f719a42c8b57c09a3da6447178a8fbea0890fd74c5896f722b26faa9ea718783fcaae9a6d6dd827d3a422804c8c0a9b38d33f3cbea40a24a9dca14eef4ac64aad7d2eaede6381f8b96fb0e1afa5209a477b9931e03bc0559a5040131b9c691e40471c77e02d8f88d3303fa3500b3730f244652354b420401a8ee8b3ff5c2957f0d48fb3e141a9b68db4aaf61648a2eafdd00851e25e669fb45d"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x24, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x8, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1}]}, {0x114, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xdc, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x18, 0x1, "b8d74e69d819ee4618015b2a95ed47535915c307"}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0x62, 0x1, "3132345a6142b882782402fc60d7a9024026be24205ad0f70033ed0881531f4adc0237acdc33ceb50e96e02d2b585a366739f8719a1371243c2eaed110b9097cfcba3054b11c9c13dda643dbded1ae34d51dfd236631ad742aa344cc3d29"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}, {0x4}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}], {0x14}}, 0x348}, 0x1, 0x0, 0x0, 0x20000000}, 0xc0)
r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0xc05c5340, &(0x7f00000000c0))

13:34:40 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always'])
chdir(&(0x7f0000000380)='./bus\x00')
r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0)
ftruncate(r0, 0x208200)
r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000140)="a1", 0x1}], 0x1, 0x0)
ftruncate(r1, 0x546)

[   81.404534] print_req_error: I/O error, dev loop4, sector 1
[   81.410315] Buffer I/O error on dev loop4, logical block 1, async page read
[   81.425291] print_req_error: I/O error, dev loop4, sector 2
[   81.431046] Buffer I/O error on dev loop4, logical block 2, async page read
[   81.438722] print_req_error: I/O error, dev loop4, sector 3
[   81.444720] Buffer I/O error on dev loop4, logical block 3, async page read
13:34:40 executing program 3:
r0 = socket$phonet_pipe(0x23, 0x5, 0x2)
accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14)
setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000000)=0x1, 0x4)

13:34:40 executing program 4:
syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000440)='./file0\x00', 0x0, 0x2, &(0x7f0000000700)=[{&(0x7f0000000000)="eb3c906d8d6673fdd2617400040001000240000004f8", 0x16}, {0x0, 0x0, 0x600}], 0x2a0cc10, &(0x7f0000000880))

13:34:40 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always'])
chdir(&(0x7f0000000380)='./bus\x00')
r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0)
ftruncate(r0, 0x208200)
r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000140)="a1", 0x1}], 0x1, 0x0)
ftruncate(r1, 0x546)

[   81.452181] print_req_error: I/O error, dev loop4, sector 4
[   81.457934] Buffer I/O error on dev loop4, logical block 4, async page read
[   81.465105] print_req_error: I/O error, dev loop4, sector 5
[   81.470812] Buffer I/O error on dev loop4, logical block 5, async page read
13:34:40 executing program 1:
openat$sysctl(0xffffffffffffff9c, 0x0, 0x1, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x4010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x3, 0x2)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x3, 0x2}}, 0x2e)
setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000200)={0x1, 'macvlan1\x00', 0x3}, 0x18)
setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000580)={0x2, 'sit0\x00', 0x2}, 0x18)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000006c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=<r1=>0xffffffffffffffff, @ANYBLOB="f4b333cc15d2f1b25532ed5eacca2291f0f03771609851c00d9fd2beffcbb04ed97c42e050284c9feca97d24816331212cb2a08c0d83119354f5296f586949058a503e6dd79e4000000000000000662e11497fcaedb90b93aeb9f230d46f3e886f8857e3580b55d14ad3ddc60b904c25ac337c341cca0170aabf72feba003e72a5e4dcb251c346c686330a0f646a458df3780000f90ba28267253eea6a0e3ac5563e1aab30baadd75d66521dfdeb354b7156513c218c5fe076"])
accept4(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, <r2=>0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x80, 0x40000)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr, @dev}, &(0x7f0000000280)=0xc)
ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000080))
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10)
socket$inet(0x2, 0x3, 0x2)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4801}, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
recvfrom(0xffffffffffffffff, &(0x7f0000000540)=""/42, 0x2a, 0x40000143, 0x0, 0x0)
r3 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg(r3, &(0x7f0000000500)={&(0x7f00000002c0)=@generic={0xa, "8492bad618c9fae911de206775d1db105b5d7454a8dba9e1f9ac875f09063ac4970d69dc0b427da0011927d0d47a9938e05a8c4d990e02163e0f6ac09b0de8d76b89f535d638c0f52e956fa289c924576640bd6e7a481d028597a20c76f1290b7852faab352ce3bb9ae1f211d5c6e3ef89f68c483adfed3ac2e7d59ce21a"}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)="f917a6918b78d1a9a37b93ed6a3e05c6c1e61b9c2028", 0x16}, {&(0x7f0000000380)="1ad417f6148ea62de52df7c6879c81b69578470aaa7faf15452edb7401b78eb982fd3728269c5de5", 0x28}, {&(0x7f00000003c0)="51f998156ef54f772ed7441e239b0aef52a4f2ac378f16ad974f60bcacb8aa495d67f9142232c7f1bdad76d0", 0x2c}], 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="88000000000000000c01000000000000fc04d8bccaaa175d962f49ace97c3c90b47e7f49f6336fb9ce45ad83efe48ca81e3801fc9cde80fc89bb7df10635dc1f973609f80fbd3acfc51751590fe046bfe8b733d4a9245bb6807466097369e7306801b05ee15dbfd4179882efdacf148e48d5dfacd08c200fe6e44d24456c022d23f4caf1286a60047797ee3e51439900000000"], 0x88}, 0x8044)

13:34:40 executing program 5:
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8)
syz_open_dev$vcsn(0x0, 0x0, 0x101800)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001aee4285a7c572fb51ba1ad1577ef6d7ed1a10daf5bba642c13d963b71a9666011edcc6"], 0x94}}, 0x0)
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)={0x3f00})
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002800)={{0x14}, [@NFT_MSG_DELOBJ={0x68, 0x14, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x7}, @NFT_OBJECT_SYNPROXY=@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELSETELEM={0x258, 0xe, 0xa, 0x5, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x230, 0x3, 0x0, 0x1, [{0xc0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xac, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa5, 0x1, "7c87f9e608137b7f719a42c8b57c09a3da6447178a8fbea0890fd74c5896f722b26faa9ea718783fcaae9a6d6dd827d3a422804c8c0a9b38d33f3cbea40a24a9dca14eef4ac64aad7d2eaede6381f8b96fb0e1afa5209a477b9931e03bc0559a5040131b9c691e40471c77e02d8f88d3303fa3500b3730f244652354b420401a8ee8b3ff5c2957f0d48fb3e141a9b68db4aaf61648a2eafdd00851e25e669fb45d"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x24, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x8, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1}]}, {0x114, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xdc, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x18, 0x1, "b8d74e69d819ee4618015b2a95ed47535915c307"}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0x62, 0x1, "3132345a6142b882782402fc60d7a9024026be24205ad0f70033ed0881531f4adc0237acdc33ceb50e96e02d2b585a366739f8719a1371243c2eaed110b9097cfcba3054b11c9c13dda643dbded1ae34d51dfd236631ad742aa344cc3d29"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}, {0x4}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}], {0x14}}, 0x348}, 0x1, 0x0, 0x0, 0x20000000}, 0xc0)
r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0xc05c5340, &(0x7f00000000c0))

13:34:40 executing program 1:
openat$sysctl(0xffffffffffffff9c, 0x0, 0x1, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x4010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x3, 0x2)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x3, 0x2}}, 0x2e)
setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000200)={0x1, 'macvlan1\x00', 0x3}, 0x18)
setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000580)={0x2, 'sit0\x00', 0x2}, 0x18)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000006c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=<r1=>0xffffffffffffffff, @ANYBLOB="f4b333cc15d2f1b25532ed5eacca2291f0f03771609851c00d9fd2beffcbb04ed97c42e050284c9feca97d24816331212cb2a08c0d83119354f5296f586949058a503e6dd79e4000000000000000662e11497fcaedb90b93aeb9f230d46f3e886f8857e3580b55d14ad3ddc60b904c25ac337c341cca0170aabf72feba003e72a5e4dcb251c346c686330a0f646a458df3780000f90ba28267253eea6a0e3ac5563e1aab30baadd75d66521dfdeb354b7156513c218c5fe076"])
accept4(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, <r2=>0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x80, 0x40000)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr, @dev}, &(0x7f0000000280)=0xc)
ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000080))
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10)
socket$inet(0x2, 0x3, 0x2)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4801}, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
recvfrom(0xffffffffffffffff, &(0x7f0000000540)=""/42, 0x2a, 0x40000143, 0x0, 0x0)
r3 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg(r3, &(0x7f0000000500)={&(0x7f00000002c0)=@generic={0xa, "8492bad618c9fae911de206775d1db105b5d7454a8dba9e1f9ac875f09063ac4970d69dc0b427da0011927d0d47a9938e05a8c4d990e02163e0f6ac09b0de8d76b89f535d638c0f52e956fa289c924576640bd6e7a481d028597a20c76f1290b7852faab352ce3bb9ae1f211d5c6e3ef89f68c483adfed3ac2e7d59ce21a"}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)="f917a6918b78d1a9a37b93ed6a3e05c6c1e61b9c2028", 0x16}, {&(0x7f0000000380)="1ad417f6148ea62de52df7c6879c81b69578470aaa7faf15452edb7401b78eb982fd3728269c5de5", 0x28}, {&(0x7f00000003c0)="51f998156ef54f772ed7441e239b0aef52a4f2ac378f16ad974f60bcacb8aa495d67f9142232c7f1bdad76d0", 0x2c}], 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="88000000000000000c01000000000000fc04d8bccaaa175d962f49ace97c3c90b47e7f49f6336fb9ce45ad83efe48ca81e3801fc9cde80fc89bb7df10635dc1f973609f80fbd3acfc51751590fe046bfe8b733d4a9245bb6807466097369e7306801b05ee15dbfd4179882efdacf148e48d5dfacd08c200fe6e44d24456c022d23f4caf1286a60047797ee3e51439900000000"], 0x88}, 0x8044)

13:34:41 executing program 2:
r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x4, 0x4d032, 0xffffffffffffffff, 0x0)
sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000180)={{0x20, 0x5}, 0x100, './file0\x00'})

13:34:41 executing program 2:
r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x4, 0x4d032, 0xffffffffffffffff, 0x0)
sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000180)={{0x20, 0x5}, 0x100, './file0\x00'})

13:34:46 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always'])
chdir(&(0x7f0000000380)='./bus\x00')
r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0)
ftruncate(r0, 0x208200)
r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000140)="a1", 0x1}], 0x1, 0x0)
ftruncate(r1, 0x546)

13:34:46 executing program 5:
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8)
syz_open_dev$vcsn(0x0, 0x0, 0x101800)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001aee4285a7c572fb51ba1ad1577ef6d7ed1a10daf5bba642c13d963b71a9666011edcc6"], 0x94}}, 0x0)
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)={0x3f00})
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002800)={{0x14}, [@NFT_MSG_DELOBJ={0x68, 0x14, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x7}, @NFT_OBJECT_SYNPROXY=@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELSETELEM={0x258, 0xe, 0xa, 0x5, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x230, 0x3, 0x0, 0x1, [{0xc0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xac, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa5, 0x1, "7c87f9e608137b7f719a42c8b57c09a3da6447178a8fbea0890fd74c5896f722b26faa9ea718783fcaae9a6d6dd827d3a422804c8c0a9b38d33f3cbea40a24a9dca14eef4ac64aad7d2eaede6381f8b96fb0e1afa5209a477b9931e03bc0559a5040131b9c691e40471c77e02d8f88d3303fa3500b3730f244652354b420401a8ee8b3ff5c2957f0d48fb3e141a9b68db4aaf61648a2eafdd00851e25e669fb45d"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x24, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x8, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1}]}, {0x114, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xdc, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x18, 0x1, "b8d74e69d819ee4618015b2a95ed47535915c307"}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0x62, 0x1, "3132345a6142b882782402fc60d7a9024026be24205ad0f70033ed0881531f4adc0237acdc33ceb50e96e02d2b585a366739f8719a1371243c2eaed110b9097cfcba3054b11c9c13dda643dbded1ae34d51dfd236631ad742aa344cc3d29"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}, {0x4}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}], {0x14}}, 0x348}, 0x1, 0x0, 0x0, 0x20000000}, 0xc0)
r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0xc05c5340, &(0x7f00000000c0))

13:34:46 executing program 0:
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8)
syz_open_dev$vcsn(0x0, 0x0, 0x101800)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001aee4285a7c572fb51ba1ad1577ef6d7ed1a10daf5bba642c13d963b71a9666011edcc6"], 0x94}}, 0x0)
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)={0x3f00})
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002800)={{0x14}, [@NFT_MSG_DELOBJ={0x68, 0x14, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x7}, @NFT_OBJECT_SYNPROXY=@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELSETELEM={0x258, 0xe, 0xa, 0x5, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x230, 0x3, 0x0, 0x1, [{0xc0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xac, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa5, 0x1, "7c87f9e608137b7f719a42c8b57c09a3da6447178a8fbea0890fd74c5896f722b26faa9ea718783fcaae9a6d6dd827d3a422804c8c0a9b38d33f3cbea40a24a9dca14eef4ac64aad7d2eaede6381f8b96fb0e1afa5209a477b9931e03bc0559a5040131b9c691e40471c77e02d8f88d3303fa3500b3730f244652354b420401a8ee8b3ff5c2957f0d48fb3e141a9b68db4aaf61648a2eafdd00851e25e669fb45d"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x24, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x8, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1}]}, {0x114, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xdc, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x18, 0x1, "b8d74e69d819ee4618015b2a95ed47535915c307"}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0x62, 0x1, "3132345a6142b882782402fc60d7a9024026be24205ad0f70033ed0881531f4adc0237acdc33ceb50e96e02d2b585a366739f8719a1371243c2eaed110b9097cfcba3054b11c9c13dda643dbded1ae34d51dfd236631ad742aa344cc3d29"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}, {0x4}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}], {0x14}}, 0x348}, 0x1, 0x0, 0x0, 0x20000000}, 0xc0)
r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0xc05c5340, &(0x7f00000000c0))

13:34:46 executing program 1:
openat$sysctl(0xffffffffffffff9c, 0x0, 0x1, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x4010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x3, 0x2)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x3, 0x2}}, 0x2e)
setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000200)={0x1, 'macvlan1\x00', 0x3}, 0x18)
setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000580)={0x2, 'sit0\x00', 0x2}, 0x18)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000006c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=<r1=>0xffffffffffffffff, @ANYBLOB="f4b333cc15d2f1b25532ed5eacca2291f0f03771609851c00d9fd2beffcbb04ed97c42e050284c9feca97d24816331212cb2a08c0d83119354f5296f586949058a503e6dd79e4000000000000000662e11497fcaedb90b93aeb9f230d46f3e886f8857e3580b55d14ad3ddc60b904c25ac337c341cca0170aabf72feba003e72a5e4dcb251c346c686330a0f646a458df3780000f90ba28267253eea6a0e3ac5563e1aab30baadd75d66521dfdeb354b7156513c218c5fe076"])
accept4(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, <r2=>0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x80, 0x40000)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr, @dev}, &(0x7f0000000280)=0xc)
ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000080))
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10)
socket$inet(0x2, 0x3, 0x2)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4801}, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
recvfrom(0xffffffffffffffff, &(0x7f0000000540)=""/42, 0x2a, 0x40000143, 0x0, 0x0)
r3 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg(r3, &(0x7f0000000500)={&(0x7f00000002c0)=@generic={0xa, "8492bad618c9fae911de206775d1db105b5d7454a8dba9e1f9ac875f09063ac4970d69dc0b427da0011927d0d47a9938e05a8c4d990e02163e0f6ac09b0de8d76b89f535d638c0f52e956fa289c924576640bd6e7a481d028597a20c76f1290b7852faab352ce3bb9ae1f211d5c6e3ef89f68c483adfed3ac2e7d59ce21a"}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)="f917a6918b78d1a9a37b93ed6a3e05c6c1e61b9c2028", 0x16}, {&(0x7f0000000380)="1ad417f6148ea62de52df7c6879c81b69578470aaa7faf15452edb7401b78eb982fd3728269c5de5", 0x28}, {&(0x7f00000003c0)="51f998156ef54f772ed7441e239b0aef52a4f2ac378f16ad974f60bcacb8aa495d67f9142232c7f1bdad76d0", 0x2c}], 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="88000000000000000c01000000000000fc04d8bccaaa175d962f49ace97c3c90b47e7f49f6336fb9ce45ad83efe48ca81e3801fc9cde80fc89bb7df10635dc1f973609f80fbd3acfc51751590fe046bfe8b733d4a9245bb6807466097369e7306801b05ee15dbfd4179882efdacf148e48d5dfacd08c200fe6e44d24456c022d23f4caf1286a60047797ee3e51439900000000"], 0x88}, 0x8044)

13:34:46 executing program 3:
openat$sysctl(0xffffffffffffff9c, 0x0, 0x1, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x4010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x3, 0x2)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x3, 0x2}}, 0x2e)
setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000200)={0x1, 'macvlan1\x00', 0x3}, 0x18)
setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000580)={0x2, 'sit0\x00', 0x2}, 0x18)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000006c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=<r1=>0xffffffffffffffff, @ANYBLOB="f4b333cc15d2f1b25532ed5eacca2291f0f03771609851c00d9fd2beffcbb04ed97c42e050284c9feca97d24816331212cb2a08c0d83119354f5296f586949058a503e6dd79e4000000000000000662e11497fcaedb90b93aeb9f230d46f3e886f8857e3580b55d14ad3ddc60b904c25ac337c341cca0170aabf72feba003e72a5e4dcb251c346c686330a0f646a458df3780000f90ba28267253eea6a0e3ac5563e1aab30baadd75d66521dfdeb354b7156513c218c5fe076"])
accept4(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, <r2=>0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x80, 0x40000)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr, @dev}, &(0x7f0000000280)=0xc)
ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000080))
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10)
socket$inet(0x2, 0x3, 0x2)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4801}, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
recvfrom(0xffffffffffffffff, &(0x7f0000000540)=""/42, 0x2a, 0x40000143, 0x0, 0x0)
r3 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg(r3, &(0x7f0000000500)={&(0x7f00000002c0)=@generic={0xa, "8492bad618c9fae911de206775d1db105b5d7454a8dba9e1f9ac875f09063ac4970d69dc0b427da0011927d0d47a9938e05a8c4d990e02163e0f6ac09b0de8d76b89f535d638c0f52e956fa289c924576640bd6e7a481d028597a20c76f1290b7852faab352ce3bb9ae1f211d5c6e3ef89f68c483adfed3ac2e7d59ce21a"}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)="f917a6918b78d1a9a37b93ed6a3e05c6c1e61b9c2028", 0x16}, {&(0x7f0000000380)="1ad417f6148ea62de52df7c6879c81b69578470aaa7faf15452edb7401b78eb982fd3728269c5de5", 0x28}, {&(0x7f00000003c0)="51f998156ef54f772ed7441e239b0aef52a4f2ac378f16ad974f60bcacb8aa495d67f9142232c7f1bdad76d0", 0x2c}], 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="88000000000000000c01000000000000fc04d8bccaaa175d962f49ace97c3c90b47e7f49f6336fb9ce45ad83efe48ca81e3801fc9cde80fc89bb7df10635dc1f973609f80fbd3acfc51751590fe046bfe8b733d4a9245bb6807466097369e7306801b05ee15dbfd4179882efdacf148e48d5dfacd08c200fe6e44d24456c022d23f4caf1286a60047797ee3e51439900000000"], 0x88}, 0x8044)

13:34:46 executing program 2:
mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0)
mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}})
read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, <r1=>0x0}, 0x2020)
write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50)
r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0)
syz_fuse_handle_req(r0, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x0, {0x0, 0x1d}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
getdents64(r2, 0x0, 0x0)
syz_fuse_handle_req(r0, &(0x7f0000006780), 0x2000, &(0x7f0000008780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000008800)={0x10}, 0x0, 0x0, 0x0})

13:34:46 executing program 1:
openat$sysctl(0xffffffffffffff9c, 0x0, 0x1, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x4010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x3, 0x2)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x3, 0x2}}, 0x2e)
setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000200)={0x1, 'macvlan1\x00', 0x3}, 0x18)
setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000580)={0x2, 'sit0\x00', 0x2}, 0x18)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000006c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=<r1=>0xffffffffffffffff, @ANYBLOB="f4b333cc15d2f1b25532ed5eacca2291f0f03771609851c00d9fd2beffcbb04ed97c42e050284c9feca97d24816331212cb2a08c0d83119354f5296f586949058a503e6dd79e4000000000000000662e11497fcaedb90b93aeb9f230d46f3e886f8857e3580b55d14ad3ddc60b904c25ac337c341cca0170aabf72feba003e72a5e4dcb251c346c686330a0f646a458df3780000f90ba28267253eea6a0e3ac5563e1aab30baadd75d66521dfdeb354b7156513c218c5fe076"])
accept4(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, <r2=>0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x80, 0x40000)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr, @dev}, &(0x7f0000000280)=0xc)
ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000080))
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10)
socket$inet(0x2, 0x3, 0x2)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4801}, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
recvfrom(0xffffffffffffffff, &(0x7f0000000540)=""/42, 0x2a, 0x40000143, 0x0, 0x0)
r3 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg(r3, &(0x7f0000000500)={&(0x7f00000002c0)=@generic={0xa, "8492bad618c9fae911de206775d1db105b5d7454a8dba9e1f9ac875f09063ac4970d69dc0b427da0011927d0d47a9938e05a8c4d990e02163e0f6ac09b0de8d76b89f535d638c0f52e956fa289c924576640bd6e7a481d028597a20c76f1290b7852faab352ce3bb9ae1f211d5c6e3ef89f68c483adfed3ac2e7d59ce21a"}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)="f917a6918b78d1a9a37b93ed6a3e05c6c1e61b9c2028", 0x16}, {&(0x7f0000000380)="1ad417f6148ea62de52df7c6879c81b69578470aaa7faf15452edb7401b78eb982fd3728269c5de5", 0x28}, {&(0x7f00000003c0)="51f998156ef54f772ed7441e239b0aef52a4f2ac378f16ad974f60bcacb8aa495d67f9142232c7f1bdad76d0", 0x2c}], 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="88000000000000000c01000000000000fc04d8bccaaa175d962f49ace97c3c90b47e7f49f6336fb9ce45ad83efe48ca81e3801fc9cde80fc89bb7df10635dc1f973609f80fbd3acfc51751590fe046bfe8b733d4a9245bb6807466097369e7306801b05ee15dbfd4179882efdacf148e48d5dfacd08c200fe6e44d24456c022d23f4caf1286a60047797ee3e51439900000000"], 0x88}, 0x8044)

13:34:46 executing program 0:
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8)
syz_open_dev$vcsn(0x0, 0x0, 0x101800)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001aee4285a7c572fb51ba1ad1577ef6d7ed1a10daf5bba642c13d963b71a9666011edcc6"], 0x94}}, 0x0)
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)={0x3f00})
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002800)={{0x14}, [@NFT_MSG_DELOBJ={0x68, 0x14, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x7}, @NFT_OBJECT_SYNPROXY=@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELSETELEM={0x258, 0xe, 0xa, 0x5, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x230, 0x3, 0x0, 0x1, [{0xc0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xac, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa5, 0x1, "7c87f9e608137b7f719a42c8b57c09a3da6447178a8fbea0890fd74c5896f722b26faa9ea718783fcaae9a6d6dd827d3a422804c8c0a9b38d33f3cbea40a24a9dca14eef4ac64aad7d2eaede6381f8b96fb0e1afa5209a477b9931e03bc0559a5040131b9c691e40471c77e02d8f88d3303fa3500b3730f244652354b420401a8ee8b3ff5c2957f0d48fb3e141a9b68db4aaf61648a2eafdd00851e25e669fb45d"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x24, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x8, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1}]}, {0x114, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xdc, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x18, 0x1, "b8d74e69d819ee4618015b2a95ed47535915c307"}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0x62, 0x1, "3132345a6142b882782402fc60d7a9024026be24205ad0f70033ed0881531f4adc0237acdc33ceb50e96e02d2b585a366739f8719a1371243c2eaed110b9097cfcba3054b11c9c13dda643dbded1ae34d51dfd236631ad742aa344cc3d29"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}, {0x4}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}], {0x14}}, 0x348}, 0x1, 0x0, 0x0, 0x20000000}, 0xc0)
r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0xc05c5340, &(0x7f00000000c0))

[   87.148125] IPVS: sync thread started: state = MASTER, mcast_ifn = macvlan1, syncid = 3, id = 0
13:34:46 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always'])
chdir(&(0x7f0000000380)='./bus\x00')
r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0)
ftruncate(r0, 0x208200)
r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000140)="a1", 0x1}], 0x1, 0x0)
ftruncate(r1, 0x546)

13:34:46 executing program 1:
openat$sysctl(0xffffffffffffff9c, 0x0, 0x1, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x4010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x3, 0x2)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x3, 0x2}}, 0x2e)
setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000200)={0x1, 'macvlan1\x00', 0x3}, 0x18)
setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000580)={0x2, 'sit0\x00', 0x2}, 0x18)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000006c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=<r1=>0xffffffffffffffff, @ANYBLOB="f4b333cc15d2f1b25532ed5eacca2291f0f03771609851c00d9fd2beffcbb04ed97c42e050284c9feca97d24816331212cb2a08c0d83119354f5296f586949058a503e6dd79e4000000000000000662e11497fcaedb90b93aeb9f230d46f3e886f8857e3580b55d14ad3ddc60b904c25ac337c341cca0170aabf72feba003e72a5e4dcb251c346c686330a0f646a458df3780000f90ba28267253eea6a0e3ac5563e1aab30baadd75d66521dfdeb354b7156513c218c5fe076"])
accept4(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, <r2=>0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x80, 0x40000)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr, @dev}, &(0x7f0000000280)=0xc)
ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000080))
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10)
socket$inet(0x2, 0x3, 0x2)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4801}, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
recvfrom(0xffffffffffffffff, &(0x7f0000000540)=""/42, 0x2a, 0x40000143, 0x0, 0x0)
r3 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg(r3, &(0x7f0000000500)={&(0x7f00000002c0)=@generic={0xa, "8492bad618c9fae911de206775d1db105b5d7454a8dba9e1f9ac875f09063ac4970d69dc0b427da0011927d0d47a9938e05a8c4d990e02163e0f6ac09b0de8d76b89f535d638c0f52e956fa289c924576640bd6e7a481d028597a20c76f1290b7852faab352ce3bb9ae1f211d5c6e3ef89f68c483adfed3ac2e7d59ce21a"}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)="f917a6918b78d1a9a37b93ed6a3e05c6c1e61b9c2028", 0x16}, {&(0x7f0000000380)="1ad417f6148ea62de52df7c6879c81b69578470aaa7faf15452edb7401b78eb982fd3728269c5de5", 0x28}, {&(0x7f00000003c0)="51f998156ef54f772ed7441e239b0aef52a4f2ac378f16ad974f60bcacb8aa495d67f9142232c7f1bdad76d0", 0x2c}], 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="88000000000000000c01000000000000fc04d8bccaaa175d962f49ace97c3c90b47e7f49f6336fb9ce45ad83efe48ca81e3801fc9cde80fc89bb7df10635dc1f973609f80fbd3acfc51751590fe046bfe8b733d4a9245bb6807466097369e7306801b05ee15dbfd4179882efdacf148e48d5dfacd08c200fe6e44d24456c022d23f4caf1286a60047797ee3e51439900000000"], 0x88}, 0x8044)

