0000016580)=""/210, 0xd2}, {&(0x7f0000016680)=""/212, 0xd4}, {&(0x7f0000016780)=""/253, 0xfd}, {&(0x7f0000016880)=""/218, 0xda}, {&(0x7f0000016980)=""/163, 0xa3}, {&(0x7f0000016a40)=""/6, 0x6}, {&(0x7f0000016a80)=""/99, 0x63}, {&(0x7f0000016b00)=""/4096, 0x1000}], 0x9, &(0x7f0000017bc0)=""/167, 0xa7, 0x2}, 0x5}, {{0x0, 0x0, &(0x7f0000018440)=[{&(0x7f0000017c80)=""/253, 0xfd}, {&(0x7f0000017d80)=""/206, 0xce}, {&(0x7f0000017e80)=""/7, 0x7}, {&(0x7f0000017ec0)=""/79, 0x4f}, {&(0x7f0000017f40)=""/142, 0x8e}, {&(0x7f0000018000)=""/200, 0xc8}, {&(0x7f0000018100)=""/206, 0xce}, {&(0x7f0000018200)=""/166, 0xa6}, {&(0x7f00000182c0)=""/239, 0xef}, {&(0x7f00000183c0)=""/94, 0x5e}], 0xa, &(0x7f0000018500)=""/32, 0x20, 0x5}, 0x2}, {{&(0x7f0000018540)=@l2, 0x80, &(0x7f0000018880)=[{&(0x7f00000185c0)=""/44, 0x2c}, {&(0x7f0000018600)=""/207, 0xcf}, {&(0x7f0000018700)=""/50, 0x32}, {&(0x7f0000018740)=""/25, 0x19}, {&(0x7f0000018780)=""/140, 0x8c}, {&(0x7f0000018840)=""/36, 0x24}], 0x6, &(0x7f0000018900)=""/35, 0x23, 0xffff}, 0x4}], 0x7, 0x20, &(0x7f0000018b00)={0x77359400}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000018b40)={0x0, @local, @multicast2}, &(0x7f0000018b80)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000018bc0)={'veth1_to_bridge\x00'}) accept$packet(r0, &(0x7f0000018c00), &(0x7f0000018c40)=0x14) accept4(r0, &(0x7f0000018d80)=@hci, &(0x7f0000018e00)=0x80, 0x80800) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 228.804015] IPVS: length: 245 != 8 23:59:47 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000091c0)={{{@in=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000092c0)=0xe8) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:47 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000091c0)={{{@in=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000092c0)=0xe8) recvmmsg(r0, &(0x7f0000018940)=[{{&(0x7f000000f040)=@hci, 0x80, &(0x7f000000f300)=[{&(0x7f000000f0c0)=""/28, 0x1c}, {&(0x7f000000f100)=""/31, 0x1f}, {&(0x7f000000f140)=""/145, 0x91}, {&(0x7f000000f200)=""/255, 0xff}], 0x4, &(0x7f000000f340)=""/4096, 0x1000, 0x7}, 0x400}, {{&(0x7f0000010340)=@xdp, 0x80, &(0x7f0000012700)=[{&(0x7f00000103c0)=""/4096, 0x1000}, {&(0x7f00000113c0)=""/182, 0xb6}, {&(0x7f0000011480)=""/110, 0x6e}, {&(0x7f0000011500)=""/230, 0xe6}, {&(0x7f0000011600)=""/81, 0x51}, {&(0x7f0000011680)=""/4096, 0x1000}, {&(0x7f0000012680)=""/36, 0x24}, {&(0x7f00000126c0)=""/23, 0x17}], 0x8, &(0x7f0000012780)=""/4096, 0x1000, 0x1000}, 0x6}, {{&(0x7f0000013780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000014cc0)=[{&(0x7f0000013800)=""/5, 0x5}, {&(0x7f0000013840)=""/123, 0x7b}, {&(0x7f00000138c0)=""/74, 0x4a}, {&(0x7f0000013940)=""/14, 0xe}, {&(0x7f0000013980)=""/39, 0x27}, {&(0x7f00000139c0)=""/208, 0xd0}, {&(0x7f0000013ac0)=""/212, 0xd4}, {&(0x7f0000013bc0)=""/4096, 0x1000}, {&(0x7f0000014bc0)=""/220, 0xdc}], 0x9, &(0x7f0000014d80)=""/230, 0xe6, 0xffff}, 0x10000}, {{&(0x7f0000014e80)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000162c0)=[{&(0x7f0000014f00)=""/4096, 0x1000}, {&(0x7f0000015f00)=""/207, 0xcf}, {&(0x7f0000016000)=""/11, 0xb}, {&(0x7f0000016040)=""/171, 0xab}, {&(0x7f0000016100)=""/2, 0x2}, {&(0x7f0000016140)=""/201, 0xc9}, {&(0x7f0000016240)=""/101, 0x65}], 0x7, &(0x7f0000016340)=""/182, 0xb6}, 0xfffffffffffffffb}, {{&(0x7f0000016400)=@alg, 0x80, &(0x7f0000017b00)=[{&(0x7f0000016480)=""/233, 0xe9}, {&(0x7f0000016580)=""/210, 0xd2}, {&(0x7f0000016680)=""/212, 0xd4}, {&(0x7f0000016780)=""/253, 0xfd}, {&(0x7f0000016880)=""/218, 0xda}, {&(0x7f0000016980)=""/163, 0xa3}, {&(0x7f0000016a40)=""/6, 0x6}, {&(0x7f0000016a80)=""/99, 0x63}, {&(0x7f0000016b00)=""/4096, 0x1000}], 0x9, &(0x7f0000017bc0)=""/167, 0xa7, 0x2}, 0x5}, {{0x0, 0x0, &(0x7f0000018440)=[{&(0x7f0000017c80)=""/253, 0xfd}, {&(0x7f0000017d80)=""/206, 0xce}, {&(0x7f0000017e80)=""/7, 0x7}, {&(0x7f0000017ec0)=""/79, 0x4f}, {&(0x7f0000017f40)=""/142, 0x8e}, {&(0x7f0000018000)=""/200, 0xc8}, {&(0x7f0000018100)=""/206, 0xce}, {&(0x7f0000018200)=""/166, 0xa6}, {&(0x7f00000182c0)=""/239, 0xef}, {&(0x7f00000183c0)=""/94, 0x5e}], 0xa, &(0x7f0000018500)=""/32, 0x20, 0x5}, 0x2}, {{&(0x7f0000018540)=@l2, 0x80, &(0x7f0000018880)=[{&(0x7f00000185c0)=""/44, 0x2c}, {&(0x7f0000018600)=""/207, 0xcf}, {&(0x7f0000018700)=""/50, 0x32}, {&(0x7f0000018740)=""/25, 0x19}, {&(0x7f0000018780)=""/140, 0x8c}, {&(0x7f0000018840)=""/36, 0x24}], 0x6, &(0x7f0000018900)=""/35, 0x23, 0xffff}, 0x4}], 0x7, 0x20, &(0x7f0000018b00)={0x77359400}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000018b40)={0x0, @local, @multicast2}, &(0x7f0000018b80)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000018bc0)={'veth1_to_bridge\x00'}) accept$packet(r0, &(0x7f0000018c00), &(0x7f0000018c40)=0x14) accept4(r0, &(0x7f0000018d80)=@hci, &(0x7f0000018e00)=0x80, 0x80800) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:47 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") socket$inet6(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:47 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000400)}, 0x0) 23:59:47 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000091c0)={{{@in=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000092c0)=0xe8) recvmmsg(r0, &(0x7f0000018940)=[{{&(0x7f000000f040)=@hci, 0x80, &(0x7f000000f300)=[{&(0x7f000000f0c0)=""/28, 0x1c}, {&(0x7f000000f100)=""/31, 0x1f}, {&(0x7f000000f140)=""/145, 0x91}, {&(0x7f000000f200)=""/255, 0xff}], 0x4, &(0x7f000000f340)=""/4096, 0x1000, 0x7}, 0x400}, {{&(0x7f0000010340)=@xdp, 0x80, &(0x7f0000012700)=[{&(0x7f00000103c0)=""/4096, 0x1000}, {&(0x7f00000113c0)=""/182, 0xb6}, {&(0x7f0000011480)=""/110, 0x6e}, {&(0x7f0000011500)=""/230, 0xe6}, {&(0x7f0000011600)=""/81, 0x51}, {&(0x7f0000011680)=""/4096, 0x1000}, {&(0x7f0000012680)=""/36, 0x24}, {&(0x7f00000126c0)=""/23, 0x17}], 0x8, &(0x7f0000012780)=""/4096, 0x1000, 0x1000}, 0x6}, {{&(0x7f0000013780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000014cc0)=[{&(0x7f0000013800)=""/5, 0x5}, {&(0x7f0000013840)=""/123, 0x7b}, {&(0x7f00000138c0)=""/74, 0x4a}, {&(0x7f0000013940)=""/14, 0xe}, {&(0x7f0000013980)=""/39, 0x27}, {&(0x7f00000139c0)=""/208, 0xd0}, {&(0x7f0000013ac0)=""/212, 0xd4}, {&(0x7f0000013bc0)=""/4096, 0x1000}, {&(0x7f0000014bc0)=""/220, 0xdc}], 0x9, &(0x7f0000014d80)=""/230, 0xe6, 0xffff}, 0x10000}, {{&(0x7f0000014e80)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000162c0)=[{&(0x7f0000014f00)=""/4096, 0x1000}, {&(0x7f0000015f00)=""/207, 0xcf}, {&(0x7f0000016000)=""/11, 0xb}, {&(0x7f0000016040)=""/171, 0xab}, {&(0x7f0000016100)=""/2, 0x2}, {&(0x7f0000016140)=""/201, 0xc9}, {&(0x7f0000016240)=""/101, 0x65}], 0x7, &(0x7f0000016340)=""/182, 0xb6}, 0xfffffffffffffffb}, {{&(0x7f0000016400)=@alg, 0x80, &(0x7f0000017b00)=[{&(0x7f0000016480)=""/233, 0xe9}, {&(0x7f0000016580)=""/210, 0xd2}, {&(0x7f0000016680)=""/212, 0xd4}, {&(0x7f0000016780)=""/253, 0xfd}, {&(0x7f0000016880)=""/218, 0xda}, {&(0x7f0000016980)=""/163, 0xa3}, {&(0x7f0000016a40)=""/6, 0x6}, {&(0x7f0000016a80)=""/99, 0x63}, {&(0x7f0000016b00)=""/4096, 0x1000}], 0x9, &(0x7f0000017bc0)=""/167, 0xa7, 0x2}, 0x5}, {{0x0, 0x0, &(0x7f0000018440)=[{&(0x7f0000017c80)=""/253, 0xfd}, {&(0x7f0000017d80)=""/206, 0xce}, {&(0x7f0000017e80)=""/7, 0x7}, {&(0x7f0000017ec0)=""/79, 0x4f}, {&(0x7f0000017f40)=""/142, 0x8e}, {&(0x7f0000018000)=""/200, 0xc8}, {&(0x7f0000018100)=""/206, 0xce}, {&(0x7f0000018200)=""/166, 0xa6}, {&(0x7f00000182c0)=""/239, 0xef}, {&(0x7f00000183c0)=""/94, 0x5e}], 0xa, &(0x7f0000018500)=""/32, 0x20, 0x5}, 0x2}, {{&(0x7f0000018540)=@l2, 0x80, &(0x7f0000018880)=[{&(0x7f00000185c0)=""/44, 0x2c}, {&(0x7f0000018600)=""/207, 0xcf}, {&(0x7f0000018700)=""/50, 0x32}, {&(0x7f0000018740)=""/25, 0x19}, {&(0x7f0000018780)=""/140, 0x8c}, {&(0x7f0000018840)=""/36, 0x24}], 0x6, &(0x7f0000018900)=""/35, 0x23, 0xffff}, 0x4}], 0x7, 0x20, &(0x7f0000018b00)={0x77359400}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000018b40)={0x0, @local, @multicast2}, &(0x7f0000018b80)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000018bc0)={'veth1_to_bridge\x00'}) accept$packet(r0, &(0x7f0000018c00), &(0x7f0000018c40)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:47 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000400)}, 0x0) 23:59:47 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 229.137481] IPVS: length: 245 != 8 23:59:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000000c0)=""/245, &(0x7f00000001c0)=0xf5) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 23:59:48 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x100, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x0, 0x0, 0x20000000000014, 0x0, 0x0}, 0x1db) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000180)={0x0, @speck128, 0x1, "07152ed13c47adb6"}) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dsp\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0063404000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000084f06f9254a70422c89c602ef362ef9341e9326e75095f16b241d80316559f2a4f48137da37be9609c16b1963c2566ec9782485607a956bfe6b7f4b1d501360f45802ae01939e18a418757c2ad4da0b5655e952ad7925f2fb766be84e2994506d131a53de96cc0539df13cb6d7bfdb9cf7d5da2fac00002d4f892f2affff0a09d265defa9aba9c6028f1034e0a6d8c0319fc4f5cef2eb94f9b954e45d250071c93a697c88f9df8df7d75e76ba35df62bf2c4b6c6038cc79c32aaa3e66af6d76c9511f800e75f266554a0afdbbf40e628457778e58437c4ea5bfd22ba2d3d84007af950a9f1e9aaec2540bdc793b1d8ccf50cc40a31c9af0e5c1fd87afec581440f381e9cca2189349e999beb3e7bfc274d929dd6969421412eac90b6b204e91b736f2e7adf175e1b402c9179827c995d67d2f05c36d0ca26b2262cf15c55015af74a4d1fd4b6ff8352a67fe7c712ea6b9edd38bd3a3a568143bcc826648be07552f4aa67c6689e2dd5e3ef1ef327cef921775ee26bd4883509fd8f2c585503a9be2f15960000000000000038bc67ca93151cc4779f6ea06f6d8dcd0075648c6c83f85a8254faefac0958c392d1e516251aabe5f44604608accfd4df8ff7b2cf0e17cedcc4424c0e92ca02b057bd915a0385db147ba5e3c01ef7951633fbe42909e6297bf58f2e2bae7ce1d229d392f44a450375369e71498da465f4b0984a2dba510744e766710b0a3841fd70858cd9bb637c311bfd448451c3708af943a895012fccb89e010353d68d97306bc7ca847982200", @ANYPTR=&(0x7f00000005c0)=ANY=[], @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']], 0x7f, 0x0, &(0x7f00000000c0)="1ef31dc527bc996348b138280d18fa4122eac90090c2dfb8fdc22c21100ef154656c5faeff6f84fbe70175c0f2f7a5615c186e6179bf42947ec733527a5eb5dc27edfa7881142199fd95209e0cea1d228db81953e778689769a5b573e62c0ae6fe853e5415253f0d0756d1b450dbaebc89d08ee6759b919e8c8e8e42d35dc7"}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0xfd4}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000280)={r5, 0xffff, 0x800, 0xfff, 0x80, 0x6}, 0x14) 23:59:48 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000400)}, 0x0) 23:59:48 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), 0x4) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x80000, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f00000001c0), 