13:34:46 executing program 3:
openat$sysctl(0xffffffffffffff9c, 0x0, 0x1, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x4010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x3, 0x2)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x3, 0x2}}, 0x2e)
setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000200)={0x1, 'macvlan1\x00', 0x3}, 0x18)
setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000580)={0x2, 'sit0\x00', 0x2}, 0x18)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000006c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=<r1=>0xffffffffffffffff, @ANYBLOB="f4b333cc15d2f1b25532ed5eacca2291f0f03771609851c00d9fd2beffcbb04ed97c42e050284c9feca97d24816331212cb2a08c0d83119354f5296f586949058a503e6dd79e4000000000000000662e11497fcaedb90b93aeb9f230d46f3e886f8857e3580b55d14ad3ddc60b904c25ac337c341cca0170aabf72feba003e72a5e4dcb251c346c686330a0f646a458df3780000f90ba28267253eea6a0e3ac5563e1aab30baadd75d66521dfdeb354b7156513c218c5fe076"])
accept4(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, <r2=>0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x80, 0x40000)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr, @dev}, &(0x7f0000000280)=0xc)
ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000080))
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10)
socket$inet(0x2, 0x3, 0x2)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4801}, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
recvfrom(0xffffffffffffffff, &(0x7f0000000540)=""/42, 0x2a, 0x40000143, 0x0, 0x0)
r3 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg(r3, &(0x7f0000000500)={&(0x7f00000002c0)=@generic={0xa, "8492bad618c9fae911de206775d1db105b5d7454a8dba9e1f9ac875f09063ac4970d69dc0b427da0011927d0d47a9938e05a8c4d990e02163e0f6ac09b0de8d76b89f535d638c0f52e956fa289c924576640bd6e7a481d028597a20c76f1290b7852faab352ce3bb9ae1f211d5c6e3ef89f68c483adfed3ac2e7d59ce21a"}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)="f917a6918b78d1a9a37b93ed6a3e05c6c1e61b9c2028", 0x16}, {&(0x7f0000000380)="1ad417f6148ea62de52df7c6879c81b69578470aaa7faf15452edb7401b78eb982fd3728269c5de5", 0x28}, {&(0x7f00000003c0)="51f998156ef54f772ed7441e239b0aef52a4f2ac378f16ad974f60bcacb8aa495d67f9142232c7f1bdad76d0", 0x2c}], 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="88000000000000000c01000000000000fc04d8bccaaa175d962f49ace97c3c90b47e7f49f6336fb9ce45ad83efe48ca81e3801fc9cde80fc89bb7df10635dc1f973609f80fbd3acfc51751590fe046bfe8b733d4a9245bb6807466097369e7306801b05ee15dbfd4179882efdacf148e48d5dfacd08c200fe6e44d24456c022d23f4caf1286a60047797ee3e51439900000000"], 0x88}, 0x8044)

13:34:46 executing program 2:
mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0)
mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}})
read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, <r1=>0x0}, 0x2020)
write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50)
r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0)
syz_fuse_handle_req(r0, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x0, {0x0, 0x1d}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
getdents64(r2, 0x0, 0x0)
syz_fuse_handle_req(r0, &(0x7f0000006780), 0x2000, &(0x7f0000008780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000008800)={0x10}, 0x0, 0x0, 0x0})

13:34:46 executing program 5:
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8)
syz_open_dev$vcsn(0x0, 0x0, 0x101800)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001aee4285a7c572fb51ba1ad1577ef6d7ed1a10daf5bba642c13d963b71a9666011edcc6"], 0x94}}, 0x0)
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)={0x3f00})
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002800)={{0x14}, [@NFT_MSG_DELOBJ={0x68, 0x14, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x7}, @NFT_OBJECT_SYNPROXY=@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELSETELEM={0x258, 0xe, 0xa, 0x5, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x230, 0x3, 0x0, 0x1, [{0xc0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xac, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa5, 0x1, "7c87f9e608137b7f719a42c8b57c09a3da6447178a8fbea0890fd74c5896f722b26faa9ea718783fcaae9a6d6dd827d3a422804c8c0a9b38d33f3cbea40a24a9dca14eef4ac64aad7d2eaede6381f8b96fb0e1afa5209a477b9931e03bc0559a5040131b9c691e40471c77e02d8f88d3303fa3500b3730f244652354b420401a8ee8b3ff5c2957f0d48fb3e141a9b68db4aaf61648a2eafdd00851e25e669fb45d"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x24, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x8, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1}]}, {0x114, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xdc, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x18, 0x1, "b8d74e69d819ee4618015b2a95ed47535915c307"}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0x62, 0x1, "3132345a6142b882782402fc60d7a9024026be24205ad0f70033ed0881531f4adc0237acdc33ceb50e96e02d2b585a366739f8719a1371243c2eaed110b9097cfcba3054b11c9c13dda643dbded1ae34d51dfd236631ad742aa344cc3d29"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}, {0x4}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}], {0x14}}, 0x348}, 0x1, 0x0, 0x0, 0x20000000}, 0xc0)
r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0xc05c5340, &(0x7f00000000c0))

13:34:46 executing program 0:
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8)
syz_open_dev$vcsn(0x0, 0x0, 0x101800)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001aee4285a7c572fb51ba1ad1577ef6d7ed1a10daf5bba642c13d963b71a9666011edcc6"], 0x94}}, 0x0)
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)={0x3f00})
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002800)={{0x14}, [@NFT_MSG_DELOBJ={0x68, 0x14, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x7}, @NFT_OBJECT_SYNPROXY=@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELSETELEM={0x258, 0xe, 0xa, 0x5, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x230, 0x3, 0x0, 0x1, [{0xc0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xac, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa5, 0x1, "7c87f9e608137b7f719a42c8b57c09a3da6447178a8fbea0890fd74c5896f722b26faa9ea718783fcaae9a6d6dd827d3a422804c8c0a9b38d33f3cbea40a24a9dca14eef4ac64aad7d2eaede6381f8b96fb0e1afa5209a477b9931e03bc0559a5040131b9c691e40471c77e02d8f88d3303fa3500b3730f244652354b420401a8ee8b3ff5c2957f0d48fb3e141a9b68db4aaf61648a2eafdd00851e25e669fb45d"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x24, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x8, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1}]}, {0x114, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xdc, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x18, 0x1, "b8d74e69d819ee4618015b2a95ed47535915c307"}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0x62, 0x1, "3132345a6142b882782402fc60d7a9024026be24205ad0f70033ed0881531f4adc0237acdc33ceb50e96e02d2b585a366739f8719a1371243c2eaed110b9097cfcba3054b11c9c13dda643dbded1ae34d51dfd236631ad742aa344cc3d29"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}, {0x4}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}], {0x14}}, 0x348}, 0x1, 0x0, 0x0, 0x20000000}, 0xc0)
r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0xc05c5340, &(0x7f00000000c0))

13:34:46 executing program 1:
mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0)
mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}})
read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, <r1=>0x0}, 0x2020)
write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50)
r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0)
syz_fuse_handle_req(r0, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x0, {0x0, 0x1d}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
getdents64(r2, 0x0, 0x0)
syz_fuse_handle_req(r0, &(0x7f0000006780), 0x2000, &(0x7f0000008780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000008800)={0x10}, 0x0, 0x0, 0x0})

13:34:46 executing program 3:
openat$sysctl(0xffffffffffffff9c, 0x0, 0x1, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x4010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x3, 0x2)
connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x3, 0x2}}, 0x2e)
setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000200)={0x1, 'macvlan1\x00', 0x3}, 0x18)
setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000580)={0x2, 'sit0\x00', 0x2}, 0x18)
ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000006c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=<r1=>0xffffffffffffffff, @ANYBLOB="f4b333cc15d2f1b25532ed5eacca2291f0f03771609851c00d9fd2beffcbb04ed97c42e050284c9feca97d24816331212cb2a08c0d83119354f5296f586949058a503e6dd79e4000000000000000662e11497fcaedb90b93aeb9f230d46f3e886f8857e3580b55d14ad3ddc60b904c25ac337c341cca0170aabf72feba003e72a5e4dcb251c346c686330a0f646a458df3780000f90ba28267253eea6a0e3ac5563e1aab30baadd75d66521dfdeb354b7156513c218c5fe076"])
accept4(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, <r2=>0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x80, 0x40000)
getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr, @dev}, &(0x7f0000000280)=0xc)
ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000080))
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10)
socket$inet(0x2, 0x3, 0x2)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4801}, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)
recvfrom(0xffffffffffffffff, &(0x7f0000000540)=""/42, 0x2a, 0x40000143, 0x0, 0x0)
r3 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg(r3, &(0x7f0000000500)={&(0x7f00000002c0)=@generic={0xa, "8492bad618c9fae911de206775d1db105b5d7454a8dba9e1f9ac875f09063ac4970d69dc0b427da0011927d0d47a9938e05a8c4d990e02163e0f6ac09b0de8d76b89f535d638c0f52e956fa289c924576640bd6e7a481d028597a20c76f1290b7852faab352ce3bb9ae1f211d5c6e3ef89f68c483adfed3ac2e7d59ce21a"}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)="f917a6918b78d1a9a37b93ed6a3e05c6c1e61b9c2028", 0x16}, {&(0x7f0000000380)="1ad417f6148ea62de52df7c6879c81b69578470aaa7faf15452edb7401b78eb982fd3728269c5de5", 0x28}, {&(0x7f00000003c0)="51f998156ef54f772ed7441e239b0aef52a4f2ac378f16ad974f60bcacb8aa495d67f9142232c7f1bdad76d0", 0x2c}], 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="88000000000000000c01000000000000fc04d8bccaaa175d962f49ace97c3c90b47e7f49f6336fb9ce45ad83efe48ca81e3801fc9cde80fc89bb7df10635dc1f973609f80fbd3acfc51751590fe046bfe8b733d4a9245bb6807466097369e7306801b05ee15dbfd4179882efdacf148e48d5dfacd08c200fe6e44d24456c022d23f4caf1286a60047797ee3e51439900000000"], 0x88}, 0x8044)

13:34:46 executing program 5:
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8)
syz_open_dev$vcsn(0x0, 0x0, 0x101800)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001aee4285a7c572fb51ba1ad1577ef6d7ed1a10daf5bba642c13d963b71a9666011edcc6"], 0x94}}, 0x0)
r1 = getpid()
rt_tgsigqueueinfo(r1, r1, 0x15, &(0x7f00000000c0)={0x3f00})
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002800)={{0x14}, [@NFT_MSG_DELOBJ={0x68, 0x14, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x7}, @NFT_OBJECT_SYNPROXY=@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELSETELEM={0x258, 0xe, 0xa, 0x5, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x230, 0x3, 0x0, 0x1, [{0xc0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xac, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa5, 0x1, "7c87f9e608137b7f719a42c8b57c09a3da6447178a8fbea0890fd74c5896f722b26faa9ea718783fcaae9a6d6dd827d3a422804c8c0a9b38d33f3cbea40a24a9dca14eef4ac64aad7d2eaede6381f8b96fb0e1afa5209a477b9931e03bc0559a5040131b9c691e40471c77e02d8f88d3303fa3500b3730f244652354b420401a8ee8b3ff5c2957f0d48fb3e141a9b68db4aaf61648a2eafdd00851e25e669fb45d"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0x24, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x8, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1}]}, {0x114, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0xdc, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x18, 0x1, "b8d74e69d819ee4618015b2a95ed47535915c307"}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0x62, 0x1, "3132345a6142b882782402fc60d7a9024026be24205ad0f70033ed0881531f4adc0237acdc33ceb50e96e02d2b585a366739f8719a1371243c2eaed110b9097cfcba3054b11c9c13dda643dbded1ae34d51dfd236631ad742aa344cc3d29"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x14, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}, {0x4}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}], {0x14}}, 0x348}, 0x1, 0x0, 0x0, 0x20000000}, 0xc0)
r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0xc05c5340, &(0x7f00000000c0))

13:34:46 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4)
connect(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='illinois\x00', 0x9)
getpid()
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x900}, 0x1c)

13:34:46 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always'])
chdir(&(0x7f0000000380)='./bus\x00')
r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0)
ftruncate(r0, 0x208200)
r1 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000140)="a1", 0x1}], 0x1, 0x0)
ftruncate(r1, 0x546)

13:34:46 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f0000000980))
ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000014c0)={{0x0, 0x80, 0xbc27, 0xe6, 0x1ff, 0x3, 0x6, 0xb2e, 0x6, 0x5, 0x0, 0x6, 0xfffffffffffff801, 0xff, 0x81}})
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0xc6}, 0x0, 0xffffffffffffffff, r0, 0x0)
r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0)
r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040))
r4 = socket$inet(0x2, 0x3, 0x1)
ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_cmd={0x8}})
vmsplice(r4, &(0x7f0000000140)=[{&(0x7f00000000c0)="49d7fc0283a37d3bc8b7c85bc59ae079f43173dee5e7dbaece167c66a02624d22ddb84c703604b96467710bf4b9b482bb290", 0x32}], 0x1, 0xc)
lseek(r2, 0x7ffffc, 0x0)
write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x1a0)
fallocate(r1, 0x100000003, 0x0, 0x80019c)
mkdirat(r2, &(0x7f0000000180)='./bus\x00', 0x4)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0)
lseek(r1, 0x0, 0x3)

13:34:46 executing program 2:
mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0)
mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}})
read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, <r1=>0x0}, 0x2020)
write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50)
r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0)
syz_fuse_handle_req(r0, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x0, {0x0, 0x1d}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
getdents64(r2, 0x0, 0x0)
syz_fuse_handle_req(r0, &(0x7f0000006780), 0x2000, &(0x7f0000008780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000008800)={0x10}, 0x0, 0x0, 0x0})

13:34:46 executing program 5:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000240))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
sched_rr_get_interval(0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000400)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x64, 0x9, 0x4, 0x1}], &(0x7f0000000440)='GPL\x00', 0x2644, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x5, 0x50000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r3, r3]}, 0x80)
r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000040)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0)
ptrace$setopts(0x4200, r0, 0x9a66, 0x22)
openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x181883, 0x0)
perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00), 0x0, 0x0)
readv(r5, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3)

13:34:46 executing program 1:
mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0)
mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}})
read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, <r1=>0x0}, 0x2020)
write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50)
r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0)
syz_fuse_handle_req(r0, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x0, {0x0, 0x1d}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
getdents64(r2, 0x0, 0x0)
syz_fuse_handle_req(r0, &(0x7f0000006780), 0x2000, &(0x7f0000008780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000008800)={0x10}, 0x0, 0x0, 0x0})

13:34:46 executing program 4:
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
shutdown(r0, 0x0)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={<r1=>0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10)
setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000240)=r1, 0x4)

13:34:46 executing program 2:
mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0)
mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}})
read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, <r1=>0x0}, 0x2020)
write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50)
r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0)
syz_fuse_handle_req(r0, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x0, {0x0, 0x1d}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
getdents64(r2, 0x0, 0x0)
syz_fuse_handle_req(r0, &(0x7f0000006780), 0x2000, &(0x7f0000008780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000008800)={0x10}, 0x0, 0x0, 0x0})

13:34:46 executing program 4:
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
shutdown(r0, 0x0)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={<r1=>0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10)
setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000240)=r1, 0x4)

13:34:46 executing program 4:
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
shutdown(r0, 0x0)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={<r1=>0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10)
setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000240)=r1, 0x4)

13:34:46 executing program 1:
mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0)
mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}})
read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, <r1=>0x0}, 0x2020)
write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50)
r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0)
syz_fuse_handle_req(r0, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x0, {0x0, 0x1d}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
getdents64(r2, 0x0, 0x0)
syz_fuse_handle_req(r0, &(0x7f0000006780), 0x2000, &(0x7f0000008780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000008800)={0x10}, 0x0, 0x0, 0x0})

[   87.785805] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
13:34:46 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f0000000980))
ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000014c0)={{0x0, 0x80, 0xbc27, 0xe6, 0x1ff, 0x3, 0x6, 0xb2e, 0x6, 0x5, 0x0, 0x6, 0xfffffffffffff801, 0xff, 0x81}})
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0xc6}, 0x0, 0xffffffffffffffff, r0, 0x0)
r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0)
r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040))
r4 = socket$inet(0x2, 0x3, 0x1)
ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_cmd={0x8}})
vmsplice(r4, &(0x7f0000000140)=[{&(0x7f00000000c0)="49d7fc0283a37d3bc8b7c85bc59ae079f43173dee5e7dbaece167c66a02624d22ddb84c703604b96467710bf4b9b482bb290", 0x32}], 0x1, 0xc)
lseek(r2, 0x7ffffc, 0x0)
write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x1a0)
fallocate(r1, 0x100000003, 0x0, 0x80019c)
mkdirat(r2, &(0x7f0000000180)='./bus\x00', 0x4)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0)
lseek(r1, 0x0, 0x3)

13:34:47 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4)
connect(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='illinois\x00', 0x9)
getpid()
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x900}, 0x1c)

13:34:47 executing program 2:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f0000000980))
ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000014c0)={{0x0, 0x80, 0xbc27, 0xe6, 0x1ff, 0x3, 0x6, 0xb2e, 0x6, 0x5, 0x0, 0x6, 0xfffffffffffff801, 0xff, 0x81}})
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0xc6}, 0x0, 0xffffffffffffffff, r0, 0x0)
r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0)
r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040))
r4 = socket$inet(0x2, 0x3, 0x1)
ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_cmd={0x8}})
vmsplice(r4, &(0x7f0000000140)=[{&(0x7f00000000c0)="49d7fc0283a37d3bc8b7c85bc59ae079f43173dee5e7dbaece167c66a02624d22ddb84c703604b96467710bf4b9b482bb290", 0x32}], 0x1, 0xc)
lseek(r2, 0x7ffffc, 0x0)
write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x1a0)
fallocate(r1, 0x100000003, 0x0, 0x80019c)
mkdirat(r2, &(0x7f0000000180)='./bus\x00', 0x4)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0)
lseek(r1, 0x0, 0x3)

13:34:47 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f0000000980))
ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000014c0)={{0x0, 0x80, 0xbc27, 0xe6, 0x1ff, 0x3, 0x6, 0xb2e, 0x6, 0x5, 0x0, 0x6, 0xfffffffffffff801, 0xff, 0x81}})
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0xc6}, 0x0, 0xffffffffffffffff, r0, 0x0)
r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0)
r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040))
r4 = socket$inet(0x2, 0x3, 0x1)
ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_cmd={0x8}})
vmsplice(r4, &(0x7f0000000140)=[{&(0x7f00000000c0)="49d7fc0283a37d3bc8b7c85bc59ae079f43173dee5e7dbaece167c66a02624d22ddb84c703604b96467710bf4b9b482bb290", 0x32}], 0x1, 0xc)
lseek(r2, 0x7ffffc, 0x0)
write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x1a0)
fallocate(r1, 0x100000003, 0x0, 0x80019c)
mkdirat(r2, &(0x7f0000000180)='./bus\x00', 0x4)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0)
lseek(r1, 0x0, 0x3)

13:34:47 executing program 4:
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
shutdown(r0, 0x0)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={<r1=>0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10)
setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000240)=r1, 0x4)

13:34:48 executing program 5:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000240))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
sched_rr_get_interval(0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000400)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x64, 0x9, 0x4, 0x1}], &(0x7f0000000440)='GPL\x00', 0x2644, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x5, 0x50000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r3, r3]}, 0x80)
r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000040)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0)
ptrace$setopts(0x4200, r0, 0x9a66, 0x22)
openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x181883, 0x0)
perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00), 0x0, 0x0)
readv(r5, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3)

13:34:48 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f0000000980))
ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000014c0)={{0x0, 0x80, 0xbc27, 0xe6, 0x1ff, 0x3, 0x6, 0xb2e, 0x6, 0x5, 0x0, 0x6, 0xfffffffffffff801, 0xff, 0x81}})
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0xc6}, 0x0, 0xffffffffffffffff, r0, 0x0)
r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0)
r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040))
r4 = socket$inet(0x2, 0x3, 0x1)
ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_cmd={0x8}})
vmsplice(r4, &(0x7f0000000140)=[{&(0x7f00000000c0)="49d7fc0283a37d3bc8b7c85bc59ae079f43173dee5e7dbaece167c66a02624d22ddb84c703604b96467710bf4b9b482bb290", 0x32}], 0x1, 0xc)
lseek(r2, 0x7ffffc, 0x0)
write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x1a0)
fallocate(r1, 0x100000003, 0x0, 0x80019c)
mkdirat(r2, &(0x7f0000000180)='./bus\x00', 0x4)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0)
lseek(r1, 0x0, 0x3)

13:34:48 executing program 4:
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff)
r0 = syz_open_dev$usbfs(&(0x7f0000001280), 0x1aa1, 0x0)
mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x300000c, 0x1012, r0, 0x0)

13:34:48 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f0000000980))
ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000014c0)={{0x0, 0x80, 0xbc27, 0xe6, 0x1ff, 0x3, 0x6, 0xb2e, 0x6, 0x5, 0x0, 0x6, 0xfffffffffffff801, 0xff, 0x81}})
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0xc6}, 0x0, 0xffffffffffffffff, r0, 0x0)
r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0)
r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040))
r4 = socket$inet(0x2, 0x3, 0x1)
ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_cmd={0x8}})
vmsplice(r4, &(0x7f0000000140)=[{&(0x7f00000000c0)="49d7fc0283a37d3bc8b7c85bc59ae079f43173dee5e7dbaece167c66a02624d22ddb84c703604b96467710bf4b9b482bb290", 0x32}], 0x1, 0xc)
lseek(r2, 0x7ffffc, 0x0)
write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x1a0)
fallocate(r1, 0x100000003, 0x0, 0x80019c)
mkdirat(r2, &(0x7f0000000180)='./bus\x00', 0x4)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0)
lseek(r1, 0x0, 0x3)

13:34:48 executing program 2:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f0000000980))
ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000014c0)={{0x0, 0x80, 0xbc27, 0xe6, 0x1ff, 0x3, 0x6, 0xb2e, 0x6, 0x5, 0x0, 0x6, 0xfffffffffffff801, 0xff, 0x81}})
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0xc6}, 0x0, 0xffffffffffffffff, r0, 0x0)
r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0)
r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040))
r4 = socket$inet(0x2, 0x3, 0x1)
ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_cmd={0x8}})
vmsplice(r4, &(0x7f0000000140)=[{&(0x7f00000000c0)="49d7fc0283a37d3bc8b7c85bc59ae079f43173dee5e7dbaece167c66a02624d22ddb84c703604b96467710bf4b9b482bb290", 0x32}], 0x1, 0xc)
lseek(r2, 0x7ffffc, 0x0)
write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x1a0)
fallocate(r1, 0x100000003, 0x0, 0x80019c)
mkdirat(r2, &(0x7f0000000180)='./bus\x00', 0x4)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0)
lseek(r1, 0x0, 0x3)

13:34:48 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4)
connect(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='illinois\x00', 0x9)
getpid()
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x900}, 0x1c)

13:34:48 executing program 4:
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff)
r0 = syz_open_dev$usbfs(&(0x7f0000001280), 0x1aa1, 0x0)
mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x300000c, 0x1012, r0, 0x0)

13:34:48 executing program 4:
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff)
r0 = syz_open_dev$usbfs(&(0x7f0000001280), 0x1aa1, 0x0)
mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x300000c, 0x1012, r0, 0x0)

13:34:48 executing program 1:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f0000000980))
ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000014c0)={{0x0, 0x80, 0xbc27, 0xe6, 0x1ff, 0x3, 0x6, 0xb2e, 0x6, 0x5, 0x0, 0x6, 0xfffffffffffff801, 0xff, 0x81}})
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0xc6}, 0x0, 0xffffffffffffffff, r0, 0x0)
r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0)
r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040))
r4 = socket$inet(0x2, 0x3, 0x1)
ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_cmd={0x8}})
vmsplice(r4, &(0x7f0000000140)=[{&(0x7f00000000c0)="49d7fc0283a37d3bc8b7c85bc59ae079f43173dee5e7dbaece167c66a02624d22ddb84c703604b96467710bf4b9b482bb290", 0x32}], 0x1, 0xc)
lseek(r2, 0x7ffffc, 0x0)
write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x1a0)
fallocate(r1, 0x100000003, 0x0, 0x80019c)
mkdirat(r2, &(0x7f0000000180)='./bus\x00', 0x4)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0)
lseek(r1, 0x0, 0x3)

13:34:48 executing program 2:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f0000000980))
ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000014c0)={{0x0, 0x80, 0xbc27, 0xe6, 0x1ff, 0x3, 0x6, 0xb2e, 0x6, 0x5, 0x0, 0x6, 0xfffffffffffff801, 0xff, 0x81}})
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0xc6}, 0x0, 0xffffffffffffffff, r0, 0x0)
r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0)
r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040))
r4 = socket$inet(0x2, 0x3, 0x1)
ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_cmd={0x8}})
vmsplice(r4, &(0x7f0000000140)=[{&(0x7f00000000c0)="49d7fc0283a37d3bc8b7c85bc59ae079f43173dee5e7dbaece167c66a02624d22ddb84c703604b96467710bf4b9b482bb290", 0x32}], 0x1, 0xc)
lseek(r2, 0x7ffffc, 0x0)
write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x1a0)
fallocate(r1, 0x100000003, 0x0, 0x80019c)
mkdirat(r2, &(0x7f0000000180)='./bus\x00', 0x4)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0)
lseek(r1, 0x0, 0x3)

13:34:48 executing program 3:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f0000000980))
ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000014c0)={{0x0, 0x80, 0xbc27, 0xe6, 0x1ff, 0x3, 0x6, 0xb2e, 0x6, 0x5, 0x0, 0x6, 0xfffffffffffff801, 0xff, 0x81}})
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0xc6}, 0x0, 0xffffffffffffffff, r0, 0x0)
r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0)
r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040))
r4 = socket$inet(0x2, 0x3, 0x1)
ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000040)=@ethtool_cmd={0x8}})
vmsplice(r4, &(0x7f0000000140)=[{&(0x7f00000000c0)="49d7fc0283a37d3bc8b7c85bc59ae079f43173dee5e7dbaece167c66a02624d22ddb84c703604b96467710bf4b9b482bb290", 0x32}], 0x1, 0xc)
lseek(r2, 0x7ffffc, 0x0)
write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x1a0)
fallocate(r1, 0x100000003, 0x0, 0x80019c)
mkdirat(r2, &(0x7f0000000180)='./bus\x00', 0x4)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0)
lseek(r1, 0x0, 0x3)