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000380)={0x0, @rand_addr, @multicast1}, &(0x7f00000003c0)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xf, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000700000000000000060000005a30f4fffcffffffffffffffff0000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0xf92, 0xfb, &(0x7f0000000280)=""/251, 0x41f00, 0x1, [], r1, 0xb}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in=@loopback, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000740)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x21, &(0x7f00000009c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000600), 0xffffffffffffffff) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000480)={0x39, 0x0, 0x2e, 0x1, 0x5, 0x5}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000000000000071260000000000006706000002000000bf25000000000000620500000e0000007365000000000000bf540000000000000704000004faff003d4301000000000095000000000000005d54090000000000bf250000000000000f65000000000000070500000e000000bf5400000000000007040000040000003d4301000000000095000000000000006154000000000000bf25000000000000070500000e0000001f6500000000000007050000040000000f65000000000000bf5400000000000007040000040000003d3201000000000095000000000000004d54000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000bc0)={{0x0, @empty, 0x0, 0x0, 'lc\x00', 0x0, 0xff, 0x3b}, {@loopback, 0x4e24, 0x1}}, 0x44) 23:59:48 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000091c0)={{{@in=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000092c0)=0xe8) recvmmsg(r0, &(0x7f0000018940)=[{{&(0x7f000000f040)=@hci, 0x80, &(0x7f000000f300)=[{&(0x7f000000f0c0)=""/28, 0x1c}, {&(0x7f000000f100)=""/31, 0x1f}, {&(0x7f000000f140)=""/145, 0x91}, {&(0x7f000000f200)=""/255, 0xff}], 0x4, &(0x7f000000f340)=""/4096, 0x1000, 0x7}, 0x400}, {{&(0x7f0000010340)=@xdp, 0x80, &(0x7f0000012700)=[{&(0x7f00000103c0)=""/4096, 0x1000}, {&(0x7f00000113c0)=""/182, 0xb6}, {&(0x7f0000011480)=""/110, 0x6e}, {&(0x7f0000011500)=""/230, 0xe6}, {&(0x7f0000011600)=""/81, 0x51}, {&(0x7f0000011680)=""/4096, 0x1000}, {&(0x7f0000012680)=""/36, 0x24}, {&(0x7f00000126c0)=""/23, 0x17}], 0x8, &(0x7f0000012780)=""/4096, 0x1000, 0x1000}, 0x6}, {{&(0x7f0000013780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000014cc0)=[{&(0x7f0000013800)=""/5, 0x5}, {&(0x7f0000013840)=""/123, 0x7b}, {&(0x7f00000138c0)=""/74, 0x4a}, {&(0x7f0000013940)=""/14, 0xe}, {&(0x7f0000013980)=""/39, 0x27}, {&(0x7f00000139c0)=""/208, 0xd0}, {&(0x7f0000013ac0)=""/212, 0xd4}, {&(0x7f0000013bc0)=""/4096, 0x1000}, {&(0x7f0000014bc0)=""/220, 0xdc}], 0x9, &(0x7f0000014d80)=""/230, 0xe6, 0xffff}, 0x10000}, {{&(0x7f0000014e80)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000162c0)=[{&(0x7f0000014f00)=""/4096, 0x1000}, {&(0x7f0000015f00)=""/207, 0xcf}, {&(0x7f0000016000)=""/11, 0xb}, {&(0x7f0000016040)=""/171, 0xab}, {&(0x7f0000016100)=""/2, 0x2}, {&(0x7f0000016140)=""/201, 0xc9}, {&(0x7f0000016240)=""/101, 0x65}], 0x7, &(0x7f0000016340)=""/182, 0xb6}, 0xfffffffffffffffb}, {{&(0x7f0000016400)=@alg, 0x80, &(0x7f0000017b00)=[{&(0x7f0000016480)=""/233, 0xe9}, {&(0x7f0000016580)=""/210, 0xd2}, {&(0x7f0000016680)=""/212, 0xd4}, {&(0x7f0000016780)=""/253, 0xfd}, {&(0x7f0000016880)=""/218, 0xda}, {&(0x7f0000016980)=""/163, 0xa3}, {&(0x7f0000016a40)=""/6, 0x6}, {&(0x7f0000016a80)=""/99, 0x63}, {&(0x7f0000016b00)=""/4096, 0x1000}], 0x9, &(0x7f0000017bc0)=""/167, 0xa7, 0x2}, 0x5}, {{0x0, 0x0, &(0x7f0000018440)=[{&(0x7f0000017c80)=""/253, 0xfd}, {&(0x7f0000017d80)=""/206, 0xce}, {&(0x7f0000017e80)=""/7, 0x7}, {&(0x7f0000017ec0)=""/79, 0x4f}, {&(0x7f0000017f40)=""/142, 0x8e}, {&(0x7f0000018000)=""/200, 0xc8}, {&(0x7f0000018100)=""/206, 0xce}, {&(0x7f0000018200)=""/166, 0xa6}, {&(0x7f00000182c0)=""/239, 0xef}, {&(0x7f00000183c0)=""/94, 0x5e}], 0xa, &(0x7f0000018500)=""/32, 0x20, 0x5}, 0x2}, {{&(0x7f0000018540)=@l2, 0x80, &(0x7f0000018880)=[{&(0x7f00000185c0)=""/44, 0x2c}, {&(0x7f0000018600)=""/207, 0xcf}, {&(0x7f0000018700)=""/50, 0x32}, {&(0x7f0000018740)=""/25, 0x19}, {&(0x7f0000018780)=""/140, 0x8c}, {&(0x7f0000018840)=""/36, 0x24}], 0x6, &(0x7f0000018900)=""/35, 0x23, 0xffff}, 0x4}], 0x7, 0x20, &(0x7f0000018b00)={0x77359400}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000018b40)={0x0, @local, @multicast2}, &(0x7f0000018b80)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000018bc0)={'veth1_to_bridge\x00'}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:48 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:48 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)}], 0x1, &(0x7f0000000400)}, 0x0) [ 229.580032] IPVS: length: 245 != 8 [ 229.584612] binder: 8221:8222 got transaction to context manager from process owning it 23:59:48 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x00\x00u\x00'}) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x80, 0x80000) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x0, @mcast1}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) [ 229.626839] binder: 8221:8222 transaction failed 29201/-22, size 0-8 line 2846 23:59:48 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:48 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 229.683621] binder: BINDER_SET_CONTEXT_MGR already set [ 229.700032] binder_alloc: 8221: binder_alloc_buf, no vma 23:59:48 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000091c0)={{{@in=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000092c0)=0xe8) recvmmsg(r0, &(0x7f0000018940)=[{{&(0x7f000000f040)=@hci, 0x80, &(0x7f000000f300)=[{&(0x7f000000f0c0)=""/28, 0x1c}, {&(0x7f000000f100)=""/31, 0x1f}, {&(0x7f000000f140)=""/145, 0x91}, {&(0x7f000000f200)=""/255, 0xff}], 0x4, &(0x7f000000f340)=""/4096, 0x1000, 0x7}, 0x400}, {{&(0x7f0000010340)=@xdp, 0x80, &(0x7f0000012700)=[{&(0x7f00000103c0)=""/4096, 0x1000}, {&(0x7f00000113c0)=""/182, 0xb6}, {&(0x7f0000011480)=""/110, 0x6e}, {&(0x7f0000011500)=""/230, 0xe6}, {&(0x7f0000011600)=""/81, 0x51}, {&(0x7f0000011680)=""/4096, 0x1000}, {&(0x7f0000012680)=""/36, 0x24}, {&(0x7f00000126c0)=""/23, 0x17}], 0x8, &(0x7f0000012780)=""/4096, 0x1000, 0x1000}, 0x6}, {{&(0x7f0000013780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000014cc0)=[{&(0x7f0000013800)=""/5, 0x5}, {&(0x7f0000013840)=""/123, 0x7b}, {&(0x7f00000138c0)=""/74, 0x4a}, {&(0x7f0000013940)=""/14, 0xe}, {&(0x7f0000013980)=""/39, 0x27}, {&(0x7f00000139c0)=""/208, 0xd0}, {&(0x7f0000013ac0)=""/212, 0xd4}, {&(0x7f0000013bc0)=""/4096, 0x1000}, {&(0x7f0000014bc0)=""/220, 0xdc}], 0x9, &(0x7f0000014d80)=""/230, 0xe6, 0xffff}, 0x10000}, {{&(0x7f0000014e80)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000162c0)=[{&(0x7f0000014f00)=""/4096, 0x1000}, {&(0x7f0000015f00)=""/207, 0xcf}, {&(0x7f0000016000)=""/11, 0xb}, {&(0x7f0000016040)=""/171, 0xab}, {&(0x7f0000016100)=""/2, 0x2}, {&(0x7f0000016140)=""/201, 0xc9}, {&(0x7f0000016240)=""/101, 0x65}], 0x7, &(0x7f0000016340)=""/182, 0xb6}, 0xfffffffffffffffb}, {{&(0x7f0000016400)=@alg, 0x80, &(0x7f0000017b00)=[{&(0x7f0000016480)=""/233, 0xe9}, {&(0x7f0000016580)=""/210, 0xd2}, {&(0x7f0000016680)=""/212, 0xd4}, {&(0x7f0000016780)=""/253, 0xfd}, {&(0x7f0000016880)=""/218, 0xda}, {&(0x7f0000016980)=""/163, 0xa3}, {&(0x7f0000016a40)=""/6, 0x6}, {&(0x7f0000016a80)=""/99, 0x63}, {&(0x7f0000016b00)=""/4096, 0x1000}], 0x9, &(0x7f0000017bc0)=""/167, 0xa7, 0x2}, 0x5}, {{0x0, 0x0, &(0x7f0000018440)=[{&(0x7f0000017c80)=""/253, 0xfd}, {&(0x7f0000017d80)=""/206, 0xce}, {&(0x7f0000017e80)=""/7, 0x7}, {&(0x7f0000017ec0)=""/79, 0x4f}, {&(0x7f0000017f40)=""/142, 0x8e}, {&(0x7f0000018000)=""/200, 0xc8}, {&(0x7f0000018100)=""/206, 0xce}, {&(0x7f0000018200)=""/166, 0xa6}, {&(0x7f00000182c0)=""/239, 0xef}, {&(0x7f00000183c0)=""/94, 0x5e}], 0xa, &(0x7f0000018500)=""/32, 0x20, 0x5}, 0x2}, {{&(0x7f0000018540)=@l2, 0x80, &(0x7f0000018880)=[{&(0x7f00000185c0)=""/44, 0x2c}, {&(0x7f0000018600)=""/207, 0xcf}, {&(0x7f0000018700)=""/50, 0x32}, {&(0x7f0000018740)=""/25, 0x19}, {&(0x7f0000018780)=""/140, 0x8c}, {&(0x7f0000018840)=""/36, 0x24}], 0x6, &(0x7f0000018900)=""/35, 0x23, 0xffff}, 0x4}], 0x7, 0x20, &(0x7f0000018b00)={0x77359400}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000018b40)={0x0, @local, @multicast2}, &(0x7f0000018b80)=0xc) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 229.728451] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.735661] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.762412] binder: 8221:8232 ioctl 40046207 0 returned -16 [ 229.777902] binder: 8221:8233 transaction failed 29189/-3, size 0-8 line 2970 [ 229.791267] device bridge0 left promiscuous mode 23:59:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000013c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/protocols\x00') r1 = socket(0x1e, 0x1, 0x0) getsockopt(r1, 0x800000010f, 0x7f, &(0x7f0000000000), &(0x7f0000000080)=0xffffffffffffffc3) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x6c00) ioctl$KDDISABIO(r0, 0x4b37) 23:59:48 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:48 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="56df4cc2a3788ce661de34fb0c63d571", 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="2e605039f4fa3843e59ac74af0d18b1b", 0x10) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000340)) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x9c, r2, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x9}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r0}, {0x8, 0x1, r1}, {0x8, 0x1, r1}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xd}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x837}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 23:59:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000013c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/protocols\x00') r1 = socket(0x1e, 0x1, 0x0) getsockopt(r1, 0x800000010f, 0x7f, &(0x7f0000000000), &(0x7f0000000080)=0xffffffffffffffc3) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x6c00) ioctl$KDDISABIO(r0, 0x4b37) 23:59:48 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:48 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000091c0)={{{@in=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000092c0)=0xe8) recvmmsg(r0, &(0x7f0000018940)=[{{&(0x7f000000f040)=@hci, 0x80, &(0x7f000000f300)=[{&(0x7f000000f0c0)=""/28, 0x1c}, {&(0x7f000000f100)=""/31, 0x1f}, {&(0x7f000000f140)=""/145, 0x91}, {&(0x7f000000f200)=""/255, 0xff}], 0x4, &(0x7f000000f340)=""/4096, 0x1000, 0x7}, 0x400}, {{&(0x7f0000010340)=@xdp, 0x80, &(0x7f0000012700)=[{&(0x7f00000103c0)=""/4096, 0x1000}, {&(0x7f00000113c0)=""/182, 0xb6}, {&(0x7f0000011480)=""/110, 0x6e}, {&(0x7f0000011500)=""/230, 0xe6}, {&(0x7f0000011600)=""/81, 0x51}, {&(0x7f0000011680)=""/4096, 0x1000}, {&(0x7f0000012680)=""/36, 0x24}, {&(0x7f00000126c0)=""/23, 0x17}], 0x8, &(0x7f0000012780)=""/4096, 0x1000, 0x1000}, 0x6}, {{&(0x7f0000013780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000014cc0)=[{&(0x7f0000013800)=""/5, 0x5}, {&(0x7f0000013840)=""/123, 0x7b}, {&(0x7f00000138c0)=""/74, 0x4a}, {&(0x7f0000013940)=""/14, 0xe}, {&(0x7f0000013980)=""/39, 