13:34:48 executing program 4:
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff)
r0 = syz_open_dev$usbfs(&(0x7f0000001280), 0x1aa1, 0x0)
mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x300000c, 0x1012, r0, 0x0)

13:34:49 executing program 5:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000240))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
sched_rr_get_interval(0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000400)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x64, 0x9, 0x4, 0x1}], &(0x7f0000000440)='GPL\x00', 0x2644, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x5, 0x50000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r3, r3]}, 0x80)
r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000040)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0)
ptrace$setopts(0x4200, r0, 0x9a66, 0x22)
openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x181883, 0x0)
perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00), 0x0, 0x0)
readv(r5, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3)

13:34:49 executing program 4:
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff)
r0 = syz_open_dev$usbfs(&(0x7f0000001280), 0x1aa1, 0x0)
mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x300000c, 0x1012, r0, 0x0)

13:34:49 executing program 1:
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff)
r0 = syz_open_dev$usbfs(&(0x7f0000001280), 0x1aa1, 0x0)
mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x300000c, 0x1012, r0, 0x0)

13:34:49 executing program 3:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000240))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
sched_rr_get_interval(0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000400)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x64, 0x9, 0x4, 0x1}], &(0x7f0000000440)='GPL\x00', 0x2644, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x5, 0x50000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r3, r3]}, 0x80)
r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000040)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0)
ptrace$setopts(0x4200, r0, 0x9a66, 0x22)
openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x181883, 0x0)
perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00), 0x0, 0x0)
readv(r5, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3)

13:34:49 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000240))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
sched_rr_get_interval(0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000400)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x64, 0x9, 0x4, 0x1}], &(0x7f0000000440)='GPL\x00', 0x2644, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x5, 0x50000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r3, r3]}, 0x80)
r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000040)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0)
ptrace$setopts(0x4200, r0, 0x9a66, 0x22)
openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x181883, 0x0)
perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00), 0x0, 0x0)
readv(r5, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3)

13:34:49 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c)
setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4)
connect(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='illinois\x00', 0x9)
getpid()
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x900}, 0x1c)

13:34:49 executing program 1:
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff)
r0 = syz_open_dev$usbfs(&(0x7f0000001280), 0x1aa1, 0x0)
mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x300000c, 0x1012, r0, 0x0)

13:34:49 executing program 4:
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff)
r0 = syz_open_dev$usbfs(&(0x7f0000001280), 0x1aa1, 0x0)
mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x300000c, 0x1012, r0, 0x0)

13:34:49 executing program 1:
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff)
r0 = syz_open_dev$usbfs(&(0x7f0000001280), 0x1aa1, 0x0)
mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x300000c, 0x1012, r0, 0x0)

13:34:49 executing program 4:
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff)
r0 = syz_open_dev$usbfs(&(0x7f0000001280), 0x1aa1, 0x0)
mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x300000c, 0x1012, r0, 0x0)

13:34:49 executing program 1:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000240))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
sched_rr_get_interval(0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000400)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x64, 0x9, 0x4, 0x1}], &(0x7f0000000440)='GPL\x00', 0x2644, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x5, 0x50000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r3, r3]}, 0x80)
r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000040)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0)
ptrace$setopts(0x4200, r0, 0x9a66, 0x22)
openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x181883, 0x0)
perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00), 0x0, 0x0)
readv(r5, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3)

13:34:49 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x200000a, 0x12, r0, 0x0)
preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_TLB_DYNAMIC_LB={0x4}]}}}]}, 0x3c}}, 0x0)
pipe(&(0x7f0000000180)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff8141", @ANYRES32=0x0, @ANYBLOB="0000001f00040000280012800a00010076786c616e"], 0x3}}, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
close(r3)
socket$nl_route(0x10, 0x3, 0x0)
write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r1, 0x0, r3, 0x0, 0x4ffe6, 0x0)

[   90.471048] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'.
[   90.482226] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'.
13:34:52 executing program 5:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000240))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
sched_rr_get_interval(0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000400)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x64, 0x9, 0x4, 0x1}], &(0x7f0000000440)='GPL\x00', 0x2644, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x5, 0x50000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r3, r3]}, 0x80)
r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000040)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0)
ptrace$setopts(0x4200, r0, 0x9a66, 0x22)
openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x181883, 0x0)
perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00), 0x0, 0x0)
readv(r5, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3)

13:34:52 executing program 0:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000000040)={[{@noacl}]})

13:34:52 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x200000a, 0x12, r0, 0x0)
preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_TLB_DYNAMIC_LB={0x4}]}}}]}, 0x3c}}, 0x0)
pipe(&(0x7f0000000180)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff8141", @ANYRES32=0x0, @ANYBLOB="0000001f00040000280012800a00010076786c616e"], 0x3}}, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
close(r3)
socket$nl_route(0x10, 0x3, 0x0)
write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r1, 0x0, r3, 0x0, 0x4ffe6, 0x0)

13:34:52 executing program 3:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000240))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
sched_rr_get_interval(0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000400)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x64, 0x9, 0x4, 0x1}], &(0x7f0000000440)='GPL\x00', 0x2644, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x5, 0x50000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r3, r3]}, 0x80)
r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000040)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0)
ptrace$setopts(0x4200, r0, 0x9a66, 0x22)
openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x181883, 0x0)
perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00), 0x0, 0x0)
readv(r5, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3)

13:34:52 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000240))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
sched_rr_get_interval(0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000400)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x64, 0x9, 0x4, 0x1}], &(0x7f0000000440)='GPL\x00', 0x2644, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x5, 0x50000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r3, r3]}, 0x80)
r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000040)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0)
ptrace$setopts(0x4200, r0, 0x9a66, 0x22)
openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x181883, 0x0)
perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00), 0x0, 0x0)
readv(r5, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3)

[   93.210400] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5
[   93.210400] Contact linux-ext4@vger.kernel.org if you think we should keep it.
[   93.210400] 
13:34:52 executing program 0:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000000040)={[{@noacl}]})

[   93.273983] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue
[   93.282524] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'.
[   93.316526] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'.
[   93.437397] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5
[   93.437397] Contact linux-ext4@vger.kernel.org if you think we should keep it.
[   93.437397] 
[   93.476801] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue
13:34:52 executing program 0:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000000040)={[{@noacl}]})

13:34:52 executing program 1:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000240))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
sched_rr_get_interval(0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000400)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x64, 0x9, 0x4, 0x1}], &(0x7f0000000440)='GPL\x00', 0x2644, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x5, 0x50000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r3, r3]}, 0x80)
r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000040)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0)
ptrace$setopts(0x4200, r0, 0x9a66, 0x22)
openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x181883, 0x0)
perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00), 0x0, 0x0)
readv(r5, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3)

[   93.596608] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5
[   93.596608] Contact linux-ext4@vger.kernel.org if you think we should keep it.
[   93.596608] 
[   93.633319] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue
13:34:52 executing program 0:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b00000080", 0x59, 0x400}, {&(0x7f0000010200)="010000000000050011", 0x9, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x4400}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x4800}, {&(0x7f0000012b00)="ed41000000040000d1f4655fd2f4655fd2f4655f000000000000040002", 0x1d, 0x8c80}, {&(0x7f0000012c00)="8081000000180000d1f4655fd1f4655fd1f4655f00000000000001000c00000010000800000000000af303000400000000000000000000000100000012000000010000000100000018000000020000000400000014", 0x55, 0x8d00}], 0x0, &(0x7f0000000040)={[{@noacl}]})

[   93.777087] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5
[   93.777087] Contact linux-ext4@vger.kernel.org if you think we should keep it.
[   93.777087] 
[   93.847833] EXT4-fs (loop0): mounted filesystem without journal. Opts: noacl,,errors=continue
13:34:53 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x200000a, 0x12, r0, 0x0)
preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_TLB_DYNAMIC_LB={0x4}]}}}]}, 0x3c}}, 0x0)
pipe(&(0x7f0000000180)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff8141", @ANYRES32=0x0, @ANYBLOB="0000001f00040000280012800a00010076786c616e"], 0x3}}, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
close(r3)
socket$nl_route(0x10, 0x3, 0x0)
write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r1, 0x0, r3, 0x0, 0x4ffe6, 0x0)

13:34:53 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x200000a, 0x12, r0, 0x0)
preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_TLB_DYNAMIC_LB={0x4}]}}}]}, 0x3c}}, 0x0)
pipe(&(0x7f0000000180)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff8141", @ANYRES32=0x0, @ANYBLOB="0000001f00040000280012800a00010076786c616e"], 0x3}}, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
close(r3)
socket$nl_route(0x10, 0x3, 0x0)
write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r1, 0x0, r3, 0x0, 0x4ffe6, 0x0)

[   94.114808] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
[   94.137355] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'.
[   94.162966] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'.
[   94.178642] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'.
13:34:53 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x200000a, 0x12, r0, 0x0)
preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_TLB_DYNAMIC_LB={0x4}]}}}]}, 0x3c}}, 0x0)
pipe(&(0x7f0000000180)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff8141", @ANYRES32=0x0, @ANYBLOB="0000001f00040000280012800a00010076786c616e"], 0x3}}, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
close(r3)
socket$nl_route(0x10, 0x3, 0x0)
write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r1, 0x0, r3, 0x0, 0x4ffe6, 0x0)

[   94.961195] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
[   94.995958] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'.
13:34:55 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x200000a, 0x12, r0, 0x0)
preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_TLB_DYNAMIC_LB={0x4}]}}}]}, 0x3c}}, 0x0)
pipe(&(0x7f0000000180)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff8141", @ANYRES32=0x0, @ANYBLOB="0000001f00040000280012800a00010076786c616e"], 0x3}}, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
close(r3)
socket$nl_route(0x10, 0x3, 0x0)
write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r1, 0x0, r3, 0x0, 0x4ffe6, 0x0)

13:34:55 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0)
mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x200000a, 0x12, r0, 0x0)
preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_TLB_DYNAMIC_LB={0x4}]}}}]}, 0x3c}}, 0x0)
pipe(&(0x7f0000000180)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff8141", @ANYRES32=0x0, @ANYBLOB="0000001f00040000280012800a00010076786c616e"], 0x3}}, 0x0)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
close(r3)
socket$nl_route(0x10, 0x3, 0x0)
write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc)
splice(r1, 0x0, r3, 0x0, 0x4ffe6, 0x0)

13:34:55 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00')
read$rfkill(r0, &(0x7f0000000080), 0x8)
read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020)

[   96.324529] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'.
13:34:55 executing program 3:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000240))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
sched_rr_get_interval(0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000400)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x64, 0x9, 0x4, 0x1}], &(0x7f0000000440)='GPL\x00', 0x2644, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x5, 0x50000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r3, r3]}, 0x80)
r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000040)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0)
ptrace$setopts(0x4200, r0, 0x9a66, 0x22)
openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x181883, 0x0)
perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00), 0x0, 0x0)
readv(r5, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3)

13:34:55 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00')
read$rfkill(r0, &(0x7f0000000080), 0x8)
read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020)

13:34:55 executing program 2:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000240))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
sched_rr_get_interval(0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000400)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x64, 0x9, 0x4, 0x1}], &(0x7f0000000440)='GPL\x00', 0x2644, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x5, 0x50000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r3, r3]}, 0x80)
r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000040)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0)
ptrace$setopts(0x4200, r0, 0x9a66, 0x22)
openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x181883, 0x0)
perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00), 0x0, 0x0)
readv(r5, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3)

[   96.374023] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'.
[   96.389981] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'.
[   96.405736] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'.
13:34:55 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00')
read$rfkill(r0, &(0x7f0000000080), 0x8)
read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020)

13:34:58 executing program 1:
perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000240))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
sched_rr_get_interval(0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000400)=@raw=[@call={0x85, 0x0, 0x0, 0x99}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x64, 0x9, 0x4, 0x1}], &(0x7f0000000440)='GPL\x00', 0x2644, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x5, 0x50000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r3, r3]}, 0x80)
r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000040)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0)
ptrace$setopts(0x4200, r0, 0x9a66, 0x22)
openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x181883, 0x0)
perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00), 0x0, 0x0)
readv(r5, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3)

13:34:58 executing program 5:
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00')
read$rfkill(r0, &(0x7f0000000080), 0x8)
read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020)

13:34:58 executing program 4:
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00')
read$rfkill(r0, &(0x7f0000000080), 0x8)
read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020)

13:34:58 executing program 0:
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000180)={0x1a, 0x0, 0x6, 0x0, 0x9, 0x1, @dev}, 0x10)
close(r1)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x30f, 0x1, 0x7, 0x3, 0x5, @link_local}, 0x10)
r2 = getpgrp(0x0)
r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x22200, 0x0)
syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x2ef0000, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000380)="f5c9ad1e4255ba74668015dd0ddee24a1ffae5b01d041be6dc2c6e7c691ae4cc7a029db2ffd2b708a584d7e4f9db3e3e27ba884b704bff1485fb8f388a8f8c81cbd0d1964ffd19a3df98be92b45cde1daf7149a6fcf2e1a95e9b7d10ac009fb3fb3bb3d032921c557e40eda6536f3b9f21ce6f9d6c59bf538d3f9cff5d1434ff921b514d2af575f8e60bcae6b6ce3df305b5d04311c8c8aa1963725bab4b1f95fd45256de15cf777cabb00ac1b1d7b06598d", 0xb2, 0x4}, {&(0x7f0000000440)="0be2c978781f1b613e6bd9f3d3ff424695b892cedb13600b9087db3c87b7ca66b0f0d56579603c1aa4c599f842468a1f764e04f6aaf9fafe4387b95c3fb6343eb2ad34dd2f91ac2556bc0d3b5e1a73", 0x4f, 0x80}], 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="64656203000000000000002c643d", @ANYRESHEX, @ANYBLOB=',norecovery,obj_role=/dev/ubi_ctrl\x00,fsmagic=0x0000000000000006,fscontext=unconfined_u,func=BPRM_CHECK,fowner<', @ANYRESDEC=0xee00, @ANYBLOB=',fsmagic=0x0000000000000005,defcontext=staff_u,dont_measure,\x00'])
preadv2(0xffffffffffffffff, &(0x7f0000001740)=[{&(0x7f0000001780)=""/68, 0x44}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/114, 0x72}, {&(0x7f0000000600)=""/34, 0x22}], 0x4, 0x7, 0x2000d5, 0x10)
perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x7c, 0x2, 0x2d, 0x68, 0x0, 0x6, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10, 0xffffffffffffffff, 0xffff8000, 0x8, 0x50, 0x6}, r2, 0x5, r3, 0x0)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0)
sendmmsg(r0, &(0x7f0000001780), 0x0, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280))
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000005070000964200000000000001000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0)
ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, &(0x7f0000001880)={{}, 0x1, &(0x7f0000001840)=[0x6685], 0x7, 0x2})
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0)
tkill(r4, 0x16)

13:34:58 executing program 4:
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00')
read$rfkill(r0, &(0x7f0000000080), 0x8)
read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020)

13:34:58 executing program 5:
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @window, @window, @window={0x3, 0x0, 0x401}, @window, @mss, @window, @sack_perm], 0x2000021d)
write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0xa2f)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendto$inet(r0, &(0x7f00000004c0)="34e2de4d8d957a8de4e490b6cd20b988d4edef164bd3377aa381b5f50b7ca40a516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe052e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e80c38c5fd29b5c1b5d7ce67edc856a8dc0ba54cee53de9a48c131389426bd06ec7c695add357934fc0321f0d", 0xf1, 0x805, 0x0, 0xfffffffffffffd93)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0)

13:34:58 executing program 4:
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00')
read$rfkill(r0, &(0x7f0000000080), 0x8)
read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020)

13:34:58 executing program 3:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x31}}, 0x10)
setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@private0, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@loopback, 0x0, 0x1, 0x0, 0xb7}}, 0xe8)
sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x8000000000001f4)

13:34:58 executing program 4:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x14, 0x4, 0xa, 0x201}, 0x14}}, 0x0)

[   99.621176] EXT4-fs (loop0): VFS: Can't find ext4 filesystem
13:34:58 executing program 4:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x14, 0x4, 0xa, 0x201}, 0x14}}, 0x0)

13:34:58 executing program 0:
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000180)={0x1a, 0x0, 0x6, 0x0, 0x9, 0x1, @dev}, 0x10)
close(r1)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x30f, 0x1, 0x7, 0x3, 0x5, @link_local}, 0x10)
r2 = getpgrp(0x0)
r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x22200, 0x0)
syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x2ef0000, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000380)="f5c9ad1e4255ba74668015dd0ddee24a1ffae5b01d041be6dc2c6e7c691ae4cc7a029db2ffd2b708a584d7e4f9db3e3e27ba884b704bff1485fb8f388a8f8c81cbd0d1964ffd19a3df98be92b45cde1daf7149a6fcf2e1a95e9b7d10ac009fb3fb3bb3d032921c557e40eda6536f3b9f21ce6f9d6c59bf538d3f9cff5d1434ff921b514d2af575f8e60bcae6b6ce3df305b5d04311c8c8aa1963725bab4b1f95fd45256de15cf777cabb00ac1b1d7b06598d", 0xb2, 0x4}, {&(0x7f0000000440)="0be2c978781f1b613e6bd9f3d3ff424695b892cedb13600b9087db3c87b7ca66b0f0d56579603c1aa4c599f842468a1f764e04f6aaf9fafe4387b95c3fb6343eb2ad34dd2f91ac2556bc0d3b5e1a73", 0x4f, 0x80}], 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="64656203000000000000002c643d", @ANYRESHEX, @ANYBLOB=',norecovery,obj_role=/dev/ubi_ctrl\x00,fsmagic=0x0000000000000006,fscontext=unconfined_u,func=BPRM_CHECK,fowner<', @ANYRESDEC=0xee00, @ANYBLOB=',fsmagic=0x0000000000000005,defcontext=staff_u,dont_measure,\x00'])
preadv2(0xffffffffffffffff, &(0x7f0000001740)=[{&(0x7f0000001780)=""/68, 0x44}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/114, 0x72}, {&(0x7f0000000600)=""/34, 0x22}], 0x4, 0x7, 0x2000d5, 0x10)
perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x7c, 0x2, 0x2d, 0x68, 0x0, 0x6, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10, 0xffffffffffffffff, 0xffff8000, 0x8, 0x50, 0x6}, r2, 0x5, r3, 0x0)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0)
sendmmsg(r0, &(0x7f0000001780), 0x0, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280))
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000005070000964200000000000001000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0)
ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, &(0x7f0000001880)={{}, 0x1, &(0x7f0000001840)=[0x6685], 0x7, 0x2})
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0)
tkill(r4, 0x16)

13:34:58 executing program 3:
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000180)={0x1a, 0x0, 0x6, 0x0, 0x9, 0x1, @dev}, 0x10)
close(r1)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x30f, 0x1, 0x7, 0x3, 0x5, @link_local}, 0x10)
r2 = getpgrp(0x0)
r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x22200, 0x0)
syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x2ef0000, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000380)="f5c9ad1e4255ba74668015dd0ddee24a1ffae5b01d041be6dc2c6e7c691ae4cc7a029db2ffd2b708a584d7e4f9db3e3e27ba884b704bff1485fb8f388a8f8c81cbd0d1964ffd19a3df98be92b45cde1daf7149a6fcf2e1a95e9b7d10ac009fb3fb3bb3d032921c557e40eda6536f3b9f21ce6f9d6c59bf538d3f9cff5d1434ff921b514d2af575f8e60bcae6b6ce3df305b5d04311c8c8aa1963725bab4b1f95fd45256de15cf777cabb00ac1b1d7b06598d", 0xb2, 0x4}, {&(0x7f0000000440)="0be2c978781f1b613e6bd9f3d3ff424695b892cedb13600b9087db3c87b7ca66b0f0d56579603c1aa4c599f842468a1f764e04f6aaf9fafe4387b95c3fb6343eb2ad34dd2f91ac2556bc0d3b5e1a73", 0x4f, 0x80}], 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="64656203000000000000002c643d", @ANYRESHEX, @ANYBLOB=',norecovery,obj_role=/dev/ubi_ctrl\x00,fsmagic=0x0000000000000006,fscontext=unconfined_u,func=BPRM_CHECK,fowner<', @ANYRESDEC=0xee00, @ANYBLOB=',fsmagic=0x0000000000000005,defcontext=staff_u,dont_measure,\x00'])
preadv2(0xffffffffffffffff, &(0x7f0000001740)=[{&(0x7f0000001780)=""/68, 0x44}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/114, 0x72}, {&(0x7f0000000600)=""/34, 0x22}], 0x4, 0x7, 0x2000d5, 0x10)
perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x7c, 0x2, 0x2d, 0x68, 0x0, 0x6, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10, 0xffffffffffffffff, 0xffff8000, 0x8, 0x50, 0x6}, r2, 0x5, r3, 0x0)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0)
sendmmsg(r0, &(0x7f0000001780), 0x0, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280))
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000005070000964200000000000001000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0)
ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, &(0x7f0000001880)={{}, 0x1, &(0x7f0000001840)=[0x6685], 0x7, 0x2})
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0)
tkill(r4, 0x16)

[   99.931176] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
[   99.952034] EXT4-fs (loop0): VFS: Can't find ext4 filesystem
13:34:59 executing program 5:
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @window, @window, @window={0x3, 0x0, 0x401}, @window, @mss, @window, @sack_perm], 0x2000021d)
write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0xa2f)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendto$inet(r0, &(0x7f00000004c0)="34e2de4d8d957a8de4e490b6cd20b988d4edef164bd3377aa381b5f50b7ca40a516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe052e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e80c38c5fd29b5c1b5d7ce67edc856a8dc0ba54cee53de9a48c131389426bd06ec7c695add357934fc0321f0d", 0xf1, 0x805, 0x0, 0xfffffffffffffd93)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0)

13:34:59 executing program 4:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x14, 0x4, 0xa, 0x201}, 0x14}}, 0x0)

13:34:59 executing program 2:
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @window, @window, @window={0x3, 0x0, 0x401}, @window, @mss, @window, @sack_perm], 0x2000021d)
write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0xa2f)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendto$inet(r0, &(0x7f00000004c0)="34e2de4d8d957a8de4e490b6cd20b988d4edef164bd3377aa381b5f50b7ca40a516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe052e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e80c38c5fd29b5c1b5d7ce67edc856a8dc0ba54cee53de9a48c131389426bd06ec7c695add357934fc0321f0d", 0xf1, 0x805, 0x0, 0xfffffffffffffd93)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0)

13:34:59 executing program 0:
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000180)={0x1a, 0x0, 0x6, 0x0, 0x9, 0x1, @dev}, 0x10)
close(r1)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x30f, 0x1, 0x7, 0x3, 0x5, @link_local}, 0x10)
r2 = getpgrp(0x0)
r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x22200, 0x0)
syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x2ef0000, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000380)="f5c9ad1e4255ba74668015dd0ddee24a1ffae5b01d041be6dc2c6e7c691ae4cc7a029db2ffd2b708a584d7e4f9db3e3e27ba884b704bff1485fb8f388a8f8c81cbd0d1964ffd19a3df98be92b45cde1daf7149a6fcf2e1a95e9b7d10ac009fb3fb3bb3d032921c557e40eda6536f3b9f21ce6f9d6c59bf538d3f9cff5d1434ff921b514d2af575f8e60bcae6b6ce3df305b5d04311c8c8aa1963725bab4b1f95fd45256de15cf777cabb00ac1b1d7b06598d", 0xb2, 0x4}, {&(0x7f0000000440)="0be2c978781f1b613e6bd9f3d3ff424695b892cedb13600b9087db3c87b7ca66b0f0d56579603c1aa4c599f842468a1f764e04f6aaf9fafe4387b95c3fb6343eb2ad34dd2f91ac2556bc0d3b5e1a73", 0x4f, 0x80}], 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="64656203000000000000002c643d", @ANYRESHEX, @ANYBLOB=',norecovery,obj_role=/dev/ubi_ctrl\x00,fsmagic=0x0000000000000006,fscontext=unconfined_u,func=BPRM_CHECK,fowner<', @ANYRESDEC=0xee00, @ANYBLOB=',fsmagic=0x0000000000000005,defcontext=staff_u,dont_measure,\x00'])
preadv2(0xffffffffffffffff, &(0x7f0000001740)=[{&(0x7f0000001780)=""/68, 0x44}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/114, 0x72}, {&(0x7f0000000600)=""/34, 0x22}], 0x4, 0x7, 0x2000d5, 0x10)
perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x7c, 0x2, 0x2d, 0x68, 0x0, 0x6, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10, 0xffffffffffffffff, 0xffff8000, 0x8, 0x50, 0x6}, r2, 0x5, r3, 0x0)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0)
sendmmsg(r0, &(0x7f0000001780), 0x0, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280))
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000005070000964200000000000001000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0)
ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, &(0x7f0000001880)={{}, 0x1, &(0x7f0000001840)=[0x6685], 0x7, 0x2})
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0)
tkill(r4, 0x16)

13:34:59 executing program 3:
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000180)={0x1a, 0x0, 0x6, 0x0, 0x9, 0x1, @dev}, 0x10)
close(r1)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x30f, 0x1, 0x7, 0x3, 0x5, @link_local}, 0x10)
r2 = getpgrp(0x0)
r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x22200, 0x0)
syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x2ef0000, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000380)="f5c9ad1e4255ba74668015dd0ddee24a1ffae5b01d041be6dc2c6e7c691ae4cc7a029db2ffd2b708a584d7e4f9db3e3e27ba884b704bff1485fb8f388a8f8c81cbd0d1964ffd19a3df98be92b45cde1daf7149a6fcf2e1a95e9b7d10ac009fb3fb3bb3d032921c557e40eda6536f3b9f21ce6f9d6c59bf538d3f9cff5d1434ff921b514d2af575f8e60bcae6b6ce3df305b5d04311c8c8aa1963725bab4b1f95fd45256de15cf777cabb00ac1b1d7b06598d", 0xb2, 0x4}, {&(0x7f0000000440)="0be2c978781f1b613e6bd9f3d3ff424695b892cedb13600b9087db3c87b7ca66b0f0d56579603c1aa4c599f842468a1f764e04f6aaf9fafe4387b95c3fb6343eb2ad34dd2f91ac2556bc0d3b5e1a73", 0x4f, 0x80}], 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="64656203000000000000002c643d", @ANYRESHEX, @ANYBLOB=',norecovery,obj_role=/dev/ubi_ctrl\x00,fsmagic=0x0000000000000006,fscontext=unconfined_u,func=BPRM_CHECK,fowner<', @ANYRESDEC=0xee00, @ANYBLOB=',fsmagic=0x0000000000000005,defcontext=staff_u,dont_measure,\x00'])
preadv2(0xffffffffffffffff, &(0x7f0000001740)=[{&(0x7f0000001780)=""/68, 0x44}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/114, 0x72}, {&(0x7f0000000600)=""/34, 0x22}], 0x4, 0x7, 0x2000d5, 0x10)
perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x7c, 0x2, 0x2d, 0x68, 0x0, 0x6, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10, 0xffffffffffffffff, 0xffff8000, 0x8, 0x50, 0x6}, r2, 0x5, r3, 0x0)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0)
sendmmsg(r0, &(0x7f0000001780), 0x0, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280))
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000005070000964200000000000001000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0)
ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, &(0x7f0000001880)={{}, 0x1, &(0x7f0000001840)=[0x6685], 0x7, 0x2})
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0)
tkill(r4, 0x16)