0x27}, {&(0x7f00000139c0)=""/208, 0xd0}, {&(0x7f0000013ac0)=""/212, 0xd4}, {&(0x7f0000013bc0)=""/4096, 0x1000}, {&(0x7f0000014bc0)=""/220, 0xdc}], 0x9, &(0x7f0000014d80)=""/230, 0xe6, 0xffff}, 0x10000}, {{&(0x7f0000014e80)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000162c0)=[{&(0x7f0000014f00)=""/4096, 0x1000}, {&(0x7f0000015f00)=""/207, 0xcf}, {&(0x7f0000016000)=""/11, 0xb}, {&(0x7f0000016040)=""/171, 0xab}, {&(0x7f0000016100)=""/2, 0x2}, {&(0x7f0000016140)=""/201, 0xc9}, {&(0x7f0000016240)=""/101, 0x65}], 0x7, &(0x7f0000016340)=""/182, 0xb6}, 0xfffffffffffffffb}, {{&(0x7f0000016400)=@alg, 0x80, &(0x7f0000017b00)=[{&(0x7f0000016480)=""/233, 0xe9}, {&(0x7f0000016580)=""/210, 0xd2}, {&(0x7f0000016680)=""/212, 0xd4}, {&(0x7f0000016780)=""/253, 0xfd}, {&(0x7f0000016880)=""/218, 0xda}, {&(0x7f0000016980)=""/163, 0xa3}, {&(0x7f0000016a40)=""/6, 0x6}, {&(0x7f0000016a80)=""/99, 0x63}, {&(0x7f0000016b00)=""/4096, 0x1000}], 0x9, &(0x7f0000017bc0)=""/167, 0xa7, 0x2}, 0x5}, {{0x0, 0x0, &(0x7f0000018440)=[{&(0x7f0000017c80)=""/253, 0xfd}, {&(0x7f0000017d80)=""/206, 0xce}, {&(0x7f0000017e80)=""/7, 0x7}, {&(0x7f0000017ec0)=""/79, 0x4f}, {&(0x7f0000017f40)=""/142, 0x8e}, {&(0x7f0000018000)=""/200, 0xc8}, {&(0x7f0000018100)=""/206, 0xce}, {&(0x7f0000018200)=""/166, 0xa6}, {&(0x7f00000182c0)=""/239, 0xef}, {&(0x7f00000183c0)=""/94, 0x5e}], 0xa, &(0x7f0000018500)=""/32, 0x20, 0x5}, 0x2}, {{&(0x7f0000018540)=@l2, 0x80, &(0x7f0000018880)=[{&(0x7f00000185c0)=""/44, 0x2c}, {&(0x7f0000018600)=""/207, 0xcf}, {&(0x7f0000018700)=""/50, 0x32}, {&(0x7f0000018740)=""/25, 0x19}, {&(0x7f0000018780)=""/140, 0x8c}, {&(0x7f0000018840)=""/36, 0x24}], 0x6, &(0x7f0000018900)=""/35, 0x23, 0xffff}, 0x4}], 0x7, 0x20, &(0x7f0000018b00)={0x77359400}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000018b40)={0x0, @local, @multicast2}, &(0x7f0000018b80)=0xc) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[], 0xa4}}, 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="020400000c0000000000faffffffffff0100010000000000000000000000000005000600000000000a00000000000000ff0200000000000000000000000000010000000000000000030005000000000002000000e00000010000000000000000"], 0x60}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x86440, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x43, 0x37, 0x2, {0x0, 0x400, 0x9, r3, 0x25, '-,posix_acl_accesseth0GPLeth0Xtrusted'}}, 0x43) 23:59:49 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="0180c2fd0000aaa9e7209167af12373c4b0000981caaaaaaaadcd5dd60093a0600082c00fe8000000000000000000000000000bbff020000000000000000c560c47262a6db7fcd71eb5ccb8397a971c678bca8a26f1d83f1a6d4c07824a4205b14f8276df13d14879f68c504a3ba4cf3067da2f19da8abc2535dc3ae79af8ee4813ac8482ee969404e07a50e7f1684ec2c28d8ae666b59f0916d8d8d9ed59c0024fad8baf02e06297b3e49b5d56d9934e527a46ce5cc4a4cad72382f68dbc68a48134eda017973352ff837c3b6a88809"], &(0x7f0000000100)={0x4, 0x200000000001, [0x0, 0x4, 0x800000000000000]}) [ 230.556540] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.563077] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.569739] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.576174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.583224] device bridge0 entered promiscuous mode [ 230.588859] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.595655] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.602116] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.608546] device bridge0 left promiscuous mode 23:59:49 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:49 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000091c0)={{{@in=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000092c0)=0xe8) recvmmsg(r0, &(0x7f0000018940)=[{{&(0x7f000000f040)=@hci, 0x80, &(0x7f000000f300)=[{&(0x7f000000f0c0)=""/28, 0x1c}, {&(0x7f000000f100)=""/31, 0x1f}, {&(0x7f000000f140)=""/145, 0x91}, {&(0x7f000000f200)=""/255, 0xff}], 0x4, &(0x7f000000f340)=""/4096, 0x1000, 0x7}, 0x400}, {{&(0x7f0000010340)=@xdp, 0x80, &(0x7f0000012700)=[{&(0x7f00000103c0)=""/4096, 0x1000}, {&(0x7f00000113c0)=""/182, 0xb6}, {&(0x7f0000011480)=""/110, 0x6e}, {&(0x7f0000011500)=""/230, 0xe6}, {&(0x7f0000011600)=""/81, 0x51}, {&(0x7f0000011680)=""/4096, 0x1000}, {&(0x7f0000012680)=""/36, 0x24}, {&(0x7f00000126c0)=""/23, 0x17}], 0x8, &(0x7f0000012780)=""/4096, 0x1000, 0x1000}, 0x6}, {{&(0x7f0000013780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000014cc0)=[{&(0x7f0000013800)=""/5, 0x5}, {&(0x7f0000013840)=""/123, 0x7b}, {&(0x7f00000138c0)=""/74, 0x4a}, {&(0x7f0000013940)=""/14, 0xe}, {&(0x7f0000013980)=""/39, 0x27}, {&(0x7f00000139c0)=""/208, 0xd0}, {&(0x7f0000013ac0)=""/212, 0xd4}, {&(0x7f0000013bc0)=""/4096, 0x1000}, {&(0x7f0000014bc0)=""/220, 0xdc}], 0x9, &(0x7f0000014d80)=""/230, 0xe6, 0xffff}, 0x10000}, {{&(0x7f0000014e80)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000162c0)=[{&(0x7f0000014f00)=""/4096, 0x1000}, {&(0x7f0000015f00)=""/207, 0xcf}, {&(0x7f0000016000)=""/11, 0xb}, {&(0x7f0000016040)=""/171, 0xab}, {&(0x7f0000016100)=""/2, 0x2}, {&(0x7f0000016140)=""/201, 0xc9}, {&(0x7f0000016240)=""/101, 0x65}], 0x7, &(0x7f0000016340)=""/182, 0xb6}, 0xfffffffffffffffb}, {{&(0x7f0000016400)=@alg, 0x80, &(0x7f0000017b00)=[{&(0x7f0000016480)=""/233, 0xe9}, {&(0x7f0000016580)=""/210, 0xd2}, {&(0x7f0000016680)=""/212, 0xd4}, {&(0x7f0000016780)=""/253, 0xfd}, {&(0x7f0000016880)=""/218, 0xda}, {&(0x7f0000016980)=""/163, 0xa3}, {&(0x7f0000016a40)=""/6, 0x6}, {&(0x7f0000016a80)=""/99, 0x63}, {&(0x7f0000016b00)=""/4096, 0x1000}], 0x9, &(0x7f0000017bc0)=""/167, 0xa7, 0x2}, 0x5}, {{0x0, 0x0, &(0x7f0000018440)=[{&(0x7f0000017c80)=""/253, 0xfd}, {&(0x7f0000017d80)=""/206, 0xce}, {&(0x7f0000017e80)=""/7, 0x7}, {&(0x7f0000017ec0)=""/79, 0x4f}, {&(0x7f0000017f40)=""/142, 0x8e}, {&(0x7f0000018000)=""/200, 0xc8}, {&(0x7f0000018100)=""/206, 0xce}, {&(0x7f0000018200)=""/166, 0xa6}, {&(0x7f00000182c0)=""/239, 0xef}, {&(0x7f00000183c0)=""/94, 0x5e}], 0xa, &(0x7f0000018500)=""/32, 0x20, 0x5}, 0x2}, {{&(0x7f0000018540)=@l2, 0x80, &(0x7f0000018880)=[{&(0x7f00000185c0)=""/44, 0x2c}, {&(0x7f0000018600)=""/207, 0xcf}, {&(0x7f0000018700)=""/50, 0x32}, {&(0x7f0000018740)=""/25, 0x19}, {&(0x7f0000018780)=""/140, 0x8c}, {&(0x7f0000018840)=""/36, 0x24}], 0x6, &(0x7f0000018900)=""/35, 0x23, 0xffff}, 0x4}], 0x7, 0x20, &(0x7f0000018b00)={0x77359400}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:49 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x00\x00u\x00'}) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x80, 0x80000) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e21, 0x0, @mcast1}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 23:59:49 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) dup3(r0, r1, 0x0) 23:59:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"6200080001000000efcc32d000", 0x100000000b}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000001c0)) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x9, 0x600000) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000140)={0x0, 0x5}, 0x2) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1, 0x402) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x10000, 0x0) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000040)=0xffffffffffffff00) 23:59:49 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') getdents64(r0, &(0x7f0000000040)=""/45, 0x2d) getdents64(r0, &(0x7f00000000c0)=""/40, 0xfffffffffffffdf9) 23:59:49 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005", 0x2b}], 0x1, &(0x7f0000000400)}, 0x0) [ 230.738596] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.745330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.753295] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.760119] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.783408] device bridge0 entered promiscuous mode 23:59:49 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x9, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000300)={@dev={0xac, 0x14, 0x14, 0x18}, @broadcast, 0x1, 0x4, [@remote, @multicast2, @local, @dev={0xac, 0x14, 0x14, 0x1e}]}, 0x20) write$P9_RREADDIR(r1, &(0x7f0000000480)={0x2a, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r1, &(0x7f00000003c0)={0xb, 0x29, 0x1}, 0xb) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}]}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='system.sockprotoname\x00') 23:59:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x4e22, 0x2, @remote}, 0x608, [0x9, 0x0, 0x10001, 0x8, 0x0, 0x0, 0x2, 0x80]}, 0x5c) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000680)={0x0, 0xb4, 0x20, 0x8, 0x3ff}, &(0x7f00000006c0)=0x18) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000700)={r2}, &(0x7f0000000740)=0x8) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000780)={0x2, 'bond_slave_0\x00', 0x3}, 0x18) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="000007007301000052010000ffffffff7900000000000000000000000000002b5144b3143ecdbf35c6e47c791f4ade381c3fdd0dd1c2847e38de1d011e772e36fd1a4fe501b362b0ae7854cdaad59c34e4076482195afe14688f7c8d9e58461082c96e271dd2e6c52018d1cff96d4e23d9853f8ac0eda42f324a1e1590447ec9a7b58757a01b264117ef55a1d60bea94457b6fbb2aa86a05f0cf0fca44b56ba45670df23536bc1c1e4b3741651030559d1e52bc4e36ff5"], 0xb7) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x157) r4 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) r5 = semget(0x1, 0x4, 0x8) semctl$GETNCNT(r5, 0x2, 0xe, &(0x7f00000007c0)=""/241) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x7, 0x2, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0xbfd8]}) io_setup(0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000480)={0x0, 0x8001}, &(0x7f00000004c0)=0x8) 23:59:49 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 230.800205] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 23:59:49 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005", 0x2b}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:49 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000091c0)={{{@in=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000092c0)=0xe8) recvmmsg(r0, &(0x7f0000018940)=[{{&(0x7f000000f040)=@hci, 0x80, &(0x7f000000f300)=[{&(0x7f000000f0c0)=""/28, 0x1c}, {&(0x7f000000f100)=""/31, 0x1f}, {&(0x7f000000f140)=""/145, 0x91}, {&(0x7f000000f200)=""/255, 0xff}], 0x4, &(0x7f000000f340)=""/4096, 0x1000, 0x7}, 0x400}, {{&(0x7f0000010340)=@xdp, 0x80, &(0x7f0000012700)=[{&(0x7f00000103c0)=""/4096, 0x1000}, {&(0x7f00000113c0)=""/182, 0xb6}, {&(0x7f0000011480)=""/110, 0x6e}, {&(0x7f0000011500)=""/230, 0xe6}, {&(0x7f0000011600)=""/81, 0x51}, {&(0x7f0000011680)=""/4096, 0x1000}, {&(0x7f0000012680)=""/36, 0x24}, {&(0x7f00000126c0)=""/23, 0x17}], 0x8, &(0x7f0000012780)=""/4096, 0x1000, 0x1000}, 0x6}, {{&(0x7f0000013780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000014cc0)=[{&(0x7f0000013800)=""/5, 0x5}, {&(0x7f0000013840)=""/123, 0x7b}, {&(0x7f00000138c0)=""/74, 0x4a}, {&(0x7f0000013940)=""/14, 0xe}, {&(0x7f0000013980)=""/39, 0x27}, {&(0x7f00000139c0)=""/208, 0xd0}, {&(0x7f0000013ac0)=""/212, 0xd4}, {&(0x7f0000013bc0)=""/4096, 0x1000}, {&(0x7f0000014bc0)=""/220, 0xdc}], 0x9, &(0x7f0000014d80)=""/230, 0xe6, 0xffff}, 0x10000}, {{&(0x7f0000014e80)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000162c0)=[{&(0x7f0000014f00)=""/4096, 0x1000}, {&(0x7f0000015f00)=""/207, 0xcf}, {&(0x7f0000016000)=""/11, 0xb}, {&(0x7f0000016040)=""/171, 0xab}, {&(0x7f0000016100)=""/2, 0x2}, {&(0x7f0000016140)=""/201, 0xc9}, {&(0x7f0000016240)=""/101, 0x65}], 0x7, &(0x7f0000016340)=""/182, 0xb6}, 0xfffffffffffffffb}, {{&(0x7f0000016400)=@alg, 0x80, &(0x7f0000017b00)=[{&(0x7f0000016480)=""/233, 0xe9}, {&(0x7f0000016580)=""/210, 0xd2}, {&(0x7f0000016680)=""/212, 0xd4}, {&(0x7f0000016780)=""/253, 0xfd}, {&(0x7f0000016880)=""/218, 0xda}, {&(0x7f0000016980)=""/163, 0xa3}, {&(0x7f0000016a40)=""/6, 0x6}, {&(0x7f0000016a80)=""/99, 0x63}, {&(0x7f0000016b00)=""/4096, 0x1000}], 0x9, &(0x7f0000017bc0)=""/167, 0xa7, 0x2}, 0x5}, {{0x0, 0x0, &(0x7f0000018440)=[{&(0x7f0000017c80)=""/253, 0xfd}, {&(0x7f0000017d80)=""/206, 0xce}, {&(0x7f0000017e80)=""/7, 0x7}, {&(0x7f0000017ec0)=""/79, 0x4f}, {&(0x7f0000017f40)=""/142, 0x8e}, {&(0x7f0000018000)=""/200, 0xc8}, {&(0x7f0000018100)=""/206, 0xce}, {&(0x7f0000018200)=""/166, 0xa6}, {&(0x7f00000182c0)=""/239, 0xef}, {&(0x7f00000183c0)=""/94, 0x5e}], 0xa, &(0x7f0000018500)=""/32, 0x20, 0x5}, 0x2}, {{&(0x7f0000018540)=@l2, 0x80, &(0x7f0000018880)=[{&(0x7f00000185c0)=""/44, 0x2c}, {&(0x7f0000018600)=""/207, 0xcf}, {&(0x7f0000018700)=""/50, 0x32}, {&(0x7f0000018740)=""/25, 0x19}, {&(0x7f0000018780)=""/140, 0x8c}, {&(0x7f0000018840)=""/36, 0x24}], 0x6, &(0x7f0000018900)=""/35, 0x23, 0xffff}, 0x4}], 0x7, 0x20, &(0x7f0000018b00)={0x77359400}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:49 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="4100000000000000000000000000000000000000000000000065057e00000000000037070071cb16984e62b2dbc5c84529f20d4e35000000"]}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e22, 0x3, @ipv4={[], [], @remote}, 0x401}, {0xa, 0x4e22, 0x2, @loopback, 0x1ff}, 0x1, [0xffffffff, 0x101, 0x9, 0x55b, 0x8, 0x1, 0x2, 0x9]}, 0x5c) close(r2) close(r1) 23:59:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='pids.current\x00', 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x4000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r1, r2, 0x8, 0x2}, 0x10) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000040)={'nat\x00', 0x65, "2ffb396dc3e9c82e1f6c499c2b05db73e87a9b5f749a081f52eb87a7671668d07d7807ebf5c85ac7474f5a404727f2757345635798bc26ef340c6ae51a5c13269270aae722e817bcea97c690939a99dcd6d9b502d16f6bdf0d0db648103f2f867279e31d8d"}, &(0x7f0000000140)=0x89) 23:59:49 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005", 0x2b}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:49 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:49 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x3, 0x4, @ipv4={[], [], @broadcast}, 0x81}, {0xa, 0x4e20, 0x8, @remote, 0x6}, 0x4, [0xff, 0xb952, 0x1ff, 0xa9bb, 0x200, 0x0, 0x4]}, 0x5c) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xfffffffffffffff8, 0x0) write$P9_RREADDIR(r1, &(0x7f0000001780)={0x2a, 0x29, 0x2, {0xa2, [{{0x20, 0x3, 0x3}, 0x7, 0x37, 0x7, './file0'}]}}, 0x2a) setrlimit(0x1, &(0x7f00000017c0)={0xfffffffffffff}) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0xffffffffffffffff) sendmmsg(r0, &(0x7f0000001700)=[{{&(0x7f0000000140)=@xdp={0x2c, 0x4, 0x0, 0x2d}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)="31607f83059a14864490881ef527a62c404e38ffd82804f17fd38d182ce76769cb1bea3565c8b871bb67370bf6f02a60b6c934d1a227fcf342b67beba851011ccaf6f19d6b17d4efceadec205d9659f2ffee07c9b6e39c00c0584f6fa7ff0b901bf5cbfed9e29a70e0022fb3a59354c7cf37e5fc86d52dd0c030d187cd439d1be74b74e11b85c72d37ef9a3823ff6c1f08ba3fd992b55ae445edf0b343ddd41e6939dfa0fc06f891a9089243b23bd19b6713bee3bab209284c1da39156e0695ecde6e64cfb0c64ecb9da3d3a056af97bf6d6b25784cf541720beb55ed6be928faeb5739cb420", 0xe6}, {&(0x7f00000001c0)="40e8e5f0e02b8cb8ced27debac1bdb", 0xf}], 0x2, &(0x7f00000003c0)=[{0xb0, 0x108, 0x0, "e79621c1315e330d47a64408625dcc0b3fe9e5b59198c615651a98a239dba05df0072ed7e8437edfbc63ac2e5e177592aa316deca8e4137383afcfbe3ee5234f03664d62c4aa1ee52c31e6084ebde38d5dbc7d074c93845f66d51107e891f29f9841dd6a9d4d3e8d324cdc676cfe27302878a29dce4384084819c3ed0755aaaa8edec6e3cc4751196468f1fcbf5afedfeb70caecdf118211d1006caf3da93f97"}, {0x1010, 0xff, 0x3, "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"}], 0x10c0, 0x40000}, 0x5}, {{&(0x7f0000001480)=@nfc_llcp={0x27, 0x1, 0x1, 0x5, 0x9, 0x3, "092ccf0216a4a9f3c6f3cbed47ea1e1fe9e53f3b22b64471ee7ccb41b33d72d2c3707ba9230574ee266ceee1e46547bfc4722608ec193d9d08a536e5a3d68d", 0x1b}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000001500)="1bc9bf88c5b27dafd43643ffe86adedcf2122cd6265f49d485b24cbc488c2894c2a532d009badebcf73fad17f619c10b8c023baab12133e50398bf773e9ff2dfd076ed9a60195bff6757def733017a5b33120836e669966a7f54e91320c8ab1e36e5a6cfbccd0bedfc8d26543f76709bf2622a65fc1f572869fc293d467d283382c5ca0127b573eaf2ae9ccf4c8d6a8df6924763e6c7e50c91b3be772034b6b54c94cf79", 0xa4}, {&(0x7f0000000240)="353928927c377abf5b3f4e9193d3845fc95720a139a49b5e23bf07b7d4f72a6949710055726809ab11", 0x29}], 0x2, &(0x7f0000001600)=[{0x50, 0x11b, 0x7, "d0ed949027102f3a751aa00360931f498bd7d9aed58332a3ce1f4dcc93ca7d35c8cb425fc622ea32dba6973f71224bdd60449949c50ba0ef4abd7efb99e0d65a"}, {0x78, 0x10d, 0x6, "3e671ad9138dbc243830f1fb3cb796ecf22b58c71581fb136dd48e9279f1e9118276f6645aea458ade39d64b7ad4acd11909028a18561d4206a98940d89afafa7c8585d26961b513c4053eae481b36540dd95109347e8a1a8ab4771f0188248ed6"}], 0xc8, 0x4040}, 0x5}], 0x2, 0x20000000) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x4, 0x32200) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) 23:59:49 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b1", 0x40}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:50 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000091c0)={{{@in=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000092c0)=0xe8) recvmmsg(r0, &(0x7f0000018940)=[{{&(0x7f000000f040)=@hci, 0x80, &(0x7f000000f300)=[{&(0x7f000000f0c0)=""/28, 0x1c}, {&(0x7f000000f100)=""/31, 0x1f}, {&(0x7f000000f140)=""/145, 0x91}, {&(0x7f000000f200)=""/255, 0xff}], 0x4, &(0x7f000000f340)=""/4096, 0x1000, 0x7}, 0x400}, {{&(0x7f0000010340)=@xdp, 0x80, &(0x7f0000012700)=[{&(0x7f00000103c0)=""/4096, 0x1000}, {&(0x7f00000113c0)=""/182, 0xb6}, {&(0x7f0000011480)=""/110, 0x6e}, {&(0x7f0000011500)=""/230, 0xe6}, {&(0x7f0000011600)=""/81, 0x51}, {&(0x7f0000011680)=""/4096, 0x1000}, {&(0x7f0000012680)=""/36, 0x24}, {&(0x7f00000126c0)=""/23, 0x17}], 0x8, &(0x7f0000012780)=""/4096, 0x1000, 0x1000}, 0x6}, {{&(0x7f0000013780)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f0000014cc0)=[{&(0x7f0000013800)=""/5, 0x5}, {&(0x7f0000013840)=""/123, 0x7b}, {&(0x7f00000138c0)=""/74, 0x4a}, {&(0x7f0000013940)=""/14, 0xe}, {&(0x7f0000013980)=""/39, 0x27}, {&(0x7f00000139c0)=""/208, 0xd0}, {&(0x7f0000013ac0)=""/212, 0xd4}, {&(0x7f0000013bc0)=""/4096, 0x1000}, {&(0x7f0000014bc0)=""/220, 0xdc}], 0x9, &(0x7f0000014d80)=""/230, 0xe6, 0xffff}, 0x10000}, {{&(0x7f0000014e80)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000162c0)=[{&(0x7f0000014f00)=""/4096, 0x1000}, {&(0x7f0000015f00)=""/207, 0xcf}, {&(0x7f0000016000)=""/11, 0xb}, {&(0x7f0000016040)=""/171, 0xab}, {&(0x7f0000016100)=""/2, 0x2}, {&(0x7f0000016140)=""/201, 0xc9}, {&(0x7f0000016240)=""/101, 0x65}], 0x7, &(0x7f0000016340)=""/182, 0xb6}, 0xfffffffffffffffb}, {{&(0x7f0000016400)=@alg, 0x80, &(0x7f0000017b00)=[{&(0x7f0000016480)=""/233, 0xe9}, {&(0x7f0000016580)=""/210, 0xd2}, {&(0x7f0000016680)=""/212, 0xd4}, {&(0x7f0000016780)=""/253, 0xfd}, {&(0x7f0000016880)=""/218, 0xda}, {&(0x7f0000016980)=""/163, 0xa3}, {&(0x7f0000016a40)=""/6, 0x6}, {&(0x7f0000016a80)=""/99, 0x63}, {&(0x7f0000016b00)=""/4096, 0x1000}], 0x9, &(0x7f0000017bc0)=""/167, 0xa7, 0x2}, 0x5}, {{0x0, 0x0, &(0x7f0000018440)=[{&(0x7f0000017c80)=""/253, 0xfd}, {&(0x7f0000017d80)=""/206, 0xce}, {&(0x7f0000017e80)=""/7, 0x7}, {&(0x7f0000017ec0)=""/79, 0x4f}, {&(0x7f0000017f40)=""/142, 0x8e}, {&(0x7f0000018000)=""/200, 0xc8}, {&(0x7f0000018100)=""/206, 0xce}, {&(0x7f0000018200)=""/166, 0xa6}, {&(0x7f00000182c0)=""/239, 0xef}, {&(0x7f00000183c0)=""/94, 0x5e}], 0xa, &(0x7f0000018500)=""/32, 0x20, 0x5}, 0x2}, {{&(0x7f0000018540)=@l2, 0x80, &(0x7f0000018880)=[{&(0x7f00000185c0)=""/44, 0x2c}, {&(0x7f0000018600)=""/207, 0xcf}, {&(0x7f0000018700)=""/50, 0x32}, {&(0x7f0000018740)=""/25, 0x19}, {&(0x7f0000018780)=""/140, 0x8c}, {&(0x7f0000018840)=""/36, 0x24}], 0x6, &(0x7f0000018900)=""/35, 0x23, 0xffff}, 0x4}], 0x7, 0x20, &(0x7f0000018b00)={0x77359400}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x4e22, 0x2, @remote}, 0x608, [0x9, 0x0, 0x10001, 0x8, 0x0, 0x0, 0x2, 0x80]}, 0x5c) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000680)={0x0, 0xb4, 0x20, 0x8, 0x3ff}, &(0x7f00000006c0)=0x18) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000700)={r2}, &(0x7f0000000740)=0x8) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000780)={0x2, 'bond_slave_0\x00', 0x3}, 0x18) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="000007007301000052010000ffffffff7900000000000000000000000000002b5144b3143ecdbf35c6e47c791f4ade381c3fdd0dd1c2847e38de1d011e772e36fd1a4fe501b362b0ae7854cdaad59c34e4076482195afe14688f7c8d9e58461082c96e271dd2e6c52018d1cff96d4e23d9853f8ac0eda42f324a1e1590447ec9a7b58757a01b264117ef55a1d60bea94457b6fbb2aa86a05f0cf0fca44b56ba45670df23536bc1c1e4b3741651030559d1e52bc4e36ff5"], 0xb7) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x157) r4 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffc}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) r5 = semget(0x1, 0x4, 0x8) semctl$GETNCNT(r5, 0x2, 0xe, &(0x7f00000007c0)=""/241) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x7, 0x2, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040), 0x0, [], [0x0, 0x48000000000, 0xbfd8]}) io_setup(0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000480)={0x0, 0x8001}, &(0x7f00000004c0)=0x8) 23:59:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b1", 0x40}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:50 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) read$FUSE(r1, &(0x7f00000002c0), 0x1000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x2d, &(0x7f0000000180)={0xf423f}, 0x127) sendto$inet6(r2, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b1", 0x40}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:50 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x5, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x2b}, 0x60) fcntl$setsig(r0, 0xa, 0x3d) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x100, 0x80) getsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f0000000040)=""/43, &(0x7f00000000c0)=0x2b) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000280)=0x5, 0x4) 23:59:50 