13:34:59 executing program 1:
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @window, @window, @window={0x3, 0x0, 0x401}, @window, @mss, @window, @sack_perm], 0x2000021d)
write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0xa2f)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendto$inet(r0, &(0x7f00000004c0)="34e2de4d8d957a8de4e490b6cd20b988d4edef164bd3377aa381b5f50b7ca40a516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe052e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e80c38c5fd29b5c1b5d7ce67edc856a8dc0ba54cee53de9a48c131389426bd06ec7c695add357934fc0321f0d", 0xf1, 0x805, 0x0, 0xfffffffffffffd93)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0)

13:34:59 executing program 4:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x14, 0x4, 0xa, 0x201}, 0x14}}, 0x0)

13:34:59 executing program 4:
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @window, @window, @window={0x3, 0x0, 0x401}, @window, @mss, @window, @sack_perm], 0x2000021d)
write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0xa2f)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendto$inet(r0, &(0x7f00000004c0)="34e2de4d8d957a8de4e490b6cd20b988d4edef164bd3377aa381b5f50b7ca40a516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe052e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e80c38c5fd29b5c1b5d7ce67edc856a8dc0ba54cee53de9a48c131389426bd06ec7c695add357934fc0321f0d", 0xf1, 0x805, 0x0, 0xfffffffffffffd93)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0)

[  100.217743] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
[  100.224483] EXT4-fs (loop0): VFS: Can't find ext4 filesystem
13:34:59 executing program 0:
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000180)={0x1a, 0x0, 0x6, 0x0, 0x9, 0x1, @dev}, 0x10)
close(r1)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x30f, 0x1, 0x7, 0x3, 0x5, @link_local}, 0x10)
r2 = getpgrp(0x0)
r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x22200, 0x0)
syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x2ef0000, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000380)="f5c9ad1e4255ba74668015dd0ddee24a1ffae5b01d041be6dc2c6e7c691ae4cc7a029db2ffd2b708a584d7e4f9db3e3e27ba884b704bff1485fb8f388a8f8c81cbd0d1964ffd19a3df98be92b45cde1daf7149a6fcf2e1a95e9b7d10ac009fb3fb3bb3d032921c557e40eda6536f3b9f21ce6f9d6c59bf538d3f9cff5d1434ff921b514d2af575f8e60bcae6b6ce3df305b5d04311c8c8aa1963725bab4b1f95fd45256de15cf777cabb00ac1b1d7b06598d", 0xb2, 0x4}, {&(0x7f0000000440)="0be2c978781f1b613e6bd9f3d3ff424695b892cedb13600b9087db3c87b7ca66b0f0d56579603c1aa4c599f842468a1f764e04f6aaf9fafe4387b95c3fb6343eb2ad34dd2f91ac2556bc0d3b5e1a73", 0x4f, 0x80}], 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="64656203000000000000002c643d", @ANYRESHEX, @ANYBLOB=',norecovery,obj_role=/dev/ubi_ctrl\x00,fsmagic=0x0000000000000006,fscontext=unconfined_u,func=BPRM_CHECK,fowner<', @ANYRESDEC=0xee00, @ANYBLOB=',fsmagic=0x0000000000000005,defcontext=staff_u,dont_measure,\x00'])
preadv2(0xffffffffffffffff, &(0x7f0000001740)=[{&(0x7f0000001780)=""/68, 0x44}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/114, 0x72}, {&(0x7f0000000600)=""/34, 0x22}], 0x4, 0x7, 0x2000d5, 0x10)
perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x7c, 0x2, 0x2d, 0x68, 0x0, 0x6, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10, 0xffffffffffffffff, 0xffff8000, 0x8, 0x50, 0x6}, r2, 0x5, r3, 0x0)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0)
sendmmsg(r0, &(0x7f0000001780), 0x0, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280))
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000005070000964200000000000001000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0)
ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, &(0x7f0000001880)={{}, 0x1, &(0x7f0000001840)=[0x6685], 0x7, 0x2})
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0)
tkill(r4, 0x16)

13:34:59 executing program 3:
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000180)={0x1a, 0x0, 0x6, 0x0, 0x9, 0x1, @dev}, 0x10)
close(r1)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x30f, 0x1, 0x7, 0x3, 0x5, @link_local}, 0x10)
r2 = getpgrp(0x0)
r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x22200, 0x0)
syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x2ef0000, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000380)="f5c9ad1e4255ba74668015dd0ddee24a1ffae5b01d041be6dc2c6e7c691ae4cc7a029db2ffd2b708a584d7e4f9db3e3e27ba884b704bff1485fb8f388a8f8c81cbd0d1964ffd19a3df98be92b45cde1daf7149a6fcf2e1a95e9b7d10ac009fb3fb3bb3d032921c557e40eda6536f3b9f21ce6f9d6c59bf538d3f9cff5d1434ff921b514d2af575f8e60bcae6b6ce3df305b5d04311c8c8aa1963725bab4b1f95fd45256de15cf777cabb00ac1b1d7b06598d", 0xb2, 0x4}, {&(0x7f0000000440)="0be2c978781f1b613e6bd9f3d3ff424695b892cedb13600b9087db3c87b7ca66b0f0d56579603c1aa4c599f842468a1f764e04f6aaf9fafe4387b95c3fb6343eb2ad34dd2f91ac2556bc0d3b5e1a73", 0x4f, 0x80}], 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="64656203000000000000002c643d", @ANYRESHEX, @ANYBLOB=',norecovery,obj_role=/dev/ubi_ctrl\x00,fsmagic=0x0000000000000006,fscontext=unconfined_u,func=BPRM_CHECK,fowner<', @ANYRESDEC=0xee00, @ANYBLOB=',fsmagic=0x0000000000000005,defcontext=staff_u,dont_measure,\x00'])
preadv2(0xffffffffffffffff, &(0x7f0000001740)=[{&(0x7f0000001780)=""/68, 0x44}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/114, 0x72}, {&(0x7f0000000600)=""/34, 0x22}], 0x4, 0x7, 0x2000d5, 0x10)
perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x7c, 0x2, 0x2d, 0x68, 0x0, 0x6, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10, 0xffffffffffffffff, 0xffff8000, 0x8, 0x50, 0x6}, r2, 0x5, r3, 0x0)
sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0)
sendmmsg(r0, &(0x7f0000001780), 0x0, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280))
getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4800000005070000964200000000000001000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0)
ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, &(0x7f0000001880)={{}, 0x1, &(0x7f0000001840)=[0x6685], 0x7, 0x2})
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0)
tkill(r4, 0x16)

13:34:59 executing program 5:
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @window, @window, @window={0x3, 0x0, 0x401}, @window, @mss, @window, @sack_perm], 0x2000021d)
write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0xa2f)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendto$inet(r0, &(0x7f00000004c0)="34e2de4d8d957a8de4e490b6cd20b988d4edef164bd3377aa381b5f50b7ca40a516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe052e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e80c38c5fd29b5c1b5d7ce67edc856a8dc0ba54cee53de9a48c131389426bd06ec7c695add357934fc0321f0d", 0xf1, 0x805, 0x0, 0xfffffffffffffd93)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0)

13:34:59 executing program 2:
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @window, @window, @window={0x3, 0x0, 0x401}, @window, @mss, @window, @sack_perm], 0x2000021d)
write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0xa2f)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendto$inet(r0, &(0x7f00000004c0)="34e2de4d8d957a8de4e490b6cd20b988d4edef164bd3377aa381b5f50b7ca40a516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe052e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e80c38c5fd29b5c1b5d7ce67edc856a8dc0ba54cee53de9a48c131389426bd06ec7c695add357934fc0321f0d", 0xf1, 0x805, 0x0, 0xfffffffffffffd93)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0)

13:34:59 executing program 1:
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @window, @window, @window={0x3, 0x0, 0x401}, @window, @mss, @window, @sack_perm], 0x2000021d)
write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0xa2f)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendto$inet(r0, &(0x7f00000004c0)="34e2de4d8d957a8de4e490b6cd20b988d4edef164bd3377aa381b5f50b7ca40a516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe052e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e80c38c5fd29b5c1b5d7ce67edc856a8dc0ba54cee53de9a48c131389426bd06ec7c695add357934fc0321f0d", 0xf1, 0x805, 0x0, 0xfffffffffffffd93)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0)

[  100.526669] EXT4-fs (loop0): VFS: Can't find ext4 filesystem
[  100.566681] EXT4-fs (loop3): VFS: Can't find ext4 filesystem
13:34:59 executing program 4:
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @window, @window, @window={0x3, 0x0, 0x401}, @window, @mss, @window, @sack_perm], 0x2000021d)
write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0xa2f)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendto$inet(r0, &(0x7f00000004c0)="34e2de4d8d957a8de4e490b6cd20b988d4edef164bd3377aa381b5f50b7ca40a516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe052e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e80c38c5fd29b5c1b5d7ce67edc856a8dc0ba54cee53de9a48c131389426bd06ec7c695add357934fc0321f0d", 0xf1, 0x805, 0x0, 0xfffffffffffffd93)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0)

13:34:59 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000340)=@filter={'filter\x00', 0xe, 0x4, 0x4d8, 0xffffffff, 0x0, 0x190, 0x0, 0xffffffff, 0xffffffff, 0x440, 0x440, 0x440, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x9, 0x4, 0x0, 'syz1\x00'}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @common=@addrtype={{0x30}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@ipv4={'\x00', '\xff\xff', @dev}, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private0, 'macvlan0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538)
bind$inet(0xffffffffffffffff, 0x0, 0x0)
connect$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @multicast2}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x24008884, &(0x7f0000000240)={0x2, 0x4e23, @loopback}, 0x10)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0)
sendto$inet(r2, &(0x7f0000000880)="bc8b8c5ba91bbf7179cf23edc55f12134c7fedfefa1880aaa9c0249a3688d32b90aca664b81c67cf315788be3510581e4eb1d674e9dbbff6d5559436d62f53f8490c702291d3fe5f4fd2c3d3f0991f562517bd10d940481ea32b825163ce10629b984b54b17b5005bf81b8803c94b6c2c04877b1f4f608a4adf3c5e29860e7594dde3db88cfb40005b4ced9adf", 0x8d, 0x0, 0x0, 0x0)

13:34:59 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)

[  100.794176] ip_tables: iptables: counters copy to user failed while replacing table
13:34:59 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)

13:35:00 executing program 2:
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @window, @window, @window={0x3, 0x0, 0x401}, @window, @mss, @window, @sack_perm], 0x2000021d)
write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0xa2f)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendto$inet(r0, &(0x7f00000004c0)="34e2de4d8d957a8de4e490b6cd20b988d4edef164bd3377aa381b5f50b7ca40a516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe052e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e80c38c5fd29b5c1b5d7ce67edc856a8dc0ba54cee53de9a48c131389426bd06ec7c695add357934fc0321f0d", 0xf1, 0x805, 0x0, 0xfffffffffffffd93)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0)

13:35:00 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)

13:35:00 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, 0x0)

13:35:00 executing program 5:
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @window, @window, @window={0x3, 0x0, 0x401}, @window, @mss, @window, @sack_perm], 0x2000021d)
write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0xa2f)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendto$inet(r0, &(0x7f00000004c0)="34e2de4d8d957a8de4e490b6cd20b988d4edef164bd3377aa381b5f50b7ca40a516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe052e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e80c38c5fd29b5c1b5d7ce67edc856a8dc0ba54cee53de9a48c131389426bd06ec7c695add357934fc0321f0d", 0xf1, 0x805, 0x0, 0xfffffffffffffd93)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0)

13:35:00 executing program 3:
r0 = syz_open_dev$radio(&(0x7f0000000000), 0x1, 0x2)
ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000080)={0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x98f905, 0x0, '\x00', @p_u16=0x0}})
ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000000c0)={0x5, 0x6})
ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000100)={0x2, @capture={0x1000, 0x1, {0x101, 0x1f}, 0x3, 0x8001}})
creat(&(0x7f0000000240)='./file0\x00', 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)

13:35:00 executing program 1:
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @window, @window, @window={0x3, 0x0, 0x401}, @window, @mss, @window, @sack_perm], 0x2000021d)
write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0xa2f)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendto$inet(r0, &(0x7f00000004c0)="34e2de4d8d957a8de4e490b6cd20b988d4edef164bd3377aa381b5f50b7ca40a516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe052e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e80c38c5fd29b5c1b5d7ce67edc856a8dc0ba54cee53de9a48c131389426bd06ec7c695add357934fc0321f0d", 0xf1, 0x805, 0x0, 0xfffffffffffffd93)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0)

13:35:00 executing program 3:
r0 = syz_open_dev$radio(&(0x7f0000000000), 0x1, 0x2)
ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000080)={0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x98f905, 0x0, '\x00', @p_u16=0x0}})
ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000000c0)={0x5, 0x6})
ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000100)={0x2, @capture={0x1000, 0x1, {0x101, 0x1f}, 0x3, 0x8001}})
creat(&(0x7f0000000240)='./file0\x00', 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)

13:35:00 executing program 4:
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000300)=[@mss, @window, @window, @window={0x3, 0x0, 0x401}, @window, @mss, @window, @sack_perm], 0x2000021d)
write$binfmt_elf64(r0, &(0x7f0000000680)=ANY=[], 0xa2f)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88)
sendto$inet(r0, &(0x7f00000004c0)="34e2de4d8d957a8de4e490b6cd20b988d4edef164bd3377aa381b5f50b7ca40a516489f78cd7208982e9bde22b2b7c1c7606d565477f3db9d2b077283644c0f27ab52a863a42863e06944e40a0b3c5d21c8cbe052e7f726263f28aef1bc12a069063d4c30e8f329fdb36859be727fbef4314161e5fb5f01ae00a2634d5cdecca2089c62e32f4c919886b2b88d237e287318739bec0364caf15889f38a312ef6621c0f21709a4bf2b16274cf933f6ad8fcc9c2024bc1b4713f650e860f93ae93b2361956b3e80c38c5fd29b5c1b5d7ce67edc856a8dc0ba54cee53de9a48c131389426bd06ec7c695add357934fc0321f0d", 0xf1, 0x805, 0x0, 0xfffffffffffffd93)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0)

13:35:00 executing program 3:
r0 = syz_open_dev$radio(&(0x7f0000000000), 0x1, 0x2)
ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000080)={0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x98f905, 0x0, '\x00', @p_u16=0x0}})
ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000000c0)={0x5, 0x6})
ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000100)={0x2, @capture={0x1000, 0x1, {0x101, 0x1f}, 0x3, 0x8001}})
creat(&(0x7f0000000240)='./file0\x00', 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)

13:35:00 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000340)=@filter={'filter\x00', 0xe, 0x4, 0x4d8, 0xffffffff, 0x0, 0x190, 0x0, 0xffffffff, 0xffffffff, 0x440, 0x440, 0x440, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x9, 0x4, 0x0, 'syz1\x00'}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @common=@addrtype={{0x30}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@ipv4={'\x00', '\xff\xff', @dev}, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private0, 'macvlan0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538)
bind$inet(0xffffffffffffffff, 0x0, 0x0)
connect$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @multicast2}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x24008884, &(0x7f0000000240)={0x2, 0x4e23, @loopback}, 0x10)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0)
sendto$inet(r2, &(0x7f0000000880)="bc8b8c5ba91bbf7179cf23edc55f12134c7fedfefa1880aaa9c0249a3688d32b90aca664b81c67cf315788be3510581e4eb1d674e9dbbff6d5559436d62f53f8490c702291d3fe5f4fd2c3d3f0991f562517bd10d940481ea32b825163ce10629b984b54b17b5005bf81b8803c94b6c2c04877b1f4f608a4adf3c5e29860e7594dde3db88cfb40005b4ced9adf", 0x8d, 0x0, 0x0, 0x0)

13:35:00 executing program 3:
r0 = syz_open_dev$radio(&(0x7f0000000000), 0x1, 0x2)
ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000080)={0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x98f905, 0x0, '\x00', @p_u16=0x0}})
ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000000c0)={0x5, 0x6})
ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000100)={0x2, @capture={0x1000, 0x1, {0x101, 0x1f}, 0x3, 0x8001}})
creat(&(0x7f0000000240)='./file0\x00', 0x0)
mkdirat(0xffffffffffffffff, 0x0, 0x0)

13:35:00 executing program 2:
r0 = socket$kcm(0x10, 0x2, 0x10)
perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030020000b05d25a806f8c6394f90224fc60100002400a000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0)

13:35:00 executing program 5:
pipe(0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000))
ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000000c0)=0x1000)
read$dsp(r0, &(0x7f0000000780)=""/4082, 0xff2)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

13:35:00 executing program 1:
syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0)
r0 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0)
ioctl$SNDRV_PCM_IOCTL_HW_FREE(r0, 0x40044160, 0x3)

13:35:00 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x2, 0x73)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69)
connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f)
sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4)
r1 = socket(0x40000000015, 0x5, 0x0)
bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10)
recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000040)=@pppol2tpv3, 0x80, 0x0}}], 0x1, 0x0, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
getpid()

13:35:00 executing program 1:
syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0)
r0 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0)
ioctl$SNDRV_PCM_IOCTL_HW_FREE(r0, 0x40044160, 0x3)

13:35:00 executing program 3:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000340)=@filter={'filter\x00', 0xe, 0x4, 0x4d8, 0xffffffff, 0x0, 0x190, 0x0, 0xffffffff, 0xffffffff, 0x440, 0x440, 0x440, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x9, 0x4, 0x0, 'syz1\x00'}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @common=@addrtype={{0x30}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@ipv4={'\x00', '\xff\xff', @dev}, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private0, 'macvlan0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538)
bind$inet(0xffffffffffffffff, 0x0, 0x0)
connect$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @multicast2}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x24008884, &(0x7f0000000240)={0x2, 0x4e23, @loopback}, 0x10)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0)
sendto$inet(r2, &(0x7f0000000880)="bc8b8c5ba91bbf7179cf23edc55f12134c7fedfefa1880aaa9c0249a3688d32b90aca664b81c67cf315788be3510581e4eb1d674e9dbbff6d5559436d62f53f8490c702291d3fe5f4fd2c3d3f0991f562517bd10d940481ea32b825163ce10629b984b54b17b5005bf81b8803c94b6c2c04877b1f4f608a4adf3c5e29860e7594dde3db88cfb40005b4ced9adf", 0x8d, 0x0, 0x0, 0x0)

13:35:00 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000340)=@filter={'filter\x00', 0xe, 0x4, 0x4d8, 0xffffffff, 0x0, 0x190, 0x0, 0xffffffff, 0xffffffff, 0x440, 0x440, 0x440, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x9, 0x4, 0x0, 'syz1\x00'}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @common=@addrtype={{0x30}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@ipv4={'\x00', '\xff\xff', @dev}, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private0, 'macvlan0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538)
bind$inet(0xffffffffffffffff, 0x0, 0x0)
connect$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @multicast2}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x24008884, &(0x7f0000000240)={0x2, 0x4e23, @loopback}, 0x10)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0)
sendto$inet(r2, &(0x7f0000000880)="bc8b8c5ba91bbf7179cf23edc55f12134c7fedfefa1880aaa9c0249a3688d32b90aca664b81c67cf315788be3510581e4eb1d674e9dbbff6d5559436d62f53f8490c702291d3fe5f4fd2c3d3f0991f562517bd10d940481ea32b825163ce10629b984b54b17b5005bf81b8803c94b6c2c04877b1f4f608a4adf3c5e29860e7594dde3db88cfb40005b4ced9adf", 0x8d, 0x0, 0x0, 0x0)

[  101.620421] ip_tables: iptables: counters copy to user failed while replacing table
[  101.654592] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.2'.
13:35:00 executing program 1:
syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0)
r0 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0)
ioctl$SNDRV_PCM_IOCTL_HW_FREE(r0, 0x40044160, 0x3)

13:35:00 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000340)=@filter={'filter\x00', 0xe, 0x4, 0x4d8, 0xffffffff, 0x0, 0x190, 0x0, 0xffffffff, 0xffffffff, 0x440, 0x440, 0x440, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x9, 0x4, 0x0, 'syz1\x00'}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @common=@addrtype={{0x30}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@ipv4={'\x00', '\xff\xff', @dev}, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private0, 'macvlan0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538)
bind$inet(0xffffffffffffffff, 0x0, 0x0)
connect$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @multicast2}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x24008884, &(0x7f0000000240)={0x2, 0x4e23, @loopback}, 0x10)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0)
sendto$inet(r2, &(0x7f0000000880)="bc8b8c5ba91bbf7179cf23edc55f12134c7fedfefa1880aaa9c0249a3688d32b90aca664b81c67cf315788be3510581e4eb1d674e9dbbff6d5559436d62f53f8490c702291d3fe5f4fd2c3d3f0991f562517bd10d940481ea32b825163ce10629b984b54b17b5005bf81b8803c94b6c2c04877b1f4f608a4adf3c5e29860e7594dde3db88cfb40005b4ced9adf", 0x8d, 0x0, 0x0, 0x0)

13:35:00 executing program 1:
syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0)
r0 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x0, 0x0)
ioctl$SNDRV_PCM_IOCTL_HW_FREE(r0, 0x40044160, 0x3)

[  101.671228] ip_tables: iptables: counters copy to user failed while replacing table
[  101.694861] ip_tables: iptables: counters copy to user failed while replacing table
13:35:00 executing program 2:
r0 = socket$kcm(0x10, 0x2, 0x10)
perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030020000b05d25a806f8c6394f90224fc60100002400a000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0)

13:35:00 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000340)=@filter={'filter\x00', 0xe, 0x4, 0x4d8, 0xffffffff, 0x0, 0x190, 0x0, 0xffffffff, 0xffffffff, 0x440, 0x440, 0x440, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x9, 0x4, 0x0, 'syz1\x00'}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @common=@addrtype={{0x30}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@ipv4={'\x00', '\xff\xff', @dev}, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private0, 'macvlan0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538)
bind$inet(0xffffffffffffffff, 0x0, 0x0)
connect$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @multicast2}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x24008884, &(0x7f0000000240)={0x2, 0x4e23, @loopback}, 0x10)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0)
sendto$inet(r2, &(0x7f0000000880)="bc8b8c5ba91bbf7179cf23edc55f12134c7fedfefa1880aaa9c0249a3688d32b90aca664b81c67cf315788be3510581e4eb1d674e9dbbff6d5559436d62f53f8490c702291d3fe5f4fd2c3d3f0991f562517bd10d940481ea32b825163ce10629b984b54b17b5005bf81b8803c94b6c2c04877b1f4f608a4adf3c5e29860e7594dde3db88cfb40005b4ced9adf", 0x8d, 0x0, 0x0, 0x0)

[  101.743002] ip_tables: iptables: counters copy to user failed while replacing table
13:35:00 executing program 1:
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000500)="b9ff0f005d0d698cb89e14f088a8", 0x0, 0x117, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0xffffffffffffff7a, 0x3b, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x26, 0x0, 0x0}, 0x48)

[  101.786827] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.2'.
[  101.816877] ip_tables: iptables: counters copy to user failed while replacing table
13:35:01 executing program 5:
pipe(0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000))
ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000000c0)=0x1000)
read$dsp(r0, &(0x7f0000000780)=""/4082, 0xff2)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

13:35:01 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x2, 0x73)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69)
connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f)
sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4)
r1 = socket(0x40000000015, 0x5, 0x0)
bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10)
recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000040)=@pppol2tpv3, 0x80, 0x0}}], 0x1, 0x0, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
getpid()

13:35:01 executing program 2:
r0 = socket$kcm(0x10, 0x2, 0x10)
perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030020000b05d25a806f8c6394f90224fc60100002400a000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0)

13:35:01 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000340)=@filter={'filter\x00', 0xe, 0x4, 0x4d8, 0xffffffff, 0x0, 0x190, 0x0, 0xffffffff, 0xffffffff, 0x440, 0x440, 0x440, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x9, 0x4, 0x0, 'syz1\x00'}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @common=@addrtype={{0x30}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@ipv4={'\x00', '\xff\xff', @dev}, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private0, 'macvlan0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538)
bind$inet(0xffffffffffffffff, 0x0, 0x0)
connect$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @multicast2}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x24008884, &(0x7f0000000240)={0x2, 0x4e23, @loopback}, 0x10)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0)
sendto$inet(r2, &(0x7f0000000880)="bc8b8c5ba91bbf7179cf23edc55f12134c7fedfefa1880aaa9c0249a3688d32b90aca664b81c67cf315788be3510581e4eb1d674e9dbbff6d5559436d62f53f8490c702291d3fe5f4fd2c3d3f0991f562517bd10d940481ea32b825163ce10629b984b54b17b5005bf81b8803c94b6c2c04877b1f4f608a4adf3c5e29860e7594dde3db88cfb40005b4ced9adf", 0x8d, 0x0, 0x0, 0x0)

[  102.348362] ip_tables: iptables: counters copy to user failed while replacing table
[  102.376573] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.2'.
13:35:01 executing program 1:
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000500)="b9ff0f005d0d698cb89e14f088a8", 0x0, 0x117, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0xffffffffffffff7a, 0x3b, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x26, 0x0, 0x0}, 0x48)

13:35:01 executing program 2:
r0 = socket$kcm(0x10, 0x2, 0x10)
perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030020000b05d25a806f8c6394f90224fc60100002400a000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0)

13:35:01 executing program 3:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000340)=@filter={'filter\x00', 0xe, 0x4, 0x4d8, 0xffffffff, 0x0, 0x190, 0x0, 0xffffffff, 0xffffffff, 0x440, 0x440, 0x440, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x9, 0x4, 0x0, 'syz1\x00'}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @common=@addrtype={{0x30}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@ipv4={'\x00', '\xff\xff', @dev}, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private0, 'macvlan0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538)
bind$inet(0xffffffffffffffff, 0x0, 0x0)
connect$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @multicast2}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x24008884, &(0x7f0000000240)={0x2, 0x4e23, @loopback}, 0x10)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0)
sendto$inet(r2, &(0x7f0000000880)="bc8b8c5ba91bbf7179cf23edc55f12134c7fedfefa1880aaa9c0249a3688d32b90aca664b81c67cf315788be3510581e4eb1d674e9dbbff6d5559436d62f53f8490c702291d3fe5f4fd2c3d3f0991f562517bd10d940481ea32b825163ce10629b984b54b17b5005bf81b8803c94b6c2c04877b1f4f608a4adf3c5e29860e7594dde3db88cfb40005b4ced9adf", 0x8d, 0x0, 0x0, 0x0)