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000091c0)={{{@in=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000092c0)=0xe8) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef7", 0x4b}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:50 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) read$FUSE(r1, &(0x7f00000002c0), 0x1000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x2d, &(0x7f0000000180)={0xf423f}, 0x127) sendto$inet6(r2, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:50 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwritev(r1, &(0x7f0000003440)=[{&(0x7f0000002400)='I', 0xfffffffffffffed5}], 0x1, 0x40000) fallocate(r1, 0x0, 0x0, 0x8000) lseek(r1, 0x0, 0x3) 23:59:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef7", 0x4b}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef7", 0x4b}], 0x1, &(0x7f0000000400)}, 0x0) [ 231.628509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 23:59:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6b, 0x2) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x4) recvmmsg(r0, &(0x7f0000000440)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000200)=""/107, 0x6b}, {&(0x7f0000000280)=""/118, 0x76}, {&(0x7f0000000300)}, {&(0x7f0000000340)=""/173, 0xad}, {&(0x7f0000000400)=""/54, 0x36}, {&(0x7f0000000500)=""/240, 0xf0}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/255, 0xff}], 0x8, &(0x7f0000001800)=""/218, 0xda, 0x1400000000000000}, 0x3}], 0x1, 0x40000040, &(0x7f0000000600)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001900)={@dev={0xfe, 0x80, [], 0x13}, 0x49, r2}) syz_mount_image$hfs(&(0x7f0000000480)='hfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='iocharcharset=koi8-r,\x00']) 23:59:50 executing program 1: unshare(0x200) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x401, 0x0) sendto$packet(r0, &(0x7f0000000280)="3a452313d2f2eab9ed6a321be8d2741badccc3f5858f8a3bb8281fbade9b243770b624b09c694adf8ea05a78ca52aa7d31bf3cd1bb30f79f23b1c13bc21207f742e9f108ca7bca6e282fe95d351465fa1ad365a0460ff4d272ae00cc10cd9da5cda43eb1e35a82a51faad0863d5e452f04b19afd9c390f27d4c7b6c39242c97fc7b09f8fdb370f6e871f162de1b3fa5fb9fe3c934fbd28096c503560532568eb27e5cf1d10d9e748a904b12b0a24b5ffe3849e5a0c3e62ac2777caa42b405a65956530", 0xc3, 0x40880, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003700)={'vcan0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000280)) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8000, 0x800) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x14) chroot(&(0x7f0000000240)='./bus\x00') write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000040)={0x25, 0x3, 0x0, {0x0, 0x4, 0x0, 'ppp1'}}, 0x25) 23:59:50 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) read$FUSE(r1, &(0x7f00000002c0), 0x1000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x2d, &(0x7f0000000180)={0xf423f}, 0x127) sendto$inet6(r2, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb000000", 0x50}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:50 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) read$FUSE(r1, &(0x7f00000002c0), 0x1000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x2d, &(0x7f0000000180)={0xf423f}, 0x127) sendto$inet6(r2, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) [ 231.790190] hfs: unable to parse mount options 23:59:50 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000080)=""/102) fanotify_init(0x18, 0x401) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f00009dffb8)=[@rights={0x18, 0x1, 0x1, [r2]}], 0x18}, 0x0) sendmsg$unix(r4, &(0x7f0000e4ffc8)={&(0x7f0000beb000)=@abs, 0x8, &(0x7f000000d000), 0x0, &(0x7f000053c000)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}, 0x0) close(r4) close(r2) close(r1) 23:59:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb000000", 0x50}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:50 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) read$FUSE(r1, &(0x7f00000002c0), 0x1000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r2, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:50 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000091c0)={{{@in=@local, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000092c0)=0xe8) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xff, 0x1) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r3 = memfd_create(&(0x7f0000000040)='#posix_acl_access\x00', 0x0) ioctl$EVIOCSABS2F(r3, 0x401845ef, &(0x7f0000000300)={0x5, 0x800, 0x9, 0x1, 0x0, 0x326}) fallocate(r3, 0x3, 0x0, 0x101) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xa412400}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x14, r4, 0x8, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0xd0) 23:59:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb000000", 0x50}], 0x1, &(0x7f0000000400)}, 0x0) [ 231.940267] QAT: Invalid ioctl 23:59:50 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) read$FUSE(r1, &(0x7f00000002c0), 0x1000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) sendto$inet6(r2, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) [ 232.006044] QAT: Invalid ioctl 23:59:50 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) read$FUSE(r1, &(0x7f00000002c0), 0x1000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) sendto$inet6(r2, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:50 executing program 3: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xd4}, &(0x7f0000000300), 0x21}, 0xfffffffffffffeef) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000ec0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000900)=0x6) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000100)='./file1\x00', 0x4) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x5, 0x0, 0x3f}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x10000, 0x0) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000200)=""/159) faccessat(r1, &(0x7f00000000c0)='./file0/file0\x00', 0x40, 0x100) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000002c0)=""/60) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x40}, &(0x7f00000001c0)=0x8) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f00000003c0)={0x80, 0x7980}) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d14bd000, 0x1000000}], 0xc0b11f2000000000) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000340)={0x9, 0x2}) 23:59:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb000000000000", 0x53}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:50 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[], &(0x7f0000000340)=""/4096, 0x3c6, 0x1000}, 0x20) gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x1a) perf_event_open(&(0x7f0000001380)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x2c) 23:59:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:51 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb000000000000", 0x53}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:51 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) read$FUSE(r1, &(0x7f00000002c0), 0x1000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) sendto$inet6(r2, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:51 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:51 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb000000000000", 0x53}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:51 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb00000000000000", 0x54}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:51 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) read$FUSE(r1, &(0x7f00000002c0), 0x1000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000001440), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, &(0x7f0000000100)) getgroups(0x7, &(0x7f00000004c0)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0x0, 0xee01]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000000680)=0xc) syz_mount_image$f2fs(&(0x7f00000002c0)='f2fs\x00', &(0x7f0000000300)='./file0\x00', 0x4, 0x2, &(0x7f0000000480)=[{&(0x7f0000000340)="9c84aac3782347606fa129c926b7da61be8a394b4812a2bce49c744cb4ced18bea4ee0d085616c08f9051eaab333b5b462b83c044276f41b82f68385880fcdb00e11be5145ac793ead474199e01f4465682a6c9b43c673122f0ca6c42782dd3d56cbb6adb2852fb20f60a612cff2c991eb8f1354321dc4abf18bd629a4eedbb927a8f1708f6d88e14e9c2f0bf437d2db0cee7eb1285f7d930be717dc30bbf63ade646f68cf1033e5805b2e8229147a3269d6", 0xb2, 0x5}, {&(0x7f0000000400)="b15e68adbc80160a01ec8f9dba82f501d12f320f27d8dcb1eb2fa052982ef8e61e28189958e629030b62e0d7967ec3f2e9afcfc5f45af8e70378fdf0bd2ac1ae727bb7af9add216d2e85e0993a1227cdde3db49b1a", 0x55, 0xffff}], 0x20000, &(0x7f00000006c0)={[{@user_xattr='user_xattr'}, {@lfs_mode='mode=lfs'}, {@user_xattr='user_xattr'}, {@norecovery='norecovery'}, {@resgid={'resgid', 0x3d, r0}}], [{@measure='measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<', r1}}, {@euid_eq={'euid', 0x3d, r2}}, {@audit='audit'}, {@obj_type={'obj_type', 0x3d, '/dev/sg0\x00'}}, {@appraise='appraise'}, {@appraise='appraise'}, {@smackfshat={'smackfshat', 0x3d, 'configfs\x00'}}]}) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@sg0='/dev/sg0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='minix\x00', 0x800, &(0x7f0000000280)='configfs\x00') getdents64(r3, &(0x7f0000000200)=""/80, 0x50) 23:59:51 executing program 3: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xd4}, &(0x7f0000000300), 0x21}, 0xfffffffffffffeef) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000ec0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000900)=0x6) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000100)='./file1\x00', 0x4) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x5, 0x0, 0x3f}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x10000, 0x0) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000200)=""/159) faccessat(r1, &(0x7f00000000c0)='./file0/file0\x00', 0x40, 0x100) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000002c0)=""/60) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x40}, &(0x7f00000001c0)=0x8) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f00000003c0)={0x80, 0x7980}) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x1d14bd000, 0x1000000}], 0xc0b11f2000000000) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000340)={0x9, 0x2}) 23:59:51 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb00000000000000", 0x54}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:51 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:51 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:51 executing program 5: socket$inet6(0xa, 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) read$FUSE(r0, &(0x7f00000002c0), 0x1000) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r1, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:51 executing program 1: mmap(&(0x7f000002b000/0x2000)=nil, 0x2000, 0x1000005, 0x800000000108031, 0xffffffffffffffff, 0x1a) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) prctl$setmm(0x23, 