13:35:01 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x2, 0x73)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69)
connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f)
sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4)
r1 = socket(0x40000000015, 0x5, 0x0)
bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10)
recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000040)=@pppol2tpv3, 0x80, 0x0}}], 0x1, 0x0, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
getpid()

[  102.522734] netlink: 194488 bytes leftover after parsing attributes in process `syz-executor.2'.
[  102.534070] ip_tables: iptables: counters copy to user failed while replacing table
13:35:01 executing program 1:
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000500)="b9ff0f005d0d698cb89e14f088a8", 0x0, 0x117, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0xffffffffffffff7a, 0x3b, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x26, 0x0, 0x0}, 0x48)

13:35:01 executing program 3:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000340)=@filter={'filter\x00', 0xe, 0x4, 0x4d8, 0xffffffff, 0x0, 0x190, 0x0, 0xffffffff, 0xffffffff, 0x440, 0x440, 0x440, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x9, 0x4, 0x0, 'syz1\x00'}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @common=@addrtype={{0x30}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@ipv4={'\x00', '\xff\xff', @dev}, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private0, 'macvlan0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538)
bind$inet(0xffffffffffffffff, 0x0, 0x0)
connect$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @multicast2}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x24008884, &(0x7f0000000240)={0x2, 0x4e23, @loopback}, 0x10)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0)
sendto$inet(r2, &(0x7f0000000880)="bc8b8c5ba91bbf7179cf23edc55f12134c7fedfefa1880aaa9c0249a3688d32b90aca664b81c67cf315788be3510581e4eb1d674e9dbbff6d5559436d62f53f8490c702291d3fe5f4fd2c3d3f0991f562517bd10d940481ea32b825163ce10629b984b54b17b5005bf81b8803c94b6c2c04877b1f4f608a4adf3c5e29860e7594dde3db88cfb40005b4ced9adf", 0x8d, 0x0, 0x0, 0x0)

13:35:01 executing program 2:
pipe(0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000))
ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000000c0)=0x1000)
read$dsp(r0, &(0x7f0000000780)=""/4082, 0xff2)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

13:35:01 executing program 1:
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000500)="b9ff0f005d0d698cb89e14f088a8", 0x0, 0x117, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0xffffffffffffff7a, 0x3b, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x26, 0x0, 0x0}, 0x48)

[  102.646736] ip_tables: iptables: counters copy to user failed while replacing table
13:35:02 executing program 5:
pipe(0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000))
ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000000c0)=0x1000)
read$dsp(r0, &(0x7f0000000780)=""/4082, 0xff2)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

13:35:02 executing program 3:
pipe(0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000))
ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000000c0)=0x1000)
read$dsp(r0, &(0x7f0000000780)=""/4082, 0xff2)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

13:35:02 executing program 1:
pipe(0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000))
ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000000c0)=0x1000)
read$dsp(r0, &(0x7f0000000780)=""/4082, 0xff2)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

13:35:02 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000340)=@filter={'filter\x00', 0xe, 0x4, 0x4d8, 0xffffffff, 0x0, 0x190, 0x0, 0xffffffff, 0xffffffff, 0x440, 0x440, 0x440, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x9, 0x4, 0x0, 'syz1\x00'}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @common=@addrtype={{0x30}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@ipv4={'\x00', '\xff\xff', @dev}, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private0, 'macvlan0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538)
bind$inet(0xffffffffffffffff, 0x0, 0x0)
connect$inet(r0, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r2 = socket$inet(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @multicast2}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x24008884, &(0x7f0000000240)={0x2, 0x4e23, @loopback}, 0x10)
getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0)
sendto$inet(r2, &(0x7f0000000880)="bc8b8c5ba91bbf7179cf23edc55f12134c7fedfefa1880aaa9c0249a3688d32b90aca664b81c67cf315788be3510581e4eb1d674e9dbbff6d5559436d62f53f8490c702291d3fe5f4fd2c3d3f0991f562517bd10d940481ea32b825163ce10629b984b54b17b5005bf81b8803c94b6c2c04877b1f4f608a4adf3c5e29860e7594dde3db88cfb40005b4ced9adf", 0x8d, 0x0, 0x0, 0x0)

13:35:02 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x2, 0x73)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69)
connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f)
sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4)
r1 = socket(0x40000000015, 0x5, 0x0)
bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10)
recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000040)=@pppol2tpv3, 0x80, 0x0}}], 0x1, 0x0, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
getpid()

13:35:02 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x2, 0x73)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69)
connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f)
sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4)
r1 = socket(0x40000000015, 0x5, 0x0)
bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10)
recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000040)=@pppol2tpv3, 0x80, 0x0}}], 0x1, 0x0, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
getpid()

[  103.194643] ip_tables: iptables: counters copy to user failed while replacing table
13:35:02 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x2, 0x73)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69)
connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f)
sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4)
r1 = socket(0x40000000015, 0x5, 0x0)
bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10)
recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000040)=@pppol2tpv3, 0x80, 0x0}}], 0x1, 0x0, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
getpid()

13:35:02 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x2, 0x73)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69)
connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f)
sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4)
r1 = socket(0x40000000015, 0x5, 0x0)
bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10)
recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000040)=@pppol2tpv3, 0x80, 0x0}}], 0x1, 0x0, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
getpid()

13:35:02 executing program 2:
pipe(0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000))
ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000000c0)=0x1000)
read$dsp(r0, &(0x7f0000000780)=""/4082, 0xff2)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

13:35:02 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x2, 0x73)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69)
connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f)
sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4)
r1 = socket(0x40000000015, 0x5, 0x0)
bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10)
recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000040)=@pppol2tpv3, 0x80, 0x0}}], 0x1, 0x0, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
getpid()

13:35:02 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x2, 0x73)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69)
connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f)
sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4)
r1 = socket(0x40000000015, 0x5, 0x0)
bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10)
recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000040)=@pppol2tpv3, 0x80, 0x0}}], 0x1, 0x0, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
getpid()

13:35:02 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x2, 0x73)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69)
connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f)
sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4)
r1 = socket(0x40000000015, 0x5, 0x0)
bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10)
recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000040)=@pppol2tpv3, 0x80, 0x0}}], 0x1, 0x0, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
getpid()

13:35:03 executing program 5:
pipe(0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000))
ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000000c0)=0x1000)
read$dsp(r0, &(0x7f0000000780)=""/4082, 0xff2)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

13:35:03 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x2, 0x73)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69)
connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f)
sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4)
r1 = socket(0x40000000015, 0x5, 0x0)
bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10)
recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000040)=@pppol2tpv3, 0x80, 0x0}}], 0x1, 0x0, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
getpid()

13:35:03 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x2, 0x73)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69)
connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f)
sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4)
r1 = socket(0x40000000015, 0x5, 0x0)
bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10)
recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000040)=@pppol2tpv3, 0x80, 0x0}}], 0x1, 0x0, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
getpid()

13:35:03 executing program 1:
pipe(0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000))
ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000000c0)=0x1000)
read$dsp(r0, &(0x7f0000000780)=""/4082, 0xff2)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

13:35:03 executing program 3:
pipe(0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000))
ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000000c0)=0x1000)
read$dsp(r0, &(0x7f0000000780)=""/4082, 0xff2)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

13:35:03 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x2, 0x73)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69)
connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f)
sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4)
r1 = socket(0x40000000015, 0x5, 0x0)
bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10)
recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000040)=@pppol2tpv3, 0x80, 0x0}}], 0x1, 0x0, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
getpid()

13:35:03 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x2, 0x73)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69)
connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f)
sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4)
r1 = socket(0x40000000015, 0x5, 0x0)
bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10)
recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000040)=@pppol2tpv3, 0x80, 0x0}}], 0x1, 0x0, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
getpid()

13:35:03 executing program 2:
pipe(0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000))
ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000000c0)=0x1000)
read$dsp(r0, &(0x7f0000000780)=""/4082, 0xff2)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

13:35:03 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x2, 0x73)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69)
connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f)
sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4)
r1 = socket(0x40000000015, 0x5, 0x0)
bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10)
recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000040)=@pppol2tpv3, 0x80, 0x0}}], 0x1, 0x0, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
getpid()

13:35:03 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x2, 0x73)
bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69)
connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f)
sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x1f4)
r1 = socket(0x40000000015, 0x5, 0x0)
bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10)
recvmmsg(r1, &(0x7f00000040c0)=[{{&(0x7f0000000040)=@pppol2tpv3, 0x80, 0x0}}], 0x1, 0x0, 0x0)
sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
getpid()

13:35:03 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x279740}], 0x1}, 0x0)
perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xff, 0x8, 0x81, 0x7, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x3f}, 0xa300, 0x3ff, 0x1, 0x0, 0xff, 0x5, 0x9, 0x0, 0x101, 0x0, 0x2}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000002c0)=ANY=[@ANYBLOB="05000000000000000000000000bad70000000000000000000000000001075a8ffcef662e8d161cb18b4547f6c75fb947bf9d3fd9a54d8cbd525bb76be2bf7aa05d5f7373c848db54d5b4088b1ad02bff992acfbff11ca7d60514073a2c859341d813a7b56234e020dbeceb6a4bba402853285abffbee9f3986cb16f12c0ef1a79ccc2ee93fae3aff593d823319dc14297dd2a4f167655556defb4d54bb2d3f534279ab9cc09f00a8e04f61f79b305c74d7559e31d85e9fef058c30c4d2cbc23dc29df670b3dcd8b479f1a0bb7bc0960778f27be8e8dbac1a46f221d2489440b87c9383feb65d"])
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r')
perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0)

13:35:03 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x279740}], 0x1}, 0x0)
perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xff, 0x8, 0x81, 0x7, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x3f}, 0xa300, 0x3ff, 0x1, 0x0, 0xff, 0x5, 0x9, 0x0, 0x101, 0x0, 0x2}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000002c0)=ANY=[@ANYBLOB="05000000000000000000000000bad70000000000000000000000000001075a8ffcef662e8d161cb18b4547f6c75fb947bf9d3fd9a54d8cbd525bb76be2bf7aa05d5f7373c848db54d5b4088b1ad02bff992acfbff11ca7d60514073a2c859341d813a7b56234e020dbeceb6a4bba402853285abffbee9f3986cb16f12c0ef1a79ccc2ee93fae3aff593d823319dc14297dd2a4f167655556defb4d54bb2d3f534279ab9cc09f00a8e04f61f79b305c74d7559e31d85e9fef058c30c4d2cbc23dc29df670b3dcd8b479f1a0bb7bc0960778f27be8e8dbac1a46f221d2489440b87c9383feb65d"])
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r')
perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0)

[  104.349116] device lo entered promiscuous mode
13:35:03 executing program 4:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x279740}], 0x1}, 0x0)
perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xff, 0x8, 0x81, 0x7, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x3f}, 0xa300, 0x3ff, 0x1, 0x0, 0xff, 0x5, 0x9, 0x0, 0x101, 0x0, 0x2}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000002c0)=ANY=[@ANYBLOB="05000000000000000000000000bad70000000000000000000000000001075a8ffcef662e8d161cb18b4547f6c75fb947bf9d3fd9a54d8cbd525bb76be2bf7aa05d5f7373c848db54d5b4088b1ad02bff992acfbff11ca7d60514073a2c859341d813a7b56234e020dbeceb6a4bba402853285abffbee9f3986cb16f12c0ef1a79ccc2ee93fae3aff593d823319dc14297dd2a4f167655556defb4d54bb2d3f534279ab9cc09f00a8e04f61f79b305c74d7559e31d85e9fef058c30c4d2cbc23dc29df670b3dcd8b479f1a0bb7bc0960778f27be8e8dbac1a46f221d2489440b87c9383feb65d"])
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r')
perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0)

13:35:03 executing program 3:
pipe(0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000))
ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000000c0)=0x1000)
read$dsp(r0, &(0x7f0000000780)=""/4082, 0xff2)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

13:35:03 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x279740}], 0x1}, 0x0)
perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xff, 0x8, 0x81, 0x7, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x3f}, 0xa300, 0x3ff, 0x1, 0x0, 0xff, 0x5, 0x9, 0x0, 0x101, 0x0, 0x2}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000002c0)=ANY=[@ANYBLOB="05000000000000000000000000bad70000000000000000000000000001075a8ffcef662e8d161cb18b4547f6c75fb947bf9d3fd9a54d8cbd525bb76be2bf7aa05d5f7373c848db54d5b4088b1ad02bff992acfbff11ca7d60514073a2c859341d813a7b56234e020dbeceb6a4bba402853285abffbee9f3986cb16f12c0ef1a79ccc2ee93fae3aff593d823319dc14297dd2a4f167655556defb4d54bb2d3f534279ab9cc09f00a8e04f61f79b305c74d7559e31d85e9fef058c30c4d2cbc23dc29df670b3dcd8b479f1a0bb7bc0960778f27be8e8dbac1a46f221d2489440b87c9383feb65d"])
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r')
perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0)

13:35:03 executing program 1:
pipe(0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000))
ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000000c0)=0x1000)
read$dsp(r0, &(0x7f0000000780)=""/4082, 0xff2)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

13:35:03 executing program 5:
r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x2800)
readv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/111, 0x6f}], 0x1)

13:35:03 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x279740}], 0x1}, 0x0)
perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xff, 0x8, 0x81, 0x7, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x3f}, 0xa300, 0x3ff, 0x1, 0x0, 0xff, 0x5, 0x9, 0x0, 0x101, 0x0, 0x2}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000002c0)=ANY=[@ANYBLOB="05000000000000000000000000bad70000000000000000000000000001075a8ffcef662e8d161cb18b4547f6c75fb947bf9d3fd9a54d8cbd525bb76be2bf7aa05d5f7373c848db54d5b4088b1ad02bff992acfbff11ca7d60514073a2c859341d813a7b56234e020dbeceb6a4bba402853285abffbee9f3986cb16f12c0ef1a79ccc2ee93fae3aff593d823319dc14297dd2a4f167655556defb4d54bb2d3f534279ab9cc09f00a8e04f61f79b305c74d7559e31d85e9fef058c30c4d2cbc23dc29df670b3dcd8b479f1a0bb7bc0960778f27be8e8dbac1a46f221d2489440b87c9383feb65d"])
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r')
perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0)

13:35:03 executing program 5:
r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x2800)
readv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/111, 0x6f}], 0x1)

[  104.735962] device lo entered promiscuous mode
13:35:03 executing program 0:
r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x2800)
readv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/111, 0x6f}], 0x1)

13:35:03 executing program 5:
r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x2800)
readv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/111, 0x6f}], 0x1)

13:35:03 executing program 4:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x279740}], 0x1}, 0x0)
perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xff, 0x8, 0x81, 0x7, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x3f}, 0xa300, 0x3ff, 0x1, 0x0, 0xff, 0x5, 0x9, 0x0, 0x101, 0x0, 0x2}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000002c0)=ANY=[@ANYBLOB="05000000000000000000000000bad70000000000000000000000000001075a8ffcef662e8d161cb18b4547f6c75fb947bf9d3fd9a54d8cbd525bb76be2bf7aa05d5f7373c848db54d5b4088b1ad02bff992acfbff11ca7d60514073a2c859341d813a7b56234e020dbeceb6a4bba402853285abffbee9f3986cb16f12c0ef1a79ccc2ee93fae3aff593d823319dc14297dd2a4f167655556defb4d54bb2d3f534279ab9cc09f00a8e04f61f79b305c74d7559e31d85e9fef058c30c4d2cbc23dc29df670b3dcd8b479f1a0bb7bc0960778f27be8e8dbac1a46f221d2489440b87c9383feb65d"])
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r')
perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0)

13:35:03 executing program 2:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0)
setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
r0 = socket$netlink(0x10, 0x3, 0x4)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800)
chdir(&(0x7f0000000000)='./file1\x00')
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$cgroup_int(r3, &(0x7f0000000200), 0xf000)
sendfile(r3, r4, 0x0, 0xf03b2900)
sendfile(r3, r2, 0x0, 0x8000000000004)

13:35:03 executing program 5:
r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x2800)
readv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/111, 0x6f}], 0x1)

13:35:04 executing program 4:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x279740}], 0x1}, 0x0)
perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xff, 0x8, 0x81, 0x7, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x3f}, 0xa300, 0x3ff, 0x1, 0x0, 0xff, 0x5, 0x9, 0x0, 0x101, 0x0, 0x2}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000002c0)=ANY=[@ANYBLOB="05000000000000000000000000bad70000000000000000000000000001075a8ffcef662e8d161cb18b4547f6c75fb947bf9d3fd9a54d8cbd525bb76be2bf7aa05d5f7373c848db54d5b4088b1ad02bff992acfbff11ca7d60514073a2c859341d813a7b56234e020dbeceb6a4bba402853285abffbee9f3986cb16f12c0ef1a79ccc2ee93fae3aff593d823319dc14297dd2a4f167655556defb4d54bb2d3f534279ab9cc09f00a8e04f61f79b305c74d7559e31d85e9fef058c30c4d2cbc23dc29df670b3dcd8b479f1a0bb7bc0960778f27be8e8dbac1a46f221d2489440b87c9383feb65d"])
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r')
perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0)

13:35:04 executing program 0:
r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x2800)
readv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/111, 0x6f}], 0x1)

13:35:04 executing program 5:
r0 = socket$phonet_pipe(0x23, 0x5, 0x2)
ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000180))

13:35:04 executing program 4:
r0 = syz_open_dev$vivid(&(0x7f0000000b80), 0x1, 0x2)
ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000000)={0x2})

13:35:04 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r0, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000280)=0x27fe, 0x4)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='scalable\x00', 0x9)
sendmsg$inet(r2, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0)
recvmsg(r2, &(0x7f0000000580)={0x0, 0x5, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700)

13:35:04 executing program 0:
r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x2800)
readv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/111, 0x6f}], 0x1)

13:35:04 executing program 1:
syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000180)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x230140, 0x0)
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
mknod$loop(0x0, 0x0, 0x1)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
fanotify_init(0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)

13:35:04 executing program 5:
r0 = socket$phonet_pipe(0x23, 0x5, 0x2)
ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000180))

13:35:04 executing program 4:
r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x34dbb26f, 0x0)
ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68f0eb81b4c7f54e}})

13:35:04 executing program 0:
syz_emit_ethernet(0x82, &(0x7f0000000500)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "63a4e4", 0x4c, 0x2c, 0x0, @remote, @mcast2, {[@hopopts={0x2c}]}}}}}, 0x0)

13:35:04 executing program 5:
r0 = socket$phonet_pipe(0x23, 0x5, 0x2)
ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000180))

13:35:04 executing program 4:
r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x34dbb26f, 0x0)
ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68f0eb81b4c7f54e}})

13:35:04 executing program 0:
syz_emit_ethernet(0x82, &(0x7f0000000500)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "63a4e4", 0x4c, 0x2c, 0x0, @remote, @mcast2, {[@hopopts={0x2c}]}}}}}, 0x0)

13:35:04 executing program 2:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0)
setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
r0 = socket$netlink(0x10, 0x3, 0x4)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800)
chdir(&(0x7f0000000000)='./file1\x00')
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$cgroup_int(r3, &(0x7f0000000200), 0xf000)
sendfile(r3, r4, 0x0, 0xf03b2900)
sendfile(r3, r2, 0x0, 0x8000000000004)

13:35:04 executing program 4:
r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x34dbb26f, 0x0)
ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68f0eb81b4c7f54e}})

13:35:04 executing program 5:
r0 = socket$phonet_pipe(0x23, 0x5, 0x2)
ioctl$SIOCPNGETOBJECT(r0, 0x89e0, &(0x7f0000000180))

13:35:05 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0)
setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
r0 = socket$netlink(0x10, 0x3, 0x4)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800)
chdir(&(0x7f0000000000)='./file1\x00')
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$cgroup_int(r3, &(0x7f0000000200), 0xf000)
sendfile(r3, r4, 0x0, 0xf03b2900)
sendfile(r3, r2, 0x0, 0x8000000000004)

13:35:05 executing program 0:
syz_emit_ethernet(0x82, &(0x7f0000000500)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "63a4e4", 0x4c, 0x2c, 0x0, @remote, @mcast2, {[@hopopts={0x2c}]}}}}}, 0x0)

13:35:05 executing program 1:
syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000180)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x230140, 0x0)
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
mknod$loop(0x0, 0x0, 0x1)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
fanotify_init(0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)

13:35:05 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r0, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000280)=0x27fe, 0x4)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='scalable\x00', 0x9)
sendmsg$inet(r2, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0)
recvmsg(r2, &(0x7f0000000580)={0x0, 0x5, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700)

13:35:05 executing program 4:
r0 = syz_open_dev$video4linux(&(0x7f0000000000), 0x34dbb26f, 0x0)
ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x68f0eb81b4c7f54e}})

13:35:05 executing program 0:
syz_emit_ethernet(0x82, &(0x7f0000000500)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "63a4e4", 0x4c, 0x2c, 0x0, @remote, @mcast2, {[@hopopts={0x2c}]}}}}}, 0x0)

13:35:05 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r0, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000280)=0x27fe, 0x4)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='scalable\x00', 0x9)
sendmsg$inet(r2, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0)
recvmsg(r2, &(0x7f0000000580)={0x0, 0x5, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700)

13:35:05 executing program 0:
syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000180)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x230140, 0x0)
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
mknod$loop(0x0, 0x0, 0x1)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
fanotify_init(0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)

13:35:05 executing program 2:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0)
setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
r0 = socket$netlink(0x10, 0x3, 0x4)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800)
chdir(&(0x7f0000000000)='./file1\x00')
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$cgroup_int(r3, &(0x7f0000000200), 0xf000)
sendfile(r3, r4, 0x0, 0xf03b2900)
sendfile(r3, r2, 0x0, 0x8000000000004)

13:35:05 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0)
setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
r0 = socket$netlink(0x10, 0x3, 0x4)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800)
chdir(&(0x7f0000000000)='./file1\x00')
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$cgroup_int(r3, &(0x7f0000000200), 0xf000)
sendfile(r3, r4, 0x0, 0xf03b2900)
sendfile(r3, r2, 0x0, 0x8000000000004)

13:35:05 executing program 1:
syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000180)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x230140, 0x0)
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
mknod$loop(0x0, 0x0, 0x1)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
fanotify_init(0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)

13:35:06 executing program 0:
syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000180)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x230140, 0x0)
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
mknod$loop(0x0, 0x0, 0x1)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
fanotify_init(0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)

13:35:06 executing program 2:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0)
setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
r0 = socket$netlink(0x10, 0x3, 0x4)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800)
chdir(&(0x7f0000000000)='./file1\x00')
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$cgroup_int(r3, &(0x7f0000000200), 0xf000)
sendfile(r3, r4, 0x0, 0xf03b2900)
sendfile(r3, r2, 0x0, 0x8000000000004)

13:35:06 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r0, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000280)=0x27fe, 0x4)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='scalable\x00', 0x9)
sendmsg$inet(r2, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0)
recvmsg(r2, &(0x7f0000000580)={0x0, 0x5, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700)

13:35:06 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r0, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000280)=0x27fe, 0x4)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='scalable\x00', 0x9)
sendmsg$inet(r2, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0)
recvmsg(r2, &(0x7f0000000580)={0x0, 0x5, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700)

13:35:06 executing program 0:
syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000180)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x230140, 0x0)
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
mknod$loop(0x0, 0x0, 0x1)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
fanotify_init(0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)

13:35:06 executing program 1:
syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000180)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x230140, 0x0)
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
mknod$loop(0x0, 0x0, 0x1)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
fanotify_init(0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)

13:35:07 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0)
setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
r0 = socket$netlink(0x10, 0x3, 0x4)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800)
chdir(&(0x7f0000000000)='./file1\x00')
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$cgroup_int(r3, &(0x7f0000000200), 0xf000)
sendfile(r3, r4, 0x0, 0xf03b2900)
sendfile(r3, r2, 0x0, 0x8000000000004)

13:35:07 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r0, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000280)=0x27fe, 0x4)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='scalable\x00', 0x9)
sendmsg$inet(r2, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0)
recvmsg(r2, &(0x7f0000000580)={0x0, 0x5, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700)

13:35:07 executing program 1:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0)
setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
r0 = socket$netlink(0x10, 0x3, 0x4)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800)
chdir(&(0x7f0000000000)='./file1\x00')
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$cgroup_int(r3, &(0x7f0000000200), 0xf000)
sendfile(r3, r4, 0x0, 0xf03b2900)
sendfile(r3, r2, 0x0, 0x8000000000004)

13:35:07 executing program 0:
syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000180)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x230140, 0x0)
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
mknod$loop(0x0, 0x0, 0x1)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
fanotify_init(0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)

13:35:07 executing program 2:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0)
setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
r0 = socket$netlink(0x10, 0x3, 0x4)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800)
chdir(&(0x7f0000000000)='./file1\x00')
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$cgroup_int(r3, &(0x7f0000000200), 0xf000)
sendfile(r3, r4, 0x0, 0xf03b2900)
sendfile(r3, r2, 0x0, 0x8000000000004)

13:35:07 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r0, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000280)=0x27fe, 0x4)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10)
setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000002c0)='scalable\x00', 0x9)
sendmsg$inet(r2, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0)
recvmsg(r2, &(0x7f0000000580)={0x0, 0x5, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700)

13:35:07 executing program 1:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0)
setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
r0 = socket$netlink(0x10, 0x3, 0x4)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800)
chdir(&(0x7f0000000000)='./file1\x00')
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$cgroup_int(r3, &(0x7f0000000200), 0xf000)
sendfile(r3, r4, 0x0, 0xf03b2900)
sendfile(r3, r2, 0x0, 0x8000000000004)

13:35:07 executing program 2:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0)
setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
r0 = socket$netlink(0x10, 0x3, 0x4)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800)
chdir(&(0x7f0000000000)='./file1\x00')
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$cgroup_int(r3, &(0x7f0000000200), 0xf000)
sendfile(r3, r4, 0x0, 0xf03b2900)
sendfile(r3, r2, 0x0, 0x8000000000004)

13:35:08 executing program 0:
syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000180)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x230140, 0x0)
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
mknod$loop(0x0, 0x0, 0x1)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
fanotify_init(0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)

13:35:08 executing program 5:
r0 = socket$l2tp(0x2, 0x2, 0x73)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1d0, 0xffffffff, 0xffffffff, 0x1d0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@ip={@loopback, @local, 0x0, 0x0, 'rose0\x00', 'ip6_vti0\x00'}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x280)