0x7, &(0x7f0000fef000/0x10000)=nil) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000001380)={[{0x2d, 'rdma'}, {0x0, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'cpu'}]}, 0x19) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) getpid() keyctl$instantiate(0xc, 0x0, &(0x7f00000002c0), 0x7f8, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/11, 0xb) r2 = epoll_create1(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000013c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="948874", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x80000000}) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 23:59:51 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb00000000000000", 0x54}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:51 executing program 5: socket$inet6(0xa, 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:51 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:51 executing program 4 (fault-call:3 fault-nth:0): r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:51 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) semget$private(0x0, 0x2000000000007, 0x156) [ 233.061936] FAULT_INJECTION: forcing a failure. [ 233.061936] name failslab, interval 1, probability 0, space 0, times 1 [ 233.082385] CPU: 0 PID: 8551 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #44 [ 233.089625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.098992] Call Trace: [ 233.099022] dump_stack+0x1c4/0x2b4 [ 233.099044] ? dump_stack_print_info.cold.2+0x52/0x52 [ 233.099075] should_fail.cold.4+0xa/0x17 [ 233.099099] ? _raw_spin_unlock_bh+0x30/0x40 [ 233.110491] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 233.110512] ? check_preemption_disabled+0x48/0x200 [ 233.129102] ? __netlink_insert+0xd2c/0x13b0 [ 233.133531] ? __netlink_insert+0xd2c/0x13b0 [ 233.137959] ? __local_bh_enable_ip+0x160/0x260 [ 233.142690] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 233.148259] ? __netlink_insert+0xddc/0x13b0 [ 233.152712] ? __netlink_dump_start+0x6f0/0x6f0 [ 233.157402] ? fs_reclaim_acquire+0x20/0x20 [ 233.161740] ? lock_downgrade+0x900/0x900 [ 233.165902] ? ___might_sleep+0x1ed/0x300 [ 233.170061] ? arch_local_save_flags+0x40/0x40 [ 233.174690] ? trace_hardirqs_on+0xbd/0x310 [ 233.179024] ? _raw_spin_unlock_bh+0x30/0x40 [ 233.183460] __should_failslab+0x124/0x180 [ 233.187715] should_failslab+0x9/0x14 [ 233.191529] kmem_cache_alloc_node+0x26e/0x730 [ 233.196123] ? __local_bh_enable_ip+0x160/0x260 [ 233.200803] ? _raw_spin_unlock_bh+0x30/0x40 [ 233.205238] __alloc_skb+0x119/0x770 [ 233.208967] ? skb_scrub_packet+0x490/0x490 [ 233.213303] ? netlink_insert+0x15a/0x3f0 [ 233.217465] ? __netlink_insert+0x13b0/0x13b0 [ 233.221978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.227527] ? netlink_autobind.isra.34+0x232/0x310 [ 233.232554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.238113] netlink_sendmsg+0xb29/0xfc0 [ 233.242196] ? netlink_unicast+0x760/0x760 [ 233.246446] ? smack_socket_sendmsg+0xb0/0x190 [ 233.251043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.256601] ? security_socket_sendmsg+0x94/0xc0 [ 233.261369] ? netlink_unicast+0x760/0x760 [ 233.265616] sock_sendmsg+0xd5/0x120 [ 233.269342] ___sys_sendmsg+0x7fd/0x930 [ 233.273329] ? copy_msghdr_from_user+0x580/0x580 [ 233.278100] ? lock_downgrade+0x900/0x900 [ 233.282260] ? proc_fail_nth_write+0x9e/0x210 [ 233.286770] ? __fget_light+0x2e9/0x430 [ 233.290760] ? fget_raw+0x20/0x20 [ 233.294236] ? wait_for_completion+0x8a0/0x8a0 [ 233.298836] ? lock_release+0x970/0x970 [ 233.302830] ? check_preemption_disabled+0x48/0x200 [ 233.307863] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 233.313410] ? sockfd_lookup_light+0xc5/0x160 [ 233.317919] __sys_sendmsg+0x11d/0x280 [ 233.321827] ? __ia32_sys_shutdown+0x80/0x80 [ 233.326247] ? __sb_end_write+0xd9/0x110 [ 233.330316] ? fput+0x130/0x1a0 [ 233.333611] ? ksys_write+0x1ae/0x260 [ 233.337430] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 233.342900] __x64_sys_sendmsg+0x78/0xb0 [ 233.346974] do_syscall_64+0x1b9/0x820 [ 233.350873] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 233.356251] ? syscall_return_slowpath+0x5e0/0x5e0 [ 233.361190] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 233.366043] ? trace_hardirqs_on_caller+0x310/0x310 [ 233.371081] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 233.376112] ? prepare_exit_to_usermode+0x291/0x3b0 [ 233.381143] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 233.386008] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.391203] RIP: 0033:0x457579 [ 233.394408] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 233.413323] RSP: 002b:00007f094c491c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 233.421055] RAX: ffffffffffffffda RBX: 00007f094c491c90 RCX: 0000000000457579 [ 233.428356] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 [ 233.435647] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 233.442927] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f094c4926d4 [ 233.450205] R13: 00000000004c3536 R14: 00000000004d5328 R15: 0000000000000005 23:59:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) ptrace$setregset(0x4205, r1, 0x201, &(0x7f00000000c0)={&(0x7f00000001c0)="d97464228554c1f93827e2dfaa01d251a2a152d52498954077d6f5df878bcbfd98bba9590629c4628d5356fa6278ef6988b00743713d87535bc5e9e9727773c71f15b804c6a4b0b81ade4eab81fa466aab41c93ba8900c09b0161cff208f41ea6986e37f7b2d96e5a9cec886b40d081c8f55", 0x72}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = eventfd(0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000000)={r4, 0x0, 0x2, r4}) r5 = eventfd(0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f00000015c0)={r5, 0xffffffffffff2f4b, 0x2, r4}) r6 = eventfd(0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000180)={r6, 0x0, 0x2, r4}) 23:59:52 executing program 5: socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:52 executing program 1: r0 = socket$unix(0x1, 0x20000000805, 0x0) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x151080, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000002580)={0x5, 0x6, 0x40, 0xfffffffffffffd1c}) sendmmsg$nfc_llcp(r2, &(0x7f0000002400)=[{&(0x7f0000000040)={0x27, 0x1, 0x1, 0x6, 0x868c, 0x1, "8649d51187a57b49b8ca1a39b6641daaaa186746f08cf15d29af50a77fbbdfea9521fb4f722e846ea3d046dad948992356992cf22813ec3a23dd41a4ea9e40", 0x3e}, 0x60, &(0x7f0000001400)=[{&(0x7f0000000140)="5ae63c7c6d68717beec7aa4455ab2900", 0x10}, {&(0x7f0000000180)="747123ec312c8d26ee855c86130a2f8057681be20c8c19eb6756e2b5469cd6699246449a5cc092d5091d68b127b4d75bf5c2970068ad8131d214c20315e99f252ea184b97c473169830ce9846390082a7289f905beff61338749b01a861f24d7c3a265f34ffe2da7c3bff2c7fe212fbf75e57839fdf2d45ab119bafc84f7890dbd1627ca6c4107a0524c2ab4", 0x8c}, {&(0x7f0000000240)="20827ced32ff3b6e8fefb203", 0xc}, {&(0x7f0000000280)="8c6d62060ac8ed9a215153ed882b6dc062e53b359af0b6af93e3ad1548f231f1138346942970158a56eb01f94fdf69687c01b755ba8c82", 0x37}, {&(0x7f00000002c0)="11c4268c23492821ccb0550978d5a3962986c0cdb026ed4a28f718727af6305dd056f98c157a36c0c9fa64782de7eb84519cf70c392c95a8f90d085a1673233bdab169b148251eb86a754886a4b31ac389fbb38cbaa55d232849e0d145d91a7b0ed7221cd33cae67870f71cf1a606ca729ecb4f9b9d16b47b72e449cf37018f21a18941e8a40f9958d2ded94ae1bf82e34eef31ee5fb7a98405110", 0x9b}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="8618f6f1765a4409934beab89fd54951332a30f58b521a85f806ce45ec4b72472dc52b58b64dbc46939932c31fb9f7d7d2c2417cde153af22a9cdd4afc1cbb53c74c09b946b38bb75f424f1e64c086", 0x4f}], 0x7, &(0x7f0000001480)={0x48, 0x0, 0x2, "461ac9b57f83505390ed877bce5ebbde731d3413372dce635c49a95c9876bfad7b84f87e5a26dfdc7eda2cfa437aa2e76e8201d26aaea3"}, 0x48, 0x4004010}, {&(0x7f0000001500)={0x27, 0x0, 0x2, 0x7, 0x7, 0x5, "928056ba4436fef6606db61c44577201d927e96d1a26602626481e95cd4b53175bc760f3b08070715d167e39130eaa99fab03be6aa02306a34ff9d93ba8312", 0x14}, 0x60, &(0x7f0000001700)=[{&(0x7f0000001580)="696b3e1bbd30ab2cbe5721104e8459c28ec91cd2679a79532aa89422efaa94ab5e8b19d9084154c0e40c43317bc532e094aef914bfe4522a6f266c5ce7b9d945f991ffb919169cf660ca14d2ea5dd42de5487b5a355b91342af47e27a5e0dfb8a9a1b5abcc984a85ab6e5dac867b37edb269556a1e2248d4ec140afe261076cbb8fbde", 0x83}, {&(0x7f0000001640)="283f78dc759b885f1542c212d919603f69ac2ace3ccc9ee41b1ea5d6517cec1b0451087ec35fa1850886c55f04cbb96b480c18e2c7fd623ba81c9d37f2fd96a6c1091bd51aae18074b40d719247298612a1ba1fb3660d18a52ebdc524d0549cc265424c2baf21dbc2a4aacb3b8d593fc5bca303f063721db43087c5058c78280cf0dd2102aaddb97bcb3a67b22d4abb407163138be107fa0f90c0da2e7d4868cdd2d74e5", 0xa4}], 0x2, &(0x7f0000001740)=ANY=[@ANYBLOB="60000000000000003f0100000800000037e2dc5d0cf55ef523f4b8f1f6ab4a63598225b1656b87828cf154c7ab6e349696ceb56e24b4fd7a2a30ebd4d1aa371fb2cf7db23d000000000000000000000000000000"], 0x60, 0x4000000}, {&(0x7f00000017c0)={0x27, 0x1, 0x1, 0x7, 0x80000000, 0x2, "a613ec9dc80c993fc4dd2857048bd718f0f2533439a6c7f655e5317573d6ea01933ca6f23e37c9c9519ea797617120b498fe9e92a4a4bd896ab862a4f4018e", 0x3a}, 0x60, &(0x7f0000001dc0)=[{&(0x7f0000001840)="b47dfe8160c1b6c3a0a99c10188592c0880e0db73eeb47d83b1344d0078a1a92b3000a197cfcfb9522213c925ee5599d35c75860b9439be6808dade5571c925cf60011b628bcd58b6713f911507f367f6f178f07ef422728f43be004c493fa2ea91bd0aaa240bd9d8185039044e51a2777fceed0cfa6064ae2ca425c98cee15b2688bb05addaec8be097dcc0e3b969cbb2822c158c549273964eb5d3e12f87f82501e09d345571c70e3ee67ee8a41e6cd100b0856951eef148f5148a95c33b10171565dda572ab3622747bf7ec4b595f44b6f52c830e149b0925bbd2f57c", 0xde}, {&(0x7f0000001940)="2bd1c94e95e0cf32b7143f64d9febcd92384f9cef83d073fcf73fa55089d7ec29ad7e0aefcd52be6d0afe738d7b9a06579dc034d1a2dfed0b88c630d7ac13bdd26", 0x41}, {&(0x7f00000019c0)="d59109e256e85e7f209166d38b1a2e8b155d25b0c41d73f22f6fab891219a566030fc23ba45067d774d9bda6a2b3ca8bbbb9315598530048715b7a87ec68e8ce71c3f636c64b0ab19f2bb6e15096f37e4ef5c5b3b3bec2a0c4861334859ed5a45633e47757af01d8758ace5f32177d29fd5b5583c07c28f7c696c6d8a7e02239800d836a4298192d6355385d9189632a26aa39737c727d14b65a8c9186fdeff23ae08d8b106bf3c15d3e654102e93688dd915e06a0", 0xb5}, {&(0x7f0000001a80)="851c47de602e8ad9a479f32a70ab029f135cfdf6dfa70e2479aebeea9ccccefffc7d1a24e433a08c2e0c08284c3d925486670842ea947ef39b9a9d37801074c5612ebd2b3d92ccf5a04e66a598afe1493ff03412c727d93c5cc8d040ab2039fd26b7f3d8f33fb22d29a802ca6e4d882c54d364ac18442a5f8d99d8f35e7e869c6f538d3aa424148c417f59dbf2a86b86db32e38894a3a7d3164afe", 0x9b}, {&(0x7f0000001b40)="5295cc32dfb7eb6a13ef79e317e6f0451ca7f962bcda8ce55818403db372243c071d6bd180ce71e8403aff88c2697dd1cca72e4505de67aed06560a901be4a465cad2891ff532e3b2ca3e7c32bbf760cb6622eded2897f56cd96f884c357ce6c03c2a2b865edfd089611746971f5e3610a720451cec90b75bade6b171041df448c32270c81ffd67ddc649541bcfcd01ab4721d694f1b", 0x96}, {&(0x7f0000001c00)="f17a2055fd3cd6d3568f977e1da7c83af09fd1bc11b378fcbf1ec17374206915db0a3c588c606aa55e3ee73260e391766f1c2cfa8754ea8512fce291175cec0eab6a31e7d23e68a390c9d296fe84f9f22734b980a8a345b75d560fb90617a7712eb94050126755b5e547170f09cf94597c651f2d55f2d915732733056ad21af5284d9f94dc0463374c16a5ebcef4314c5c28027958c38c147cf62878", 0x9c}, {&(0x7f0000001cc0)="73fcf331de5abc7d1a3e02a9cdf1474f7d422857e0c70a55f8fcd8df734fea21b97a99ad76de7d38ad7ae94213572855fb24c9ddfb1a07cf44784c", 0x3b}, {&(0x7f0000001d00)="057a32936ccaec32710b58d008ca2976aa2dae3aecef8252daf972f087606912883aa7020eceb5386f4d2e6bcda9fad518c55cd7d208ab656830983094f5d88106de501782fdd85d386c1382dc659fd3a2ab43b954fe66c937630ab9ba3cde1107f2b5f01dda16965423e982901606754afd793cb87259330fd0bd2af8d114809202ed8ec1d2f101b8170a188c143bf699e49d117d20e5", 0x97}], 0x8, &(0x7f0000001e40)={0xc8, 0x119, 0x81, "453560d8762cd73b2a1a0cf9aa85471fd0506a03298c8f8c207b5104131f91d9f500f6d7d64a2884d083631c4796c8b47b4d0cd0032804f571e6316295ee23938d27615b5e5debc52fb7975ebafd11335db193662399dfa7dca51d9f3d816e3c617c5020570fecb04acd3f897f45b5311c2f346a043eb287150ea991257a930ee4edadcc9837a69b8286b4974eb5dd8fc5398d2b4525b05d499f337a2ce65b555b955f7ad26bf23ae9fae2d5899cefc581f4f3bbbe42"}, 0xc8, 0x8000}, {&(0x7f0000001f40)={0x27, 0x1, 0x2, 0x7, 0x100000000, 0x497d4123, "960ae2264dc177eebc48cdf28c5f7ee4a479b5d729da00885c60aebfa84dd5ac465267a7dddc08dc0d69a818ede23fbdb4c3fb3fd31ebb3269e5b830b251b8", 0x2e}, 0x60, &(0x7f00000020c0)=[{&(0x7f0000001fc0)="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", 0xfd}], 0x1, &(0x7f0000002100)={0x48, 0x11f, 0x1, "0cd7ea940798837762b028a53493cf80235f62ca41a2dab421bec5ade4c8355821a9c8a5b0bf1292f2800caffa2e052eccefc1cff6af3d"}, 0x48, 0x10}, {&(0x7f0000002180)={0x27, 0x0, 0x0, 0x7, 0x7, 0x6, "c62012150e5563351254909bcb3b8d27d0a23ba4449a7d3fbdfc33dc3e636ca08378087636c72f0dea8a112d06ed4c8cc3d82ca3799e28f58c8f46546c057c", 0x7}, 0x60, &(0x7f0000002380)=[{&(0x7f0000002200)="cdc6aa9da712586ce63ebe02e360e131fc9119565b834643baddfcb5246f82918a5f666a7df3995fefa60c5ebe251c8791543a7ae6faaca8408ee59e5571a9c65569ca10a0e0881a6eb469af1b011163555252f69542f6159f76b88d192f80d9ca77f3867c28f11788527f341b2be0d21f0a18164f21068865", 0x79}, {&(0x7f0000002280)="a443c1c9c2b588f07cc756eebfe0ceb6606e14851f7420aed2e6618342b345bbeb73ca8d7728f64940ced038055584e5f1b6a4f01b0f9d8956e4f1462638216f8b633d854a8ee8045f1a5586e5214e98577bcd3fc12a0f80b5686d96893ae746b3cfcebdbad4a2477597267402199ff2fdab4f056eaf504616b4c04b202ecf0bf57d70e912286b40180543e08464962c79e47fa4a94403e6b5b2774b0d7fde1af93f30093c21c47107c3cc5d28f988fd470cc03ec1e7efd491e2bab071d6890a8098fe141e08f38e31ff3a2c5d5c1f14ec1961e0acba83b123e716688fd2644f6466a34d21164e5a6a6d0999", 0xec}], 0x2, &(0x7f00000023c0)={0x18, 0x10f, 0x3, '+'}, 0x18, 0x4000000}], 0x5, 0x400c000) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f00000025c0)) close(r1) write$P9_RLERROR(r2, &(0x7f0000002540)={0x19, 0x7, 0x2, {0x10, 'bdevprocvboxnet1'}}, 0x19) 23:59:52 executing program 4 (fault-call:3 fault-nth:1): r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:52 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:52 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 233.644828] FAULT_INJECTION: forcing a failure. [ 233.644828] name failslab, interval 1, probability 0, space 0, times 0 [ 233.668287] CPU: 0 PID: 8568 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #44 [ 233.675539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.684903] Call Trace: [ 233.687514] dump_stack+0x1c4/0x2b4 [ 233.691163] ? dump_stack_print_info.cold.2+0x52/0x52 [ 233.696387] should_fail.cold.4+0xa/0x17 [ 233.700460] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 233.705568] ? __save_stack_trace+0x8d/0xf0 [ 233.709908] ? save_stack+0xa9/0xd0 [ 233.713538] ? save_stack+0x43/0xd0 [ 233.717168] ? kasan_kmalloc+0xc7/0xe0 [ 233.721054] ? kasan_slab_alloc+0x12/0x20 [ 233.725213] ? kmem_cache_alloc_node+0x144/0x730 [ 233.729969] ? __alloc_skb+0x119/0x770 [ 233.733859] ? netlink_sendmsg+0xb29/0xfc0 [ 233.738097] ? sock_sendmsg+0xd5/0x120 [ 233.741984] ? ___sys_sendmsg+0x7fd/0x930 [ 233.746136] ? __sys_sendmsg+0x11d/0x280 [ 233.750201] ? __x64_sys_sendmsg+0x78/0xb0 [ 233.754491] ? do_syscall_64+0x1b9/0x820 [ 233.758566] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.763955] ? fs_reclaim_acquire+0x20/0x20 [ 233.768283] ? lock_downgrade+0x900/0x900 [ 233.772458] ? ___might_sleep+0x1ed/0x300 [ 233.776613] ? arch_local_save_flags+0x40/0x40 [ 233.781200] ? lock_downgrade+0x900/0x900 [ 233.785357] __should_failslab+0x124/0x180 [ 233.789604] should_failslab+0x9/0x14 [ 233.793414] kmem_cache_alloc_node_trace+0x270/0x740 [ 233.798517] ? kasan_unpoison_shadow+0x35/0x50 [ 233.803111] ? kasan_kmalloc+0xc7/0xe0 [ 233.807007] __kmalloc_node_track_caller+0x33/0x70 [ 233.811947] __kmalloc_reserve.isra.39+0x41/0xe0 [ 233.816710] __alloc_skb+0x155/0x770 [ 233.820430] ? skb_scrub_packet+0x490/0x490 [ 233.824760] ? netlink_insert+0x15a/0x3f0 [ 233.828916] ? __netlink_insert+0x13b0/0x13b0 [ 233.833426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.838971] ? netlink_autobind.isra.34+0x232/0x310 [ 233.843994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.849543] netlink_sendmsg+0xb29/0xfc0 [ 233.853625] ? netlink_unicast+0x760/0x760 [ 233.857872] ? smack_socket_sendmsg+0xb0/0x190 [ 233.862466] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.868018] ? security_socket_sendmsg+0x94/0xc0 [ 233.872779] ? netlink_unicast+0x760/0x760 [ 233.877024] sock_sendmsg+0xd5/0x120 [ 233.880740] ___sys_sendmsg+0x7fd/0x930 [ 233.884723] ? copy_msghdr_from_user+0x580/0x580 [ 233.889488] ? lock_downgrade+0x900/0x900 [ 233.893645] ? proc_fail_nth_write+0x9e/0x210 [ 233.898146] ? __fget_light+0x2e9/0x430 [ 233.902127] ? fget_raw+0x20/0x20 [ 233.905608] ? wait_for_completion+0x8a0/0x8a0 [ 233.910674] ? lock_release+0x970/0x970 [ 233.914662] ? check_preemption_disabled+0x48/0x200 [ 233.919695] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 233.925246] ? sockfd_lookup_light+0xc5/0x160 [ 233.929752] __sys_sendmsg+0x11d/0x280 [ 233.933655] ? __ia32_sys_shutdown+0x80/0x80 [ 233.938075] ? __sb_end_write+0xd9/0x110 [ 233.942147] ? fput+0x130/0x1a0 [ 233.945435] ? ksys_write+0x1ae/0x260 [ 233.949246] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 233.954712] __x64_sys_sendmsg+0x78/0xb0 [ 233.958787] do_syscall_64+0x1b9/0x820 [ 233.962688] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 233.968063] ? syscall_return_slowpath+0x5e0/0x5e0 [ 233.973010] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 233.977864] ? trace_hardirqs_on_caller+0x310/0x310 [ 233.982892] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 233.987919] ? prepare_exit_to_usermode+0x291/0x3b0 [ 233.992953] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 233.997819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.003016] RIP: 0033:0x457579 [ 234.006217] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 234.025125] RSP: 002b:00007f094c491c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 234.032851] RAX: ffffffffffffffda RBX: 00007f094c491c90 RCX: 0000000000457579 23:59:52 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:52 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) r1 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='trustedself\x00', 0xfffffffffffffffa) keyctl$update(0x2, r1, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x6) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e20, 0x5285, @remote, 0x15}, {0xa, 0x4e22, 0x3ff, @loopback, 0x2}, 0x10000, [0x5, 0xfffffffffffffffc, 0x2dc1, 0x8c9c, 0x7, 0x0, 0x3, 0x5]}, 0x5c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x40000, 0x0) [ 234.040368] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 [ 234.047784] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 234.055081] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f094c4926d4 [ 234.062358] R13: 00000000004c3536 R14: 00000000004d5328 R15: 0000000000000005 23:59:52 executing program 4 (fault-call:3 fault-nth:2): r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:53 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:53 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:53 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLOCK(r0, &(0x7f0000000000)={0x8, 0x35, 0x2, 0x1}, 0x8) close(r0) [ 234.159321] FAULT_INJECTION: forcing a failure. [ 234.159321] name failslab, interval 1, probability 0, space 0, times 0 [ 234.214871] CPU: 1 PID: 8593 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #44 [ 234.222123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.231496] Call Trace: [ 234.234112] dump_stack+0x1c4/0x2b4 [ 234.237764] ? dump_stack_print_info.cold.2+0x52/0x52 [ 234.242997] ? is_bpf_text_address+0xac/0x170 [ 234.247543] should_fail.cold.4+0xa/0x17 [ 234.251630] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 234.256752] ? rcu_bh_qs+0xc0/0xc0 [ 234.260306] ? unwind_dump+0x190/0x190 [ 234.264207] ? mark_held_locks+0x130/0x130 [ 234.268457] ? is_bpf_text_address+0xd3/0x170 [ 234.272964] ? kernel_text_address+0x79/0xf0 [ 234.277393] ? __kernel_text_address+0xd/0x40 [ 234.281900] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 234.286930] ? mark_held_locks+0x130/0x130 [ 234.291176] ? fs_reclaim_acquire+0x20/0x20 [ 234.295521] ? lock_downgrade+0x900/0x900 [ 234.299686] ? ___might_sleep+0x1ed/0x300 [ 234.303860] ? arch_local_save_flags+0x40/0x40 [ 234.308460] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 234.314279] __should_failslab+0x124/0x180 [ 234.318528] should_failslab+0x9/0x14 [ 234.322355] kmem_cache_alloc_trace+0x2d7/0x750 [ 234.327034] ? fib6_get_table+0x329/0x550 [ 234.331176] fib6_info_alloc+0xc3/0x290 [ 234.335151] ? fib6_update_sernum+0x150/0x150 [ 234.339674] ? find_match+0xec0/0xec0 [ 234.343479] ip6_route_info_create+0x78f/0x2d20 [ 234.348147] ? ip6_nh_lookup_table.isra.77+0x410/0x410 [ 234.353412] ? mark_held_locks+0x130/0x130 [ 234.357634] ? mark_held_locks+0x130/0x130 [ 234.361883] ? lock_acquire+0x1ed/0x520 [ 234.365867] ? rtnetlink_rcv_msg+0x40e/0xc20 [ 234.370275] ? memcpy+0x45/0x50 [ 234.373546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.379081] ip6_route_multipath_add+0xced/0x18a0 [ 234.383927] ? nla_parse+0x2f9/0x480 [ 234.387632] ? nla_find+0x1c1/0x1f0 [ 234.391261] ? ip6_route_mpath_notify+0xf0/0xf0 [ 234.395950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.401612] ? rtm_to_fib6_config+0xea1/0x1260 [ 234.406189] ? rcu_bh_qs+0xc0/0xc0 [ 234.409738] ? ip6_dst_gc+0x540/0x540 [ 234.413548] ? is_bpf_text_address+0xd3/0x170 [ 234.418039] ? kernel_text_address+0x79/0xf0 [ 234.422448] ? __netlink_lookup+0x5b6/0xa90 [ 234.426762] inet6_rtm_newroute+0xe3/0x160 [ 234.430999] ? ip6_route_multipath_add+0x18a0/0x18a0 [ 234.436113] ? ip6_route_multipath_add+0x18a0/0x18a0 [ 234.441239] rtnetlink_rcv_msg+0x46a/0xc20 [ 234.445467] ? rtnetlink_put_metrics+0x690/0x690 [ 234.450238] netlink_rcv_skb+0x172/0x440 [ 234.454289] ? rtnetlink_put_metrics+0x690/0x690 [ 234.459047] ? netlink_ack+0xb80/0xb80 [ 234.462941] rtnetlink_rcv+0x1c/0x20 [ 234.466650] netlink_unicast+0x5a5/0x760 [ 234.470702] ? netlink_attachskb+0x9a0/0x9a0 [ 234.475104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.480629] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 