13:35:08 executing program 4:
r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)='user\x00')

13:35:08 executing program 4:
r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)='user\x00')

13:35:08 executing program 5:
r0 = socket$l2tp(0x2, 0x2, 0x73)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1d0, 0xffffffff, 0xffffffff, 0x1d0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@ip={@loopback, @local, 0x0, 0x0, 'rose0\x00', 'ip6_vti0\x00'}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x280)

13:35:08 executing program 0:
syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000180)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
chdir(&(0x7f0000000000)='./file1\x00')
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0)
openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x230140, 0x0)
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
mknod$loop(0x0, 0x0, 0x1)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0)
fanotify_init(0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002)

13:35:08 executing program 4:
r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)='user\x00')

13:35:08 executing program 3:
r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)='user\x00')

13:35:08 executing program 5:
r0 = socket$l2tp(0x2, 0x2, 0x73)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1d0, 0xffffffff, 0xffffffff, 0x1d0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@ip={@loopback, @local, 0x0, 0x0, 'rose0\x00', 'ip6_vti0\x00'}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x280)

13:35:08 executing program 3:
r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)='user\x00')

13:35:08 executing program 1:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0)
setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
r0 = socket$netlink(0x10, 0x3, 0x4)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800)
chdir(&(0x7f0000000000)='./file1\x00')
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$cgroup_int(r3, &(0x7f0000000200), 0xf000)
sendfile(r3, r4, 0x0, 0xf03b2900)
sendfile(r3, r2, 0x0, 0x8000000000004)

[  109.662698] syz-executor.1 (10656) used greatest stack depth: 24600 bytes left
13:35:09 executing program 2:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003600)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0)
setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000000), 0x10)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[])
r0 = socket$netlink(0x10, 0x3, 0x4)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x14000800)
chdir(&(0x7f0000000000)='./file1\x00')
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0)
write$cgroup_int(r3, &(0x7f0000000200), 0xf000)
sendfile(r3, r4, 0x0, 0xf03b2900)
sendfile(r3, r2, 0x0, 0x8000000000004)

13:35:09 executing program 5:
r0 = socket$l2tp(0x2, 0x2, 0x73)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1d0, 0xffffffff, 0xffffffff, 0x1d0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@ip={@loopback, @local, 0x0, 0x0, 'rose0\x00', 'ip6_vti0\x00'}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x280)

13:35:09 executing program 3:
r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)='user\x00')

13:35:09 executing program 4:
r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)='user\x00')

13:35:09 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$TCSBRK(r0, 0x5409, 0x0)

13:35:09 executing program 5:
r0 = socket$inet_sctp(0x2, 0x5, 0x84)
sendmmsg$inet(r0, &(0x7f000000be80)=[{{&(0x7f00000045c0)={0x2, 0x0, @remote}, 0x10, &(0x7f0000006900)=[{&(0x7f0000004640)="a2", 0x1}], 0x1}}, {{&(0x7f00000069c0)={0x2, 0x0, @empty}, 0x10, 0x0}}], 0x2, 0x0)

13:35:09 executing program 4:
sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, 0x0, 0x40)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
creat(&(0x7f0000000080)='./bus\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000040)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)

13:35:09 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$TCSBRK(r0, 0x5409, 0x0)

13:35:09 executing program 5:
r0 = socket$inet_sctp(0x2, 0x5, 0x84)
sendmmsg$inet(r0, &(0x7f000000be80)=[{{&(0x7f00000045c0)={0x2, 0x0, @remote}, 0x10, &(0x7f0000006900)=[{&(0x7f0000004640)="a2", 0x1}], 0x1}}, {{&(0x7f00000069c0)={0x2, 0x0, @empty}, 0x10, 0x0}}], 0x2, 0x0)

13:35:09 executing program 0:
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000040))
fcntl$notify(r1, 0x402, 0xe3348cf9415ac3)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640))
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x5, 0xff, 0x0, 0x0, 0x0, 0x6, 0x22008, 0xd, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x991, 0x10000}, 0x0, 0x2, 0xdf0e, 0x5, 0x81, 0x10000, 0x8001, 0x0, 0x7ff, 0x0, 0x7f}, 0x0, 0x8, 0xffffffffffffffff, 0x2)
sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x35288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8}]}, 0x84}}, 0x0)

13:35:09 executing program 5:
r0 = socket$inet_sctp(0x2, 0x5, 0x84)
sendmmsg$inet(r0, &(0x7f000000be80)=[{{&(0x7f00000045c0)={0x2, 0x0, @remote}, 0x10, &(0x7f0000006900)=[{&(0x7f0000004640)="a2", 0x1}], 0x1}}, {{&(0x7f00000069c0)={0x2, 0x0, @empty}, 0x10, 0x0}}], 0x2, 0x0)

13:35:09 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$TCSBRK(r0, 0x5409, 0x0)

13:35:10 executing program 0:
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000040))
fcntl$notify(r1, 0x402, 0xe3348cf9415ac3)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640))
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x5, 0xff, 0x0, 0x0, 0x0, 0x6, 0x22008, 0xd, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x991, 0x10000}, 0x0, 0x2, 0xdf0e, 0x5, 0x81, 0x10000, 0x8001, 0x0, 0x7ff, 0x0, 0x7f}, 0x0, 0x8, 0xffffffffffffffff, 0x2)
sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x35288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8}]}, 0x84}}, 0x0)

13:35:10 executing program 5:
r0 = socket$inet_sctp(0x2, 0x5, 0x84)
sendmmsg$inet(r0, &(0x7f000000be80)=[{{&(0x7f00000045c0)={0x2, 0x0, @remote}, 0x10, &(0x7f0000006900)=[{&(0x7f0000004640)="a2", 0x1}], 0x1}}, {{&(0x7f00000069c0)={0x2, 0x0, @empty}, 0x10, 0x0}}], 0x2, 0x0)

13:35:10 executing program 1:
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000040))
fcntl$notify(r1, 0x402, 0xe3348cf9415ac3)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640))
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x5, 0xff, 0x0, 0x0, 0x0, 0x6, 0x22008, 0xd, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x991, 0x10000}, 0x0, 0x2, 0xdf0e, 0x5, 0x81, 0x10000, 0x8001, 0x0, 0x7ff, 0x0, 0x7f}, 0x0, 0x8, 0xffffffffffffffff, 0x2)
sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x35288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8}]}, 0x84}}, 0x0)

13:35:10 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$TCSBRK(r0, 0x5409, 0x0)

13:35:10 executing program 4:
sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, 0x0, 0x40)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
creat(&(0x7f0000000080)='./bus\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000040)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)

13:35:10 executing program 2:
sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, 0x0, 0x40)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
creat(&(0x7f0000000080)='./bus\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000040)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)

13:35:10 executing program 0:
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000040))
fcntl$notify(r1, 0x402, 0xe3348cf9415ac3)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640))
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x5, 0xff, 0x0, 0x0, 0x0, 0x6, 0x22008, 0xd, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x991, 0x10000}, 0x0, 0x2, 0xdf0e, 0x5, 0x81, 0x10000, 0x8001, 0x0, 0x7ff, 0x0, 0x7f}, 0x0, 0x8, 0xffffffffffffffff, 0x2)
sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x35288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8}]}, 0x84}}, 0x0)

13:35:10 executing program 3:
sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, 0x0, 0x40)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
creat(&(0x7f0000000080)='./bus\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000040)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)

13:35:10 executing program 5:
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x50}}, 0x0)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0)
syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff)

13:35:10 executing program 1:
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000040))
fcntl$notify(r1, 0x402, 0xe3348cf9415ac3)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640))
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x5, 0xff, 0x0, 0x0, 0x0, 0x6, 0x22008, 0xd, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x991, 0x10000}, 0x0, 0x2, 0xdf0e, 0x5, 0x81, 0x10000, 0x8001, 0x0, 0x7ff, 0x0, 0x7f}, 0x0, 0x8, 0xffffffffffffffff, 0x2)
sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x35288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8}]}, 0x84}}, 0x0)

13:35:10 executing program 0:
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000040))
fcntl$notify(r1, 0x402, 0xe3348cf9415ac3)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640))
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x5, 0xff, 0x0, 0x0, 0x0, 0x6, 0x22008, 0xd, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x991, 0x10000}, 0x0, 0x2, 0xdf0e, 0x5, 0x81, 0x10000, 0x8001, 0x0, 0x7ff, 0x0, 0x7f}, 0x0, 0x8, 0xffffffffffffffff, 0x2)
sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x35288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8}]}, 0x84}}, 0x0)

13:35:10 executing program 1:
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000040))
fcntl$notify(r1, 0x402, 0xe3348cf9415ac3)
ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640))
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x5, 0xff, 0x0, 0x0, 0x0, 0x6, 0x22008, 0xd, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3f, 0x2, @perf_config_ext={0x991, 0x10000}, 0x0, 0x2, 0xdf0e, 0x5, 0x81, 0x10000, 0x8001, 0x0, 0x7ff, 0x0, 0x7f}, 0x0, 0x8, 0xffffffffffffffff, 0x2)
sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={0x0, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x0)
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001bc0)=@newlink={0x84, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x35288}, [@IFLA_LINKINFO={0x5c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x4c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8}]}, 0x84}}, 0x0)

13:35:10 executing program 5:
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x50}}, 0x0)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0)
syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff)

13:35:10 executing program 5:
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x50}}, 0x0)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0)
syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff)

13:35:10 executing program 0:
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x50}}, 0x0)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0)
syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff)

13:35:10 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x0, 0x1})

13:35:10 executing program 4:
sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, 0x0, 0x40)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
creat(&(0x7f0000000080)='./bus\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000040)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)

13:35:11 executing program 2:
sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, 0x0, 0x40)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
creat(&(0x7f0000000080)='./bus\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000040)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)

13:35:11 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x0, 0x1})

13:35:11 executing program 5:
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x50}}, 0x0)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0)
syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff)

13:35:11 executing program 0:
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x50}}, 0x0)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0)
syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff)

13:35:11 executing program 4:
sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, 0x0, 0x40)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
creat(&(0x7f0000000080)='./bus\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000040)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)

13:35:11 executing program 3:
sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, 0x0, 0x40)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
creat(&(0x7f0000000080)='./bus\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000040)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)

13:35:11 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x0, 0x1})

13:35:11 executing program 0:
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x50, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x50}}, 0x0)
sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0)
syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff)

13:35:11 executing program 5:
r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0)
read$FUSE(r0, 0x0, 0xb5)

13:35:11 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x0, 0x1})

13:35:11 executing program 5:
r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0)
read$FUSE(r0, 0x0, 0xb5)

13:35:11 executing program 1:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1)
ioctl$TCFLSH(r0, 0x89f2, 0x20000000)

13:35:12 executing program 2:
sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, 0x0, 0x40)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
creat(&(0x7f0000000080)='./bus\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000040)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)

13:35:12 executing program 5:
r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0)
read$FUSE(r0, 0x0, 0xb5)

13:35:12 executing program 0:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x0, 0x0, 0x1300})

13:35:12 executing program 1:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1)
ioctl$TCFLSH(r0, 0x89f2, 0x20000000)

13:35:12 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)
r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2)
ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000100)=@mmap={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9ff7b91a"}})
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0)
mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x130, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000c40)={0x0, 0x80, 0x0, 0x1, 0x7f, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0xc)
syz_emit_ethernet(0x4e, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb8100100086dd6000000000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22eeb9a7b62f5907a08dd87196fab89e229d038b484db80fce864b64d137596f78c4a33dd25add9aaa4637ac08efb8cefe60f4409bc5f4b6e2bceaafadbce481f5ea2de9555376d1111ca65bf593700c0d9a39fe7494e4c1602aa6543563ea0f1e736c2bdccee5042bd60b14e1b3f46191abf0d43c98ba3e6c84d28e4b6b2dd34b51c639de3b49fd011aeca0805d6e795160eb14cd3831a81c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c20000907800"], 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4)
r1 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[])
socket$kcm(0xa, 0x2, 0x73)
openat(r1, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0)

13:35:12 executing program 3:
sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, 0x0, 0x40)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1)
creat(&(0x7f0000000080)='./bus\x00', 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000040)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)

13:35:12 executing program 0:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x0, 0x0, 0x1300})

13:35:12 executing program 5:
r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0)
read$FUSE(r0, 0x0, 0xb5)

13:35:13 executing program 1:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1)
ioctl$TCFLSH(r0, 0x89f2, 0x20000000)

[  113.875441] cramfs: Error -3 while decompressing!
13:35:13 executing program 5:
setresgid(0xee01, 0xffffffffffffffff, 0xee01)
r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
setregid(0x0, 0x0)
prlimit64(r0, 0x0, 0x0, 0x0)

13:35:13 executing program 0:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x0, 0x0, 0x1300})

[  113.912647] cramfs: ffffffff8bf40f78(27)->ffff88806de2c000(4096)
[  113.947781] cramfs: Error -3 while decompressing!
13:35:13 executing program 0:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x0, 0x0, 0x1300})

[  113.966932] cramfs: ffffffff8bf40f78(27)->ffff88806de2c000(4096)
[  113.992307] audit: type=1800 audit(1645709713.106:2): pid=10918 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.4" name="file0" dev="loop4" ino=244 res=0
13:35:13 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)
r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2)
ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000100)=@mmap={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9ff7b91a"}})
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0)
mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x130, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000c40)={0x0, 0x80, 0x0, 0x1, 0x7f, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0xc)
syz_emit_ethernet(0x4e, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb8100100086dd6000000000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22eeb9a7b62f5907a08dd87196fab89e229d038b484db80fce864b64d137596f78c4a33dd25add9aaa4637ac08efb8cefe60f4409bc5f4b6e2bceaafadbce481f5ea2de9555376d1111ca65bf593700c0d9a39fe7494e4c1602aa6543563ea0f1e736c2bdccee5042bd60b14e1b3f46191abf0d43c98ba3e6c84d28e4b6b2dd34b51c639de3b49fd011aeca0805d6e795160eb14cd3831a81c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c20000907800"], 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4)
r1 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[])
socket$kcm(0xa, 0x2, 0x73)
openat(r1, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0)

13:35:13 executing program 5:
setresgid(0xee01, 0xffffffffffffffff, 0xee01)
r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
setregid(0x0, 0x0)
prlimit64(r0, 0x0, 0x0, 0x0)

13:35:13 executing program 1:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1)
ioctl$TCFLSH(r0, 0x89f2, 0x20000000)

13:35:13 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)
r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2)
ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000100)=@mmap={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9ff7b91a"}})
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0)
mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x130, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000c40)={0x0, 0x80, 0x0, 0x1, 0x7f, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0xc)
syz_emit_ethernet(0x4e, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb8100100086dd6000000000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22eeb9a7b62f5907a08dd87196fab89e229d038b484db80fce864b64d137596f78c4a33dd25add9aaa4637ac08efb8cefe60f4409bc5f4b6e2bceaafadbce481f5ea2de9555376d1111ca65bf593700c0d9a39fe7494e4c1602aa6543563ea0f1e736c2bdccee5042bd60b14e1b3f46191abf0d43c98ba3e6c84d28e4b6b2dd34b51c639de3b49fd011aeca0805d6e795160eb14cd3831a81c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c20000907800"], 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4)
r1 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[])
socket$kcm(0xa, 0x2, 0x73)
openat(r1, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0)

13:35:13 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)
r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2)
ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000100)=@mmap={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9ff7b91a"}})
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0)
mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x130, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000c40)={0x0, 0x80, 0x0, 0x1, 0x7f, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0xc)
syz_emit_ethernet(0x4e, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb8100100086dd6000000000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22eeb9a7b62f5907a08dd87196fab89e229d038b484db80fce864b64d137596f78c4a33dd25add9aaa4637ac08efb8cefe60f4409bc5f4b6e2bceaafadbce481f5ea2de9555376d1111ca65bf593700c0d9a39fe7494e4c1602aa6543563ea0f1e736c2bdccee5042bd60b14e1b3f46191abf0d43c98ba3e6c84d28e4b6b2dd34b51c639de3b49fd011aeca0805d6e795160eb14cd3831a81c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c20000907800"], 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4)
r1 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[])
socket$kcm(0xa, 0x2, 0x73)
openat(r1, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0)

13:35:13 executing program 3:
setresgid(0xee01, 0xffffffffffffffff, 0xee01)
r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
setregid(0x0, 0x0)
prlimit64(r0, 0x0, 0x0, 0x0)

13:35:13 executing program 5:
setresgid(0xee01, 0xffffffffffffffff, 0xee01)
r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
setregid(0x0, 0x0)
prlimit64(r0, 0x0, 0x0, 0x0)

13:35:13 executing program 3:
setresgid(0xee01, 0xffffffffffffffff, 0xee01)
r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
setregid(0x0, 0x0)
prlimit64(r0, 0x0, 0x0, 0x0)

13:35:13 executing program 1:
r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', <r2=>0x0})
r3 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$BATADV_CMD_GET_ORIGINATORS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r0, 0xb21, 0x0, 0x0, {0x5}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0)

13:35:13 executing program 1:
r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', <r2=>0x0})
r3 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$BATADV_CMD_GET_ORIGINATORS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r0, 0xb21, 0x0, 0x0, {0x5}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0)

13:35:13 executing program 3:
setresgid(0xee01, 0xffffffffffffffff, 0xee01)
r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
setregid(0x0, 0x0)
prlimit64(r0, 0x0, 0x0, 0x0)

13:35:13 executing program 5:
setresgid(0xee01, 0xffffffffffffffff, 0xee01)
r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
setregid(0x0, 0x0)
prlimit64(r0, 0x0, 0x0, 0x0)

[  114.693392] cramfs: Error -3 while decompressing!
[  114.698519] cramfs: ffffffff8bf40f78(27)->ffff8880668c2000(4096)
[  114.744189] cramfs: Error -3 while decompressing!
[  114.759092] cramfs: ffffffff8bf40f78(27)->ffff8880668c2000(4096)
[  114.786012] cramfs: Error -3 while decompressing!
[  114.791836] cramfs: ffffffff8bf44f78(27)->ffff8880734ea000(4096)
[  114.799352] cramfs: Error -3 while decompressing!
[  114.804442] cramfs: ffffffff8bf40f78(27)->ffff8880736ba000(4096)
13:35:14 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)
r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2)
ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000100)=@mmap={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9ff7b91a"}})
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0)
mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x130, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000c40)={0x0, 0x80, 0x0, 0x1, 0x7f, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0xc)
syz_emit_ethernet(0x4e, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb8100100086dd6000000000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22eeb9a7b62f5907a08dd87196fab89e229d038b484db80fce864b64d137596f78c4a33dd25add9aaa4637ac08efb8cefe60f4409bc5f4b6e2bceaafadbce481f5ea2de9555376d1111ca65bf593700c0d9a39fe7494e4c1602aa6543563ea0f1e736c2bdccee5042bd60b14e1b3f46191abf0d43c98ba3e6c84d28e4b6b2dd34b51c639de3b49fd011aeca0805d6e795160eb14cd3831a81c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c20000907800"], 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4)
r1 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[])
socket$kcm(0xa, 0x2, 0x73)
openat(r1, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0)

13:35:14 executing program 1:
r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', <r2=>0x0})
r3 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$BATADV_CMD_GET_ORIGINATORS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r0, 0xb21, 0x0, 0x0, {0x5}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0)

13:35:14 executing program 3:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000100)={{}, 'syz1\x00', 0x1d})
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)
read(r0, &(0x7f0000000040)=""/89, 0x59)
write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfea6)
connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)

13:35:14 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000000700006b020000000000000000000002"])

[  114.822027] audit: type=1800 audit(1645709713.936:3): pid=10989 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=244 res=0
[  114.829565] cramfs: Error -3 while decompressing!
[  114.862715] cramfs: ffffffff8bf40f78(27)->ffff8880736ba000(4096)
[  114.869056] cramfs: Error -3 while decompressing!
[  114.875128] cramfs: ffffffff8bf44f78(27)->ffff8880734ea000(4096)
13:35:14 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)
r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2)
ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000100)=@mmap={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9ff7b91a"}})
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0)
mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x130, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000c40)={0x0, 0x80, 0x0, 0x1, 0x7f, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0xc)
syz_emit_ethernet(0x4e, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb8100100086dd6000000000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22eeb9a7b62f5907a08dd87196fab89e229d038b484db80fce864b64d137596f78c4a33dd25add9aaa4637ac08efb8cefe60f4409bc5f4b6e2bceaafadbce481f5ea2de9555376d1111ca65bf593700c0d9a39fe7494e4c1602aa6543563ea0f1e736c2bdccee5042bd60b14e1b3f46191abf0d43c98ba3e6c84d28e4b6b2dd34b51c639de3b49fd011aeca0805d6e795160eb14cd3831a81c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c20000907800"], 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4)
r1 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[])
socket$kcm(0xa, 0x2, 0x73)
openat(r1, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0)

13:35:14 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)
r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2)
ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000100)=@mmap={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9ff7b91a"}})
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0)
mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x130, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000c40)={0x0, 0x80, 0x0, 0x1, 0x7f, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0xc)
syz_emit_ethernet(0x4e, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb8100100086dd6000000000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22eeb9a7b62f5907a08dd87196fab89e229d038b484db80fce864b64d137596f78c4a33dd25add9aaa4637ac08efb8cefe60f4409bc5f4b6e2bceaafadbce481f5ea2de9555376d1111ca65bf593700c0d9a39fe7494e4c1602aa6543563ea0f1e736c2bdccee5042bd60b14e1b3f46191abf0d43c98ba3e6c84d28e4b6b2dd34b51c639de3b49fd011aeca0805d6e795160eb14cd3831a81c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c20000907800"], 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4)
r1 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[])
socket$kcm(0xa, 0x2, 0x73)
openat(r1, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0)

13:35:14 executing program 1:
r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', <r2=>0x0})
r3 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$BATADV_CMD_GET_ORIGINATORS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r0, 0xb21, 0x0, 0x0, {0x5}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0)

[  114.920904] audit: type=1800 audit(1645709714.006:4): pid=10993 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.4" name="file0" dev="loop4" ino=244 res=0
[  114.939646] input: syz1 as /devices/virtual/input/input5
13:35:14 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000000700006b020000000000000000000002"])

13:35:14 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000000700006b020000000000000000000002"])

[  115.014596] audit: type=1800 audit(1645709714.016:5): pid=10992 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.2" name="file0" dev="loop2" ino=244 res=0
[  115.089834] cramfs: Error -3 while decompressing!
[  115.098004] cramfs: ffffffff8bf44f78(27)->ffff888073ff8000(4096)
[  115.121337] cramfs: Error -3 while decompressing!
[  115.126232] cramfs: ffffffff8bf40f78(27)->ffff88806de36000(4096)
[  115.144643] cramfs: Error -3 while decompressing!
[  115.149553] cramfs: ffffffff8bf44f78(27)->ffff888073ff8000(4096)
13:35:14 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000000700006b020000000000000000000002"])

[  115.186080] cramfs: Error -3 while decompressing!
[  115.196217] cramfs: ffffffff8bf44f78(27)->ffff88806de36000(4096)
[  115.204065] audit: type=1800 audit(1645709714.316:6): pid=11064 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=244 res=0
[  115.219762] cramfs: Error -3 while decompressing!
[  115.226515] cramfs: ffffffff8bf40f78(27)->ffff888073a76000(4096)
13:35:14 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)
r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2)
ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000100)=@mmap={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9ff7b91a"}})
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0)
mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x130, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000c40)={0x0, 0x80, 0x0, 0x1, 0x7f, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0xc)
syz_emit_ethernet(0x4e, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb8100100086dd6000000000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22eeb9a7b62f5907a08dd87196fab89e229d038b484db80fce864b64d137596f78c4a33dd25add9aaa4637ac08efb8cefe60f4409bc5f4b6e2bceaafadbce481f5ea2de9555376d1111ca65bf593700c0d9a39fe7494e4c1602aa6543563ea0f1e736c2bdccee5042bd60b14e1b3f46191abf0d43c98ba3e6c84d28e4b6b2dd34b51c639de3b49fd011aeca0805d6e795160eb14cd3831a81c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c20000907800"], 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4)
r1 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[])
socket$kcm(0xa, 0x2, 0x73)
openat(r1, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0)

13:35:14 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000000700006b020000000000000000000002"])

13:35:14 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)
r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2)
ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000100)=@mmap={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9ff7b91a"}})
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0)
mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x130, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000c40)={0x0, 0x80, 0x0, 0x1, 0x7f, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0xc)
syz_emit_ethernet(0x4e, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb8100100086dd6000000000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22eeb9a7b62f5907a08dd87196fab89e229d038b484db80fce864b64d137596f78c4a33dd25add9aaa4637ac08efb8cefe60f4409bc5f4b6e2bceaafadbce481f5ea2de9555376d1111ca65bf593700c0d9a39fe7494e4c1602aa6543563ea0f1e736c2bdccee5042bd60b14e1b3f46191abf0d43c98ba3e6c84d28e4b6b2dd34b51c639de3b49fd011aeca0805d6e795160eb14cd3831a81c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c20000907800"], 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4)
r1 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="453dcd28001000000300000000000000436f6d7072657373656420524f4d465326336279000000000700000008000000436f6d70726573736564000000000000c0415cf968000053c0040000ed815cf964000053c30d000066696c652e636f6c64000000ed415cf928000053420b000066696c6530000000ed815cf90a0000534214000066696c6531000000ed815cf928230053c215000066696c6532000000ed815cf928230053c215000066696c6533000000ed815cf91a040053420f000066696c6530000000ffa15cf9260000534211000066696c6531000000f4000000789c2baeacca4eccc9492d2aa61d030085492b1f13010000789c2baeacca", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[])
socket$kcm(0xa, 0x2, 0x73)
openat(r1, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0)

[  115.246765] cramfs: Error -3 while decompressing!
[  115.258653] cramfs: ffffffff8bf40f78(27)->ffff888073a76000(4096)
[  115.277441] audit: type=1800 audit(1645709714.346:7): pid=11056 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.4" name="file0" dev="loop4" ino=244 res=0
13:35:14 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0)
r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x0, 0x2)
ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000100)=@mmap={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9ff7b91a"}})
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0)
mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x130, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000c40)={0x0, 0x80, 0x0, 0x1, 0x7f, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0xc)
syz_emit_ethernet(0x4e, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb8100100086dd6000000000140600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22eeb9a7b62f5907a08dd87196fab89e229d038b484db80fce864b64d137596f78c4a33dd25add9aaa4637ac08efb8cefe60f4409bc5f4b6e2bceaafadbce481f5ea2de9555376d1111ca65bf593700c0d9a39fe7494e4c1602aa6543563ea0f1e736c2bdccee5042bd60b14e1b3f46191abf0d43c98ba3e6c84d28e4b6b2dd34b51c639de3b49fd011aeca0805d6e795160eb14cd3831a81c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50c20000907800"], 0x0)
perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4)
r1 = syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1001000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0xfe}], 0x0, &(0x7f0000000340)=ANY=[])
socket$kcm(0xa, 0x2, 0x73)
openat(r1, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0)

[  115.322846] audit: type=1800 audit(1645709714.416:8): pid=11080 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.2" name="file0" dev="loop2" ino=244 res=0
[  115.432299] cramfs: Error -3 while decompressing!
[  115.452837] cramfs: ffffffff8bf40f78(27)->ffff8880734bb000(4096)
[  115.486628] cramfs: Error -3 while decompressing!
[  115.492635] cramfs: ffffffff8bf40f78(27)->ffff8880734bb000(4096)
[  115.504147] cramfs: Error -3 while decompressing!
[  115.507666] audit: type=1800 audit(1645709714.626:9): pid=11114 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.4" name="file0" dev="loop4" ino=244 res=0
[  115.515636] cramfs: ffffffff8bf40f78(27)->ffff888073605000(4096)
[  115.544515] cramfs: Error -3 while decompressing!
[  115.558010] cramfs: ffffffff8bf44f78(27)->ffff88806deef000(4096)
[  115.573101] cramfs: Error -3 while decompressing!
[  115.581722] cramfs: ffffffff8bf40f78(27)->ffff888073605000(4096)
[  115.593656] cramfs: Error -3 while decompressing!
[  115.598716] cramfs: ffffffff8bf44f78(27)->ffff88806deef000(4096)
[  115.621123] audit: type=1800 audit(1645709714.736:10): pid=11108 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="loop0" ino=244 res=0
[  115.689190] audit: type=1800 audit(1645709714.766:11): pid=11121 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.2" name="file0" dev="loop2" ino=244 res=0
13:35:14 executing program 3:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000100)={{}, 'syz1\x00', 0x1d})
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)
read(r0, &(0x7f0000000040)=""/89, 0x59)
write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfea6)
connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)

13:35:14 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000000700006b020000000000000000000002"])

13:35:14 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000000700006b020000000000000000000002"])

13:35:14 executing program 4:
r0 = syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100b, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000000140)=ANY=[])
openat$incfs(r0, &(0x7f0000000440)='.log\x00', 0x0, 0x0)

13:35:14 executing program 0:
syz_emit_ethernet(0x2a, &(0x7f0000000480)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x88, 0x0, @private, @broadcast=0xe0000001}, {0x0, 0x0, 0x2}}}}}, 0x0)

13:35:14 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc030, 0x0, 0x2}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff})
sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_deladdrlabel={0x94, 0x49, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_ADDRESS={0x14, 0x1, @empty}, @IFAL_LABEL={0x8, 0x2, 0x5}, @IFAL_ADDRESS={0x14, 0x1, @private1}, @IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @private0}, @IFAL_ADDRESS={0x14, 0x1, @loopback}]}, 0x94}, 0x1, 0x0, 0x0, 0x40884}, 0x40800)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', <r2=>0x0})
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@bridge_delneigh={0x30, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}, @NDA_VLAN={0x6, 0x5, 0x1}]}, 0x30}}, 0x0)

13:35:14 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc030, 0x0, 0x2}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff})
sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_deladdrlabel={0x94, 0x49, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_ADDRESS={0x14, 0x1, @empty}, @IFAL_LABEL={0x8, 0x2, 0x5}, @IFAL_ADDRESS={0x14, 0x1, @private1}, @IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @private0}, @IFAL_ADDRESS={0x14, 0x1, @loopback}]}, 0x94}, 0x1, 0x0, 0x0, 0x40884}, 0x40800)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', <r2=>0x0})
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@bridge_delneigh={0x30, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}, @NDA_VLAN={0x6, 0x5, 0x1}]}, 0x30}}, 0x0)

13:35:14 executing program 0:
syz_emit_ethernet(0x2a, &(0x7f0000000480)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x88, 0x0, @private, @broadcast=0xe0000001}, {0x0, 0x0, 0x2}}}}}, 0x0)

13:35:15 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc030, 0x0, 0x2}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff})
sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_deladdrlabel={0x94, 0x49, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_ADDRESS={0x14, 0x1, @empty}, @IFAL_LABEL={0x8, 0x2, 0x5}, @IFAL_ADDRESS={0x14, 0x1, @private1}, @IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @private0}, @IFAL_ADDRESS={0x14, 0x1, @loopback}]}, 0x94}, 0x1, 0x0, 0x0, 0x40884}, 0x40800)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', <r2=>0x0})
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@bridge_delneigh={0x30, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}, @NDA_VLAN={0x6, 0x5, 0x1}]}, 0x30}}, 0x0)

[  115.832468] input: syz1 as /devices/virtual/input/input6
13:35:15 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc030, 0x0, 0x2}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff})
sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_deladdrlabel={0x94, 0x49, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_ADDRESS={0x14, 0x1, @empty}, @IFAL_LABEL={0x8, 0x2, 0x5}, @IFAL_ADDRESS={0x14, 0x1, @private1}, @IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @private0}, @IFAL_ADDRESS={0x14, 0x1, @loopback}]}, 0x94}, 0x1, 0x0, 0x0, 0x40884}, 0x40800)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', <r2=>0x0})
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@bridge_delneigh={0x30, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}, @NDA_VLAN={0x6, 0x5, 0x1}]}, 0x30}}, 0x0)

13:35:15 executing program 0:
syz_emit_ethernet(0x2a, &(0x7f0000000480)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x88, 0x0, @private, @broadcast=0xe0000001}, {0x0, 0x0, 0x2}}}}}, 0x0)

[  115.892649] SQUASHFS error: zlib decompression failed, data probably corrupt
13:35:15 executing program 1:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000100)={{}, 'syz1\x00', 0x1d})
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)
read(r0, &(0x7f0000000040)=""/89, 0x59)
write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfea6)
connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)

[  115.936587] SQUASHFS error: squashfs_read_data failed to read block 0x13e
[  115.954986] SQUASHFS error: Unable to read metadata cache entry [13e]
[  115.984077] input: syz1 as /devices/virtual/input/input7
[  115.994425] SQUASHFS error: Unable to read directory block [13e:26]
13:35:15 executing program 3:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000100)={{}, 'syz1\x00', 0x1d})
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)
read(r0, &(0x7f0000000040)=""/89, 0x59)
write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfea6)
connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)

13:35:15 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc030, 0x0, 0x2}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff})
sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_deladdrlabel={0x94, 0x49, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_ADDRESS={0x14, 0x1, @empty}, @IFAL_LABEL={0x8, 0x2, 0x5}, @IFAL_ADDRESS={0x14, 0x1, @private1}, @IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @private0}, @IFAL_ADDRESS={0x14, 0x1, @loopback}]}, 0x94}, 0x1, 0x0, 0x0, 0x40884}, 0x40800)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', <r2=>0x0})
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@bridge_delneigh={0x30, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}, @NDA_VLAN={0x6, 0x5, 0x1}]}, 0x30}}, 0x0)

13:35:15 executing program 2:
r0 = socket$netlink(0x10, 0x3, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc030, 0x0, 0x2}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff})
sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_deladdrlabel={0x94, 0x49, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_ADDRESS={0x14, 0x1, @empty}, @IFAL_LABEL={0x8, 0x2, 0x5}, @IFAL_ADDRESS={0x14, 0x1, @private1}, @IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @private0}, @IFAL_ADDRESS={0x14, 0x1, @loopback}]}, 0x94}, 0x1, 0x0, 0x0, 0x40884}, 0x40800)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', <r2=>0x0})
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@bridge_delneigh={0x30, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}, @NDA_VLAN={0x6, 0x5, 0x1}]}, 0x30}}, 0x0)

13:35:15 executing program 0:
syz_emit_ethernet(0x2a, &(0x7f0000000480)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x88, 0x0, @private, @broadcast=0xe0000001}, {0x0, 0x0, 0x2}}}}}, 0x0)

13:35:15 executing program 4:
r0 = syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100b, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000000140)=ANY=[])
openat$incfs(r0, &(0x7f0000000440)='.log\x00', 0x0, 0x0)

13:35:15 executing program 2:
syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x2a, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback=0xac1414aa, @local}}}}}}, 0x0)

[  116.675689] input: syz1 as /devices/virtual/input/input8
[  116.687211] SQUASHFS error: zlib decompression failed, data probably corrupt
[  116.696354] SQUASHFS error: squashfs_read_data failed to read block 0x13e
13:35:15 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc030, 0x0, 0x2}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={<r1=>0xffffffffffffffff})
sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_deladdrlabel={0x94, 0x49, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_LABEL={0x8, 0x2, 0xc}, @IFAL_ADDRESS={0x14, 0x1, @empty}, @IFAL_LABEL={0x8, 0x2, 0x5}, @IFAL_ADDRESS={0x14, 0x1, @private1}, @IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @private0}, @IFAL_ADDRESS={0x14, 0x1, @loopback}]}, 0x94}, 0x1, 0x0, 0x0, 0x40884}, 0x40800)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', <r2=>0x0})
sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@bridge_delneigh={0x30, 0x1d, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@NDA_LLADDR={0xa, 0x2, @dev}, @NDA_VLAN={0x6, 0x5, 0x1}]}, 0x30}}, 0x0)

13:35:15 executing program 0:
r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0)
ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000140)=0xa0000)
ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000000)={@local})
ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r0, 0x7a9, &(0x7f0000000040)={{@any, 0xffffffff}, @my=0x0})

13:35:15 executing program 0:
r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0)
ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000140)=0xa0000)
ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000000)={@local})
ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r0, 0x7a9, &(0x7f0000000040)={{@any, 0xffffffff}, @my=0x0})

[  116.723636] SQUASHFS error: Unable to read metadata cache entry [13e]
[  116.745897] SQUASHFS error: Unable to read directory block [13e:26]
13:35:15 executing program 2:
syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x2a, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback=0xac1414aa, @local}}}}}}, 0x0)

13:35:15 executing program 5:
perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xac, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000003080)={{}, 0x0, 0x0, @unused, @subvolid=0x9})
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x20)
r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/anycast6\x00')
perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, 0x0)
socket$inet6(0xa, 0x0, 0x0)
preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0, 0x0)

13:35:15 executing program 1:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000100)={{}, 'syz1\x00', 0x1d})
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)
read(r0, &(0x7f0000000040)=""/89, 0x59)
write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfea6)
connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)

[  116.877993] input: syz1 as /devices/virtual/input/input9
13:35:16 executing program 3:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000100)={{}, 'syz1\x00', 0x1d})
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)
read(r0, &(0x7f0000000040)=""/89, 0x59)
write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfea6)
connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)

13:35:16 executing program 4:
r0 = syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100b, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000000140)=ANY=[])
openat$incfs(r0, &(0x7f0000000440)='.log\x00', 0x0, 0x0)

13:35:16 executing program 2:
syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x2a, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback=0xac1414aa, @local}}}}}}, 0x0)

13:35:16 executing program 0:
r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0)
ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000140)=0xa0000)
ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000000)={@local})
ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r0, 0x7a9, &(0x7f0000000040)={{@any, 0xffffffff}, @my=0x0})

13:35:16 executing program 5:
perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xac, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000003080)={{}, 0x0, 0x0, @unused, @subvolid=0x9})
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x20)
r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/anycast6\x00')
perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, 0x0)
socket$inet6(0xa, 0x0, 0x0)
preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0, 0x0)

13:35:16 executing program 0:
r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0)
ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000140)=0xa0000)
ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000000)={@local})
ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r0, 0x7a9, &(0x7f0000000040)={{@any, 0xffffffff}, @my=0x0})

13:35:16 executing program 2:
syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x2a, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback=0xac1414aa, @local}}}}}}, 0x0)

[  117.536236] input: syz1 as /devices/virtual/input/input10
[  117.570723] SQUASHFS error: zlib decompression failed, data probably corrupt
13:35:16 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[], 0x14}}, 0x0)
getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_RSC={0x10}}}]}, 0x44}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000c80)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x5}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x0, 0xc}}]}}]}, 0x3c}}, 0x0)
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmmsg(r3, &(0x7f00000002c0), 0x400000000000003, 0x0)

[  117.607900] SQUASHFS error: squashfs_read_data failed to read block 0x13e
[  117.639267] SQUASHFS error: Unable to read metadata cache entry [13e]
13:35:16 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket$netlink(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
write$binfmt_misc(r3, &(0x7f0000000080)={'syz0'}, 0x4)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ffe70a0000000010", @ANYRES32=r4, @ANYBLOB="00000000e60000001c0012000c000100626f6e64"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000003c0)=@newqdisc={0x38, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='$\x00\x00\x00.\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="000000080000ffff"], 0x24}}, 0x0)

13:35:16 executing program 1:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000100)={{}, 'syz1\x00', 0x1d})
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)
read(r0, &(0x7f0000000040)=""/89, 0x59)
write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfea6)
connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)

[  117.662206] SQUASHFS error: Unable to read directory block [13e:26]
[  117.677018] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'.
13:35:16 executing program 4:
r0 = syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100b, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f0000000140)=ANY=[])
openat$incfs(r0, &(0x7f0000000440)='.log\x00', 0x0, 0x0)

[  117.756764] input: syz1 as /devices/virtual/input/input11
[  117.774883] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'.
13:35:16 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[], 0x14}}, 0x0)
getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_RSC={0x10}}}]}, 0x44}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000c80)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x5}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x0, 0xc}}]}}]}, 0x3c}}, 0x0)
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmmsg(r3, &(0x7f00000002c0), 0x400000000000003, 0x0)

[  117.809979] print_req_error: 9 callbacks suppressed
[  117.809985] print_req_error: I/O error, dev loop4, sector 0
[  117.825931] SQUASHFS error: zlib decompression failed, data probably corrupt
[  117.840487] SQUASHFS error: squashfs_read_data failed to read block 0x13e
[  117.853700] SQUASHFS error: Unable to read metadata cache entry [13e]
[  117.866272] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'.
[  117.875182] SQUASHFS error: Unable to read directory block [13e:26]
13:35:17 executing program 4:
r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0)
ioctl$LOOP_SET_STATUS(r0, 0x4c04, &(0x7f0000000100)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "3b36ad8bac494cd89bf8a0b54d80197ec3f7ff0f330f54c83c1ae554dcea6e264b5e67e2458b4e0192dd239592a21e73219cfc11469af2d2fe663eb9cb8d35c7", "c6ca945ccd34b3f25acdc354998a87a49b5743d87edfb78a3b76a7dc79eb5c18"})

13:35:17 executing program 5:
perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xac, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000003080)={{}, 0x0, 0x0, @unused, @subvolid=0x9})
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x20)
r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/anycast6\x00')
perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, 0x0)
socket$inet6(0xa, 0x0, 0x0)
preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0, 0x0)

13:35:17 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[], 0x14}}, 0x0)
getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_RSC={0x10}}}]}, 0x44}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000c80)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x5}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x0, 0xc}}]}}]}, 0x3c}}, 0x0)
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmmsg(r3, &(0x7f00000002c0), 0x400000000000003, 0x0)

13:35:17 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket$netlink(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
write$binfmt_misc(r3, &(0x7f0000000080)={'syz0'}, 0x4)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ffe70a0000000010", @ANYRES32=r4, @ANYBLOB="00000000e60000001c0012000c000100626f6e64"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000003c0)=@newqdisc={0x38, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='$\x00\x00\x00.\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="000000080000ffff"], 0x24}}, 0x0)

13:35:17 executing program 3:
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000000c0))

13:35:17 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x10)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10)
syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @broadcast=0xe0000001}, {0x0, 0x4e22, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0)

13:35:17 executing program 3:
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000000c0))

[  118.394372] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'.
13:35:17 executing program 3:
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000000c0))

13:35:17 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x10)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10)
syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @broadcast=0xe0000001}, {0x0, 0x4e22, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0)

[  118.436741] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'.
13:35:17 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket$netlink(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
write$binfmt_misc(r3, &(0x7f0000000080)={'syz0'}, 0x4)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ffe70a0000000010", @ANYRES32=r4, @ANYBLOB="00000000e60000001c0012000c000100626f6e64"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000003c0)=@newqdisc={0x38, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='$\x00\x00\x00.\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="000000080000ffff"], 0x24}}, 0x0)

13:35:17 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x10)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10)
syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @broadcast=0xe0000001}, {0x0, 0x4e22, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0)

13:35:17 executing program 3:
r0 = socket$isdn_base(0x22, 0x3, 0x0)
ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000000c0))

13:35:17 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x803, 0x0)
sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[], 0x14}}, 0x0)
getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_RSC={0x10}}}]}, 0x44}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000c80)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x5}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x0, 0xc}}]}}]}, 0x3c}}, 0x0)
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmmsg(r3, &(0x7f00000002c0), 0x400000000000003, 0x0)

13:35:17 executing program 5:
perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xac, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000003080)={{}, 0x0, 0x0, @unused, @subvolid=0x9})
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x20)
r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/anycast6\x00')
perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, 0x0)
socket$inet6(0xa, 0x0, 0x0)
preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0, 0x0)

13:35:17 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDSETMODE(r0, 0x4b3a, 0x1)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$KDSETMODE(r0, 0x4b3a, 0x0)

13:35:17 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x10)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10)
syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @broadcast=0xe0000001}, {0x0, 0x4e22, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0)

13:35:17 executing program 3:
r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa8094, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}}, 0x0, 0xffffffffffffffff, r0, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xa002, 0x0, 0x0, 0x0, 0x3a}, 0x0, 0xffffffffffffffff, r0, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000))
getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa)
sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80003000}, 0xc, &(0x7f0000000300)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="78020000", @ANYBLOB="000128bd7000fddbdf250d000000440001", @ANYRES32, @ANYBLOB="14000200726f736530000000000000000000000008000300030000001400020064756d6d793000000000000000000000080003000200000040000180080003000200000008000100", @ANYRES32, @ANYBLOB="080001", @ANYRES32, @ANYBLOB="140002006d6163766c616e31000000000000000008000300010000000800030000000000140001800800030000000000080001", @ANYRES32=0x0, @ANYBLOB="5800018014000200226f6e643000000600a2d8000000000000000800", @ANYRES32, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="1400020067656e65766530000000000000000000140002006e72300000000000000000000000000040000180cbfd020074756e6c300000000000000000000000140002007465616d300000000000000000000000140002006272696467655f736c6176655f3100001800018014000200766972745f7769666930000000000000680001801400020076657468315f746f5f626f6e64000000140002006970766c616e3100000000000000000008000300010000000800", @ANYBLOB="080003000000000008000100", @ANYRES32, @ANYBLOB="1400020076657468315f746f5f626f6e6400000008000300020000005800018008000100", @ANYRESOCT=r0, @ANYBLOB="1400020076657468315f746f5f626f6e64000000080003000200000008000100", @ANYBLOB, @ANYRES32, @ANYBLOB="14000200776c616e31000000000000000000000008000300010000001400020073697430000000000000000000000000080003000300000008000100", @ANYRES32=r3, @ANYBLOB], 0x278}, 0x1, 0x0, 0x0, 0x4c000}, 0x20008000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYRESHEX], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2)
r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0xffffe000)
r5 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r5, 0x0, 0x0, 0x2400067e, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10)
sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53)

[  118.608472] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'.
13:35:17 executing program 4:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
syz_open_dev$usbfs(&(0x7f00000000c0), 0x1, 0x8000)
openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='lock_acquire\x00'}, 0x10)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f1, &(0x7f0000000580)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x4500000000000000}, @private0}})
accept4(0xffffffffffffffff, &(0x7f0000000280)=@ax25={{}, [@null, @rose, @remote, @remote, @remote, @rose, @rose, @rose]}, &(0x7f00000001c0)=0x80, 0x800)
socket$inet_udplite(0x2, 0x2, 0x88)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002280)={&(0x7f00000021c0), 0xc, &(0x7f0000002240)={&(0x7f0000002200)=@bridge_dellink={0x28, 0x11, 0x1, 0x0, 0x0, {}, [@IFLA_EVENT={0x8}]}, 0x28}}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = signalfd(r1, &(0x7f00000000c0), 0x8)
openat(r2, &(0x7f0000000400)='./file0\x00', 0x0, 0x14)
ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl1\x00', 0x0})

13:35:17 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5e8, 0x0, 0xe8, 0x220, 0x220, 0x338, 0x4f8, 0x4f8, 0x4f8, 0x4f8, 0x4f8, 0x6, 0x0, {[{{@ipv6={@remote, @loopback, [], [], 'lo\x00', 'sit0\x00'}, 0x0, 0xa8, 0xfffffe1c}, @common=@inet=@LOG={0x0, 'LOG\x00', 0x0, {0x0, 0x0, "77c8a717e2f92aea38a91cb53706d9214cf1f6c806f6b814f6689b0f5041"}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@private, @ipv4=@empty}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@multicast1}}}, {{@ipv6={@private2, @empty, [], [], 'ipvlan1\x00', 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@private2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6a7)

13:35:17 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_IRQCHIP(r1, 0xae03, 0x0)

13:35:18 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5e8, 0x0, 0xe8, 0x220, 0x220, 0x338, 0x4f8, 0x4f8, 0x4f8, 0x4f8, 0x4f8, 0x6, 0x0, {[{{@ipv6={@remote, @loopback, [], [], 'lo\x00', 'sit0\x00'}, 0x0, 0xa8, 0xfffffe1c}, @common=@inet=@LOG={0x0, 'LOG\x00', 0x0, {0x0, 0x0, "77c8a717e2f92aea38a91cb53706d9214cf1f6c806f6b814f6689b0f5041"}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@private, @ipv4=@empty}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@multicast1}}}, {{@ipv6={@private2, @empty, [], [], 'ipvlan1\x00', 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@private2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6a7)

13:35:18 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket$netlink(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
write$binfmt_misc(r3, &(0x7f0000000080)={'syz0'}, 0x4)
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ffe70a0000000010", @ANYRES32=r4, @ANYBLOB="00000000e60000001c0012000c000100626f6e64"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000003c0)=@newqdisc={0x38, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='$\x00\x00\x00.\x00\'\r\x00'/20, @ANYRES32=r4, @ANYBLOB="000000080000ffff"], 0x24}}, 0x0)

13:35:18 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000e3ce80001dd0000040d000600ea113e000005000000", 0x29}], 0x1)

13:35:18 executing program 4:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
syz_open_dev$usbfs(&(0x7f00000000c0), 0x1, 0x8000)
openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='lock_acquire\x00'}, 0x10)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f1, &(0x7f0000000580)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x4500000000000000}, @private0}})
accept4(0xffffffffffffffff, &(0x7f0000000280)=@ax25={{}, [@null, @rose, @remote, @remote, @remote, @rose, @rose, @rose]}, &(0x7f00000001c0)=0x80, 0x800)
socket$inet_udplite(0x2, 0x2, 0x88)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002280)={&(0x7f00000021c0), 0xc, &(0x7f0000002240)={&(0x7f0000002200)=@bridge_dellink={0x28, 0x11, 0x1, 0x0, 0x0, {}, [@IFLA_EVENT={0x8}]}, 0x28}}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = signalfd(r1, &(0x7f00000000c0), 0x8)
openat(r2, &(0x7f0000000400)='./file0\x00', 0x0, 0x14)
ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl1\x00', 0x0})

[  118.657124] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'.
13:35:18 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5e8, 0x0, 0xe8, 0x220, 0x220, 0x338, 0x4f8, 0x4f8, 0x4f8, 0x4f8, 0x4f8, 0x6, 0x0, {[{{@ipv6={@remote, @loopback, [], [], 'lo\x00', 'sit0\x00'}, 0x0, 0xa8, 0xfffffe1c}, @common=@inet=@LOG={0x0, 'LOG\x00', 0x0, {0x0, 0x0, "77c8a717e2f92aea38a91cb53706d9214cf1f6c806f6b814f6689b0f5041"}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@private, @ipv4=@empty}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@multicast1}}}, {{@ipv6={@private2, @empty, [], [], 'ipvlan1\x00', 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@private2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6a7)

13:35:18 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDSETMODE(r0, 0x4b3a, 0x1)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$KDSETMODE(r0, 0x4b3a, 0x0)

[  119.000537] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'.
13:35:18 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5e8, 0x0, 0xe8, 0x220, 0x220, 0x338, 0x4f8, 0x4f8, 0x4f8, 0x4f8, 0x4f8, 0x6, 0x0, {[{{@ipv6={@remote, @loopback, [], [], 'lo\x00', 'sit0\x00'}, 0x0, 0xa8, 0xfffffe1c}, @common=@inet=@LOG={0x0, 'LOG\x00', 0x0, {0x0, 0x0, "77c8a717e2f92aea38a91cb53706d9214cf1f6c806f6b814f6689b0f5041"}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@private, @ipv4=@empty}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@multicast1}}}, {{@ipv6={@private2, @empty, [], [], 'ipvlan1\x00', 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@private2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6a7)

13:35:18 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDSETMODE(r0, 0x4b3a, 0x1)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$KDSETMODE(r0, 0x4b3a, 0x0)

13:35:18 executing program 4:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
syz_open_dev$usbfs(&(0x7f00000000c0), 0x1, 0x8000)
openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='lock_acquire\x00'}, 0x10)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f1, &(0x7f0000000580)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x4500000000000000}, @private0}})
accept4(0xffffffffffffffff, &(0x7f0000000280)=@ax25={{}, [@null, @rose, @remote, @remote, @remote, @rose, @rose, @rose]}, &(0x7f00000001c0)=0x80, 0x800)
socket$inet_udplite(0x2, 0x2, 0x88)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002280)={&(0x7f00000021c0), 0xc, &(0x7f0000002240)={&(0x7f0000002200)=@bridge_dellink={0x28, 0x11, 0x1, 0x0, 0x0, {}, [@IFLA_EVENT={0x8}]}, 0x28}}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = signalfd(r1, &(0x7f00000000c0), 0x8)
openat(r2, &(0x7f0000000400)='./file0\x00', 0x0, 0x14)
ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl1\x00', 0x0})

13:35:18 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000e3ce80001dd0000040d000600ea113e000005000000", 0x29}], 0x1)

13:35:18 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x18}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000b00010076657468"], 0x48}}, 0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket(0x1, 0x803, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
r7 = socket$inet6(0xa, 0x1, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000004040)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x63, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd25, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0)

13:35:18 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDSETMODE(r0, 0x4b3a, 0x1)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$KDSETMODE(r0, 0x4b3a, 0x0)

13:35:18 executing program 3:
r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa8094, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}}, 0x0, 0xffffffffffffffff, r0, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xa002, 0x0, 0x0, 0x0, 0x3a}, 0x0, 0xffffffffffffffff, r0, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000))
getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa)
sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80003000}, 0xc, &(0x7f0000000300)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="78020000", @ANYBLOB="000128bd7000fddbdf250d000000440001", @ANYRES32, @ANYBLOB="14000200726f736530000000000000000000000008000300030000001400020064756d6d793000000000000000000000080003000200000040000180080003000200000008000100", @ANYRES32, @ANYBLOB="080001", @ANYRES32, @ANYBLOB="140002006d6163766c616e31000000000000000008000300010000000800030000000000140001800800030000000000080001", @ANYRES32=0x0, @ANYBLOB="5800018014000200226f6e643000000600a2d8000000000000000800", @ANYRES32, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="1400020067656e65766530000000000000000000140002006e72300000000000000000000000000040000180cbfd020074756e6c300000000000000000000000140002007465616d300000000000000000000000140002006272696467655f736c6176655f3100001800018014000200766972745f7769666930000000000000680001801400020076657468315f746f5f626f6e64000000140002006970766c616e3100000000000000000008000300010000000800", @ANYBLOB="080003000000000008000100", @ANYRES32, @ANYBLOB="1400020076657468315f746f5f626f6e6400000008000300020000005800018008000100", @ANYRESOCT=r0, @ANYBLOB="1400020076657468315f746f5f626f6e64000000080003000200000008000100", @ANYBLOB, @ANYRES32, @ANYBLOB="14000200776c616e31000000000000000000000008000300010000001400020073697430000000000000000000000000080003000300000008000100", @ANYRES32=r3, @ANYBLOB], 0x278}, 0x1, 0x0, 0x0, 0x4c000}, 0x20008000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYRESHEX], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2)
r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0xffffe000)
r5 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r5, 0x0, 0x0, 0x2400067e, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10)
sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53)

13:35:18 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000e3ce80001dd0000040d000600ea113e000005000000", 0x29}], 0x1)

[  119.394678] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'.
13:35:18 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000e3ce80001dd0000040d000600ea113e000005000000", 0x29}], 0x1)

13:35:18 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDSETMODE(r0, 0x4b3a, 0x1)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$KDSETMODE(r0, 0x4b3a, 0x0)

13:35:18 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x18}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000b00010076657468"], 0x48}}, 0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket(0x1, 0x803, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
r7 = socket$inet6(0xa, 0x1, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000004040)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x63, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd25, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0)

13:35:18 executing program 4:
r0 = socket$inet6_udplite(0xa, 0x2, 0x88)
syz_open_dev$usbfs(&(0x7f00000000c0), 0x1, 0x8000)
openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='lock_acquire\x00'}, 0x10)
ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f1, &(0x7f0000000580)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback={0x4500000000000000}, @private0}})
accept4(0xffffffffffffffff, &(0x7f0000000280)=@ax25={{}, [@null, @rose, @remote, @remote, @remote, @rose, @rose, @rose]}, &(0x7f00000001c0)=0x80, 0x800)
socket$inet_udplite(0x2, 0x2, 0x88)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002280)={&(0x7f00000021c0), 0xc, &(0x7f0000002240)={&(0x7f0000002200)=@bridge_dellink={0x28, 0x11, 0x1, 0x0, 0x0, {}, [@IFLA_EVENT={0x8}]}, 0x28}}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = signalfd(r1, &(0x7f00000000c0), 0x8)
openat(r2, &(0x7f0000000400)='./file0\x00', 0x0, 0x14)
ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl1\x00', 0x0})

13:35:18 executing program 5:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x18}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000b00010076657468"], 0x48}}, 0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket(0x1, 0x803, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
r7 = socket$inet6(0xa, 0x1, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000004040)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x63, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd25, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0)

[  119.523007] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'.
13:35:18 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDSETMODE(r0, 0x4b3a, 0x1)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$KDSETMODE(r0, 0x4b3a, 0x0)

13:35:18 executing program 3:
r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa8094, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}}, 0x0, 0xffffffffffffffff, r0, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xa002, 0x0, 0x0, 0x0, 0x3a}, 0x0, 0xffffffffffffffff, r0, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000))
getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa)
sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80003000}, 0xc, &(0x7f0000000300)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="78020000", @ANYBLOB="000128bd7000fddbdf250d000000440001", @ANYRES32, @ANYBLOB="14000200726f736530000000000000000000000008000300030000001400020064756d6d793000000000000000000000080003000200000040000180080003000200000008000100", @ANYRES32, @ANYBLOB="080001", @ANYRES32, @ANYBLOB="140002006d6163766c616e31000000000000000008000300010000000800030000000000140001800800030000000000080001", @ANYRES32=0x0, @ANYBLOB="5800018014000200226f6e643000000600a2d8000000000000000800", @ANYRES32, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="1400020067656e65766530000000000000000000140002006e72300000000000000000000000000040000180cbfd020074756e6c300000000000000000000000140002007465616d300000000000000000000000140002006272696467655f736c6176655f3100001800018014000200766972745f7769666930000000000000680001801400020076657468315f746f5f626f6e64000000140002006970766c616e3100000000000000000008000300010000000800", @ANYBLOB="080003000000000008000100", @ANYRES32, @ANYBLOB="1400020076657468315f746f5f626f6e6400000008000300020000005800018008000100", @ANYRESOCT=r0, @ANYBLOB="1400020076657468315f746f5f626f6e64000000080003000200000008000100", @ANYBLOB, @ANYRES32, @ANYBLOB="14000200776c616e31000000000000000000000008000300010000001400020073697430000000000000000000000000080003000300000008000100", @ANYRES32=r3, @ANYBLOB], 0x278}, 0x1, 0x0, 0x0, 0x4c000}, 0x20008000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYRESHEX], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2)
r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0xffffe000)
r5 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r5, 0x0, 0x0, 0x2400067e, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10)
sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53)

13:35:19 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x18}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000b00010076657468"], 0x48}}, 0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket(0x1, 0x803, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
r7 = socket$inet6(0xa, 0x1, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000004040)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x63, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd25, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0)

13:35:19 executing program 5:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x18}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000b00010076657468"], 0x48}}, 0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket(0x1, 0x803, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
r7 = socket$inet6(0xa, 0x1, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000004040)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x63, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd25, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0)

13:35:19 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x18}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000b00010076657468"], 0x48}}, 0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket(0x1, 0x803, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
r7 = socket$inet6(0xa, 0x1, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000004040)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x63, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd25, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0)

13:35:19 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$KDSETMODE(r0, 0x4b3a, 0x1)
socket$nl_netfilter(0x10, 0x3, 0xc)
ioctl$KDSETMODE(r0, 0x4b3a, 0x0)

13:35:19 executing program 3:
r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa8094, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}}, 0x0, 0xffffffffffffffff, r0, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xa002, 0x0, 0x0, 0x0, 0x3a}, 0x0, 0xffffffffffffffff, r0, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000))
getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa)
sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80003000}, 0xc, &(0x7f0000000300)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="78020000", @ANYBLOB="000128bd7000fddbdf250d000000440001", @ANYRES32, @ANYBLOB="14000200726f736530000000000000000000000008000300030000001400020064756d6d793000000000000000000000080003000200000040000180080003000200000008000100", @ANYRES32, @ANYBLOB="080001", @ANYRES32, @ANYBLOB="140002006d6163766c616e31000000000000000008000300010000000800030000000000140001800800030000000000080001", @ANYRES32=0x0, @ANYBLOB="5800018014000200226f6e643000000600a2d8000000000000000800", @ANYRES32, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="1400020067656e65766530000000000000000000140002006e72300000000000000000000000000040000180cbfd020074756e6c300000000000000000000000140002007465616d300000000000000000000000140002006272696467655f736c6176655f3100001800018014000200766972745f7769666930000000000000680001801400020076657468315f746f5f626f6e64000000140002006970766c616e3100000000000000000008000300010000000800", @ANYBLOB="080003000000000008000100", @ANYRES32, @ANYBLOB="1400020076657468315f746f5f626f6e6400000008000300020000005800018008000100", @ANYRESOCT=r0, @ANYBLOB="1400020076657468315f746f5f626f6e64000000080003000200000008000100", @ANYBLOB, @ANYRES32, @ANYBLOB="14000200776c616e31000000000000000000000008000300010000001400020073697430000000000000000000000000080003000300000008000100", @ANYRES32=r3, @ANYBLOB], 0x278}, 0x1, 0x0, 0x0, 0x4c000}, 0x20008000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYRESHEX], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2)
r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0xffffe000)
r5 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r5, 0x0, 0x0, 0x2400067e, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10)
sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53)

13:35:19 executing program 1:
r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa8094, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}}, 0x0, 0xffffffffffffffff, r0, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xa002, 0x0, 0x0, 0x0, 0x3a}, 0x0, 0xffffffffffffffff, r0, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000))
getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa)
sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80003000}, 0xc, &(0x7f0000000300)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="78020000", @ANYBLOB="000128bd7000fddbdf250d000000440001", @ANYRES32, @ANYBLOB="14000200726f736530000000000000000000000008000300030000001400020064756d6d793000000000000000000000080003000200000040000180080003000200000008000100", @ANYRES32, @ANYBLOB="080001", @ANYRES32, @ANYBLOB="140002006d6163766c616e31000000000000000008000300010000000800030000000000140001800800030000000000080001", @ANYRES32=0x0, @ANYBLOB="5800018014000200226f6e643000000600a2d8000000000000000800", @ANYRES32, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="1400020067656e65766530000000000000000000140002006e72300000000000000000000000000040000180cbfd020074756e6c300000000000000000000000140002007465616d300000000000000000000000140002006272696467655f736c6176655f3100001800018014000200766972745f7769666930000000000000680001801400020076657468315f746f5f626f6e64000000140002006970766c616e3100000000000000000008000300010000000800", @ANYBLOB="080003000000000008000100", @ANYRES32, @ANYBLOB="1400020076657468315f746f5f626f6e6400000008000300020000005800018008000100", @ANYRESOCT=r0, @ANYBLOB="1400020076657468315f746f5f626f6e64000000080003000200000008000100", @ANYBLOB, @ANYRES32, @ANYBLOB="14000200776c616e31000000000000000000000008000300010000001400020073697430000000000000000000000000080003000300000008000100", @ANYRES32=r3, @ANYBLOB], 0x278}, 0x1, 0x0, 0x0, 0x4c000}, 0x20008000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYRESHEX], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2)
r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0xffffe000)
r5 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r5, 0x0, 0x0, 0x2400067e, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10)
sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53)

13:35:19 executing program 2:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x18}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000b00010076657468"], 0x48}}, 0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket(0x1, 0x803, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
r7 = socket$inet6(0xa, 0x1, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000004040)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x63, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd25, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0)

13:35:19 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x18}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000b00010076657468"], 0x48}}, 0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket(0x1, 0x803, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
r7 = socket$inet6(0xa, 0x1, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000004040)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x63, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd25, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0)

13:35:19 executing program 0:
r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa8094, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}}, 0x0, 0xffffffffffffffff, r0, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xa002, 0x0, 0x0, 0x0, 0x3a}, 0x0, 0xffffffffffffffff, r0, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000))
getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa)
sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80003000}, 0xc, &(0x7f0000000300)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="78020000", @ANYBLOB="000128bd7000fddbdf250d000000440001", @ANYRES32, @ANYBLOB="14000200726f736530000000000000000000000008000300030000001400020064756d6d793000000000000000000000080003000200000040000180080003000200000008000100", @ANYRES32, @ANYBLOB="080001", @ANYRES32, @ANYBLOB="140002006d6163766c616e31000000000000000008000300010000000800030000000000140001800800030000000000080001", @ANYRES32=0x0, @ANYBLOB="5800018014000200226f6e643000000600a2d8000000000000000800", @ANYRES32, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="1400020067656e65766530000000000000000000140002006e72300000000000000000000000000040000180cbfd020074756e6c300000000000000000000000140002007465616d300000000000000000000000140002006272696467655f736c6176655f3100001800018014000200766972745f7769666930000000000000680001801400020076657468315f746f5f626f6e64000000140002006970766c616e3100000000000000000008000300010000000800", @ANYBLOB="080003000000000008000100", @ANYRES32, @ANYBLOB="1400020076657468315f746f5f626f6e6400000008000300020000005800018008000100", @ANYRESOCT=r0, @ANYBLOB="1400020076657468315f746f5f626f6e64000000080003000200000008000100", @ANYBLOB, @ANYRES32, @ANYBLOB="14000200776c616e31000000000000000000000008000300010000001400020073697430000000000000000000000000080003000300000008000100", @ANYRES32=r3, @ANYBLOB], 0x278}, 0x1, 0x0, 0x0, 0x4c000}, 0x20008000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYRESHEX], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2)
r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0xffffe000)
r5 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r5, 0x0, 0x0, 0x2400067e, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10)
sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53)

13:35:19 executing program 5:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x18}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000b00010076657468"], 0x48}}, 0x0)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket(0x1, 0x803, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14)
r7 = socket$inet6(0xa, 0x1, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000004040)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d6163766c616e000400028008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7], 0x44}}, 0x0)
sendmsg$nl_route_sched(r0, &(0x7f0000000400)={0x0, 0x63, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd25, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0)

[  120.750454] ==================================================================
[  120.758000] BUG: KASAN: use-after-free in macvlan_dev_get_iflink+0x5f/0x70
[  120.765005] Read of size 4 at addr ffff888071374f48 by task syz-executor.4/11717
[  120.772520] 
[  120.774143] CPU: 1 PID: 11717 Comm: syz-executor.4 Not tainted 4.14.268-syzkaller #0
[  120.782010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  120.791356] Call Trace:
[  120.793942]  dump_stack+0x1b2/0x281
[  120.797564]  print_address_description.cold+0x54/0x1d3
[  120.802836]  kasan_report_error.cold+0x8a/0x191
[  120.807500]  ? macvlan_dev_get_iflink+0x5f/0x70
[  120.812163]  __asan_report_load4_noabort+0x68/0x70
[  120.817092]  ? macvlan_dev_get_iflink+0x5f/0x70
[  120.821753]  macvlan_dev_get_iflink+0x5f/0x70
[  120.826234]  ? macvlan_dev_poll_controller+0x10/0x10
[  120.831324]  dev_get_iflink+0x73/0xe0
[  120.835115]  rfc2863_policy+0x163/0x1b0
[  120.839070]  linkwatch_do_dev+0x1b/0xf0
[  120.843024]  linkwatch_forget_dev+0x15c/0x1f0
[  120.847504]  netdev_run_todo+0x284/0xad0
[  120.851558]  ? dev_set_mtu+0x3c0/0x3c0
[  120.855429]  ? rtnl_dellink+0x6a0/0x6a0
[  120.859383]  rtnetlink_rcv_msg+0x3cb/0xb10
[  120.863598]  ? rtnl_calcit.isra.0+0x3a0/0x3a0
[  120.868073]  ? __netlink_lookup+0x345/0x5d0
[  120.872376]  ? netdev_pick_tx+0x2e0/0x2e0
[  120.876507]  netlink_rcv_skb+0x125/0x390
[  120.880553]  ? memcpy+0x35/0x50
[  120.883811]  ? rtnl_calcit.isra.0+0x3a0/0x3a0
[  120.888287]  ? netlink_ack+0x9a0/0x9a0
[  120.892161]  netlink_unicast+0x437/0x610
[  120.896203]  ? netlink_sendskb+0xd0/0xd0
[  120.900244]  ? __check_object_size+0x179/0x230
[  120.904805]  netlink_sendmsg+0x648/0xbc0
[  120.908858]  ? nlmsg_notify+0x1b0/0x1b0
[  120.912813]  ? kernel_recvmsg+0x210/0x210
[  120.916943]  ? security_socket_sendmsg+0x83/0xb0
[  120.921686]  ? nlmsg_notify+0x1b0/0x1b0
[  120.925641]  sock_sendmsg+0xb5/0x100
[  120.929333]  ___sys_sendmsg+0x6c8/0x800
[  120.933297]  ? copy_msghdr_from_user+0x3b0/0x3b0
[  120.938029]  ? trace_hardirqs_on+0x10/0x10
[  120.942246]  ? do_futex+0x127/0x1570
[  120.945945]  ? lock_acquire+0x170/0x3f0
[  120.949903]  ? lock_downgrade+0x740/0x740
[  120.954041]  ? __fget+0x2df/0x460
[  120.957483]  ? __fdget+0x19b/0x1f0
[  120.961001]  ? sockfd_lookup_light+0xb2/0x160
[  120.965477]  __sys_sendmsg+0xa3/0x120
[  120.969268]  ? SyS_shutdown+0x160/0x160
[  120.973231]  ? move_addr_to_kernel+0x60/0x60
[  120.977621]  ? __do_page_fault+0x159/0xad0
[  120.981836]  SyS_sendmsg+0x27/0x40
[  120.985354]  ? __sys_sendmsg+0x120/0x120
[  120.989395]  do_syscall_64+0x1d5/0x640
[  120.993265]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  120.998431] RIP: 0033:0x7f85c2337059
[  121.002118] RSP: 002b:00007f85c0cac168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  121.009805] RAX: ffffffffffffffda RBX: 00007f85c2449f60 RCX: 00007f85c2337059
[  121.017052] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000006
[  121.024298] RBP: 00007f85c239108d R08: 0000000000000000 R09: 0000000000000000
[  121.031552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[  121.038799] R13: 00007ffe7466c46f R14: 00007f85c0cac300 R15: 0000000000022000
[  121.046065] 
[  121.047675] Allocated by task 11717:
[  121.051368]  kasan_kmalloc+0xeb/0x160
[  121.055146]  __kmalloc_node+0x4c/0x70
[  121.058924]  kvmalloc_node+0x46/0xd0
[  121.062618]  alloc_netdev_mqs+0x76/0xb70
[  121.066672]  rtnl_create_link+0x1ab/0x890
[  121.070797]  rtnl_newlink+0xe7a/0x1830
[  121.074662]  rtnetlink_rcv_msg+0x3be/0xb10
[  121.078877]  netlink_rcv_skb+0x125/0x390
[  121.082916]  netlink_unicast+0x437/0x610
[  121.086958]  netlink_sendmsg+0x648/0xbc0
[  121.091009]  sock_sendmsg+0xb5/0x100
[  121.094699]  ___sys_sendmsg+0x6c8/0x800
[  121.098661]  __sys_sendmsg+0xa3/0x120
[  121.102440]  SyS_sendmsg+0x27/0x40
[  121.105960]  do_syscall_64+0x1d5/0x640
[  121.109826]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  121.114999] 
[  121.116605] Freed by task 11728:
[  121.119953]  kasan_slab_free+0xc3/0x1a0
[  121.123908]  kfree+0xc9/0x250
[  121.126993]  kvfree+0x45/0x50
[  121.130077]  device_release+0x15f/0x1a0
[  121.134030]  kobject_put+0x251/0x550
[  121.137734]  netdev_run_todo+0x747/0xad0
[  121.141775]  rtnetlink_rcv_msg+0x3cb/0xb10
[  121.145986]  netlink_rcv_skb+0x125/0x390
[  121.150035]  netlink_unicast+0x437/0x610
[  121.154071]  netlink_sendmsg+0x648/0xbc0
[  121.158111]  sock_sendmsg+0xb5/0x100
[  121.161802]  ___sys_sendmsg+0x6c8/0x800
[  121.165760]  __sys_sendmsg+0xa3/0x120
[  121.169538]  SyS_sendmsg+0x27/0x40
[  121.173059]  do_syscall_64+0x1d5/0x640
[  121.176927]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  121.182098] 
[  121.183705] The buggy address belongs to the object at ffff888071374e40
[  121.183705]  which belongs to the cache kmalloc-4096 of size 4096
[  121.196890] The buggy address is located 264 bytes inside of
[  121.196890]  4096-byte region [ffff888071374e40, ffff888071375e40)
[  121.208833] The buggy address belongs to the page:
[  121.213740] page:ffffea0001c4dd00 count:1 mapcount:0 mapping:ffff888071374e40 index:0x0 compound_mapcount: 0
[  121.223686] flags: 0xfff00000008100(slab|head)
[  121.228246] raw: 00fff00000008100 ffff888071374e40 0000000000000000 0000000100000001
[  121.236105] raw: ffffea0001c658a0 ffffea0001c37fa0 ffff88813fe74dc0 0000000000000000
[  121.243958] page dumped because: kasan: bad access detected
[  121.249640] 
[  121.251262] Memory state around the buggy address:
[  121.256166]  ffff888071374e00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb
[  121.263512]  ffff888071374e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  121.270851] >ffff888071374f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  121.278183]                                               ^
[  121.283872]  ffff888071374f80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  121.291205]  ffff888071375000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
13:35:20 executing program 0:
r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa8094, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}}, 0x0, 0xffffffffffffffff, r0, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xa002, 0x0, 0x0, 0x0, 0x3a}, 0x0, 0xffffffffffffffff, r0, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000))
getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa)
sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80003000}, 0xc, &(0x7f0000000300)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="78020000", @ANYBLOB="000128bd7000fddbdf250d000000440001", @ANYRES32, @ANYBLOB="14000200726f736530000000000000000000000008000300030000001400020064756d6d793000000000000000000000080003000200000040000180080003000200000008000100", @ANYRES32, @ANYBLOB="080001", @ANYRES32, @ANYBLOB="140002006d6163766c616e31000000000000000008000300010000000800030000000000140001800800030000000000080001", @ANYRES32=0x0, @ANYBLOB="5800018014000200226f6e643000000600a2d8000000000000000800", @ANYRES32, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="1400020067656e65766530000000000000000000140002006e72300000000000000000000000000040000180cbfd020074756e6c300000000000000000000000140002007465616d300000000000000000000000140002006272696467655f736c6176655f3100001800018014000200766972745f7769666930000000000000680001801400020076657468315f746f5f626f6e64000000140002006970766c616e3100000000000000000008000300010000000800", @ANYBLOB="080003000000000008000100", @ANYRES32, @ANYBLOB="1400020076657468315f746f5f626f6e6400000008000300020000005800018008000100", @ANYRESOCT=r0, @ANYBLOB="1400020076657468315f746f5f626f6e64000000080003000200000008000100", @ANYBLOB, @ANYRES32, @ANYBLOB="14000200776c616e31000000000000000000000008000300010000001400020073697430000000000000000000000000080003000300000008000100", @ANYRES32=r3, @ANYBLOB], 0x278}, 0x1, 0x0, 0x0, 0x4c000}, 0x20008000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYRESHEX], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2)
r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0xffffe000)
r5 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r5, 0x0, 0x0, 0x2400067e, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10)
sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53)

[  121.298539] ==================================================================
[  121.305870] Disabling lock debugging due to kernel taint
[  121.377991] Kernel panic - not syncing: panic_on_warn set ...
[  121.377991] 
[  121.385370] CPU: 1 PID: 11717 Comm: syz-executor.4 Tainted: G    B           4.14.268-syzkaller #0
[  121.394451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  121.403789] Call Trace:
[  121.406356]  dump_stack+0x1b2/0x281
[  121.409961]  panic+0x1f9/0x42d
[  121.413132]  ? add_taint.cold+0x16/0x16
[  121.417084]  ? ___preempt_schedule+0x16/0x18
[  121.421472]  kasan_end_report+0x43/0x49
[  121.425424]  kasan_report_error.cold+0xa7/0x191
[  121.430071]  ? macvlan_dev_get_iflink+0x5f/0x70
[  121.434715]  __asan_report_load4_noabort+0x68/0x70
[  121.439624]  ? macvlan_dev_get_iflink+0x5f/0x70
[  121.444266]  macvlan_dev_get_iflink+0x5f/0x70
[  121.448739]  ? macvlan_dev_poll_controller+0x10/0x10
[  121.453816]  dev_get_iflink+0x73/0xe0
[  121.457592]  rfc2863_policy+0x163/0x1b0
[  121.461544]  linkwatch_do_dev+0x1b/0xf0
[  121.465501]  linkwatch_forget_dev+0x15c/0x1f0
[  121.469976]  netdev_run_todo+0x284/0xad0
[  121.474017]  ? dev_set_mtu+0x3c0/0x3c0
[  121.477882]  ? rtnl_dellink+0x6a0/0x6a0
[  121.481837]  rtnetlink_rcv_msg+0x3cb/0xb10
[  121.486047]  ? rtnl_calcit.isra.0+0x3a0/0x3a0
[  121.490530]  ? __netlink_lookup+0x345/0x5d0
[  121.494839]  ? netdev_pick_tx+0x2e0/0x2e0
[  121.498964]  netlink_rcv_skb+0x125/0x390
[  121.503002]  ? memcpy+0x35/0x50
[  121.506261]  ? rtnl_calcit.isra.0+0x3a0/0x3a0
[  121.510729]  ? netlink_ack+0x9a0/0x9a0
[  121.514595]  netlink_unicast+0x437/0x610
[  121.518630]  ? netlink_sendskb+0xd0/0xd0
[  121.522669]  ? __check_object_size+0x179/0x230
[  121.527229]  netlink_sendmsg+0x648/0xbc0
[  121.531269]  ? nlmsg_notify+0x1b0/0x1b0
[  121.535230]  ? kernel_recvmsg+0x210/0x210
[  121.539353]  ? security_socket_sendmsg+0x83/0xb0
[  121.544082]  ? nlmsg_notify+0x1b0/0x1b0
[  121.548032]  sock_sendmsg+0xb5/0x100
[  121.551724]  ___sys_sendmsg+0x6c8/0x800
[  121.555676]  ? copy_msghdr_from_user+0x3b0/0x3b0
[  121.560421]  ? trace_hardirqs_on+0x10/0x10
[  121.564632]  ? do_futex+0x127/0x1570
[  121.568324]  ? lock_acquire+0x170/0x3f0
[  121.572272]  ? lock_downgrade+0x740/0x740
[  121.576398]  ? __fget+0x2df/0x460
[  121.579827]  ? __fdget+0x19b/0x1f0
[  121.583343]  ? sockfd_lookup_light+0xb2/0x160
[  121.587816]  __sys_sendmsg+0xa3/0x120
[  121.591592]  ? SyS_shutdown+0x160/0x160
[  121.595545]  ? move_addr_to_kernel+0x60/0x60
[  121.599931]  ? __do_page_fault+0x159/0xad0
[  121.604140]  SyS_sendmsg+0x27/0x40
[  121.607677]  ? __sys_sendmsg+0x120/0x120
[  121.611716]  do_syscall_64+0x1d5/0x640
[  121.615581]  entry_SYSCALL_64_after_hwframe+0x46/0xbb
[  121.620751] RIP: 0033:0x7f85c2337059
[  121.624437] RSP: 002b:00007f85c0cac168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  121.632136] RAX: ffffffffffffffda RBX: 00007f85c2449f60 RCX: 00007f85c2337059
[  121.639383] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000006
[  121.646638] RBP: 00007f85c239108d R08: 0000000000000000 R09: 0000000000000000
[  121.653883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[  121.661132] R13: 00007ffe7466c46f R14: 00007f85c0cac300 R15: 0000000000022000
[  121.668541] Kernel Offset: disabled
[  121.672155] Rebooting in 86400 seconds..