234.485634] netlink_sendmsg+0xa18/0xfc0 [ 234.489688] ? netlink_unicast+0x760/0x760 [ 234.493911] ? smack_socket_sendmsg+0xb0/0x190 [ 234.498484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.504011] ? security_socket_sendmsg+0x94/0xc0 [ 234.508755] ? netlink_unicast+0x760/0x760 [ 234.512981] sock_sendmsg+0xd5/0x120 [ 234.516683] ___sys_sendmsg+0x7fd/0x930 [ 234.520653] ? copy_msghdr_from_user+0x580/0x580 [ 234.525401] ? lock_downgrade+0x900/0x900 [ 234.529551] ? proc_fail_nth_write+0x9e/0x210 [ 234.534067] ? __fget_light+0x2e9/0x430 [ 234.538041] ? fget_raw+0x20/0x20 [ 234.541487] ? wait_for_completion+0x8a0/0x8a0 [ 234.546057] ? lock_release+0x970/0x970 [ 234.550023] ? check_preemption_disabled+0x48/0x200 [ 234.555032] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 234.560558] ? sockfd_lookup_light+0xc5/0x160 [ 234.565045] __sys_sendmsg+0x11d/0x280 [ 234.568930] ? __ia32_sys_shutdown+0x80/0x80 [ 234.573337] ? __sb_end_write+0xd9/0x110 [ 234.577402] ? fput+0x130/0x1a0 [ 234.580667] ? ksys_write+0x1ae/0x260 [ 234.584469] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 234.589927] __x64_sys_sendmsg+0x78/0xb0 [ 234.593983] do_syscall_64+0x1b9/0x820 [ 234.597867] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 234.603237] ? syscall_return_slowpath+0x5e0/0x5e0 [ 234.608160] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.612996] ? trace_hardirqs_on_caller+0x310/0x310 [ 234.618003] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 234.623020] ? prepare_exit_to_usermode+0x291/0x3b0 [ 234.628046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.632905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.638085] RIP: 0033:0x457579 [ 234.641266] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 234.660157] RSP: 002b:00007f094c491c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 234.667859] RAX: ffffffffffffffda RBX: 00007f094c491c90 RCX: 0000000000457579 [ 234.675131] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 [ 234.682399] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 234.689693] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f094c4926d4 [ 234.696955] R13: 00000000004c3536 R14: 00000000004d5328 R15: 0000000000000005 23:59:53 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x5) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x3c1, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830020200a0009000304341d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1262}, 0x0) 23:59:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = open(&(0x7f0000000400)='./file0\x00', 0x101000, 0x20) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x7b}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000004c0)={r2, 0x68}, 0x8) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000100)) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_mount_image$minix(&(0x7f0000000240)='minix\x00', &(0x7f00000002c0)='./file0\x00', 0x2, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000300)="eccac3ee415b420596b0c2daa98a032f66ac33d6eecf7bc34a97f9ddc7775a16d7aca5cb58fb52ea42719276251ded4ab6fca404ebf4e5817e55958e11a70308616b4db7b200738580f2244d494175efb7213cf686e0f6cdd1726be5ead6430ff037e010833b1cc449041ed85ea8757c548a676d08a6621ea6c1940ab0fe9486db8445f262d584dec079495a2e3c73aa3e0ddd3bc7617c8568ce88df4fd3c1a3ac736caa0ed9bdff2256ea8147613c68f93c61", 0xb3, 0x5}], 0x2000, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000180)="0f00db670f01df66b8000000000f23d80f21f86635400000f00f23f80f09b800008ee00f009a00000f212b0f01c30f21b00f1af9", 0x34}], 0x1, 0x0, &(0x7f0000000080), 0x1000000000000274) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000080)="0f0626360f0136996d66b8010000000f23d80f21f86635000000a00f23f80f01ca66b9800000c00f326635000400000f30656726f2af65f4650f01caf40f6a2e0000", 0x42}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f00000001c0)={0xd0003}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 23:59:53 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:53 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:53 executing program 4 (fault-call:3 fault-nth:3): r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:53 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getpeername(r0, &(0x7f0000007a00)=@can, &(0x7f0000007a80)=0x80) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:53 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) [ 234.803636] FAULT_INJECTION: forcing a failure. [ 234.803636] name failslab, interval 1, probability 0, space 0, times 0 [ 234.825031] CPU: 1 PID: 8613 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #44 [ 234.832271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.841636] Call Trace: [ 234.844245] dump_stack+0x1c4/0x2b4 [ 234.847892] ? dump_stack_print_info.cold.2+0x52/0x52 [ 234.853102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.858665] should_fail.cold.4+0xa/0x17 [ 234.862776] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 234.867901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.873445] ? refcount_sub_and_test_checked+0x203/0x310 [ 234.878902] ? ip6_pol_route_output+0x70/0x70 [ 234.883414] ? fs_reclaim_acquire+0x20/0x20 [ 234.887743] ? lock_downgrade+0x900/0x900 [ 234.891900] ? ___might_sleep+0x1ed/0x300 [ 234.896055] ? arch_local_save_flags+0x40/0x40 [ 234.900641] ? mark_held_locks+0x130/0x130 [ 234.904903] __should_failslab+0x124/0x180 [ 234.909151] should_failslab+0x9/0x14 [ 234.912955] kmem_cache_alloc_trace+0x2d7/0x750 [ 234.917628] ? memcpy+0x45/0x50 [ 234.920910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.926456] ip6_route_multipath_add+0x1043/0x18a0 [ 234.931387] ? nla_parse+0x2f9/0x480 [ 234.935110] ? nla_find+0x1c1/0x1f0 [ 234.938763] ? ip6_route_mpath_notify+0xf0/0xf0 [ 234.943436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.948977] ? rtm_to_fib6_config+0xea1/0x1260 [ 234.953566] ? rcu_bh_qs+0xc0/0xc0 [ 234.957115] ? ip6_dst_gc+0x540/0x540 [ 234.960927] ? is_bpf_text_address+0xd3/0x170 [ 234.965424] ? kernel_text_address+0x79/0xf0 [ 234.969862] ? __netlink_lookup+0x5b6/0xa90 [ 234.974193] inet6_rtm_newroute+0xe3/0x160 [ 234.978438] ? ip6_route_multipath_add+0x18a0/0x18a0 [ 234.983561] ? ip6_route_multipath_add+0x18a0/0x18a0 [ 234.988685] rtnetlink_rcv_msg+0x46a/0xc20 [ 234.992934] ? rtnetlink_put_metrics+0x690/0x690 [ 234.997697] netlink_rcv_skb+0x172/0x440 [ 235.001753] ? rtnetlink_put_metrics+0x690/0x690 [ 235.006511] ? netlink_ack+0xb80/0xb80 [ 235.010408] rtnetlink_rcv+0x1c/0x20 [ 235.014179] netlink_unicast+0x5a5/0x760 [ 235.018248] ? netlink_attachskb+0x9a0/0x9a0 [ 235.022656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.028189] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 235.033230] netlink_sendmsg+0xa18/0xfc0 [ 235.037315] ? netlink_unicast+0x760/0x760 [ 235.042065] ? smack_socket_sendmsg+0xb0/0x190 [ 235.046664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.052200] ? security_socket_sendmsg+0x94/0xc0 [ 235.056958] ? netlink_unicast+0x760/0x760 [ 235.061196] sock_sendmsg+0xd5/0x120 [ 235.064932] ___sys_sendmsg+0x7fd/0x930 [ 235.068909] ? copy_msghdr_from_user+0x580/0x580 [ 235.073665] ? lock_downgrade+0x900/0x900 [ 235.077820] ? proc_fail_nth_write+0x9e/0x210 [ 235.082317] ? __fget_light+0x2e9/0x430 [ 235.086291] ? fget_raw+0x20/0x20 [ 235.089756] ? wait_for_completion+0x8a0/0x8a0 [ 235.094340] ? lock_release+0x970/0x970 [ 235.098314] ? check_preemption_disabled+0x48/0x200 [ 235.103331] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 235.108883] ? sockfd_lookup_light+0xc5/0x160 [ 235.113389] __sys_sendmsg+0x11d/0x280 [ 235.117273] ? __ia32_sys_shutdown+0x80/0x80 [ 235.121678] ? __sb_end_write+0xd9/0x110 [ 235.125741] ? fput+0x130/0x1a0 [ 235.129036] ? ksys_write+0x1ae/0x260 [ 235.132861] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 235.138332] __x64_sys_sendmsg+0x78/0xb0 [ 235.142397] do_syscall_64+0x1b9/0x820 [ 235.146280] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 235.151649] ? syscall_return_slowpath+0x5e0/0x5e0 [ 235.156582] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.161425] ? trace_hardirqs_on_caller+0x310/0x310 [ 235.166476] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 235.171491] ? prepare_exit_to_usermode+0x291/0x3b0 [ 235.176528] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.181408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.186603] RIP: 0033:0x457579 [ 235.189815] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 235.208726] RSP: 002b:00007f094c491c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 235.216441] RAX: ffffffffffffffda RBX: 00007f094c491c90 RCX: 0000000000457579 [ 235.223704] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 [ 235.230970] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 235.238238] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f094c4926d4 [ 235.245523] R13: 00000000004c3536 R14: 00000000004d5328 R15: 0000000000000005 23:59:54 executing program 4 (fault-call:3 fault-nth:4): r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:54 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000180)=0x9) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="a30f2e7e54b3038efc8f83527a15b44963d7e06f0af9be523ef3a667ff070000b3144e674a22", @ANYRES32=0x0], 0x2}}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000100)="660ffcbf00100f23560f320f01f30f01dd66b91a0200000f32f2ab0f090fc71c0f43431c", 0x24}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000240)={0x0, 0x8000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 23:59:54 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:54 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) [ 235.374777] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 235.386320] FAULT_INJECTION: forcing a failure. [ 235.386320] name failslab, interval 1, probability 0, space 0, times 0 [ 235.432865] CPU: 1 PID: 8643 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #44 [ 235.432880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.449441] Call Trace: [ 235.449466] dump_stack+0x1c4/0x2b4 [ 235.449488] ? dump_stack_print_info.cold.2+0x52/0x52 [ 235.460868] ? trace_hardirqs_on+0xbd/0x310 [ 235.465211] should_fail.cold.4+0xa/0x17 [ 235.469290] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 235.474398] ? kasan_check_write+0x14/0x20 [ 235.478638] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 235.483582] ? wait_for_completion+0x8a0/0x8a0 [ 235.488173] ? nla_parse+0x2f9/0x480 [ 235.491905] ? nla_find+0xd1/0x1f0 [ 235.495475] ? ip6_route_mpath_notify+0xf0/0xf0 [ 235.500157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.505712] ? fs_reclaim_acquire+0x20/0x20 [ 235.510042] ? lock_downgrade+0x900/0x900 [ 235.514196] ? mutex_unlock+0xd/0x10 [ 235.514217] ? ___might_sleep+0x1ed/0x300 [ 235.514233] ? arch_local_save_flags+0x40/0x40 [ 235.514255] __should_failslab+0x124/0x180 [ 235.526669] should_failslab+0x9/0x14 [ 235.526700] kmem_cache_alloc_node+0x26e/0x730 [ 235.526720] __alloc_skb+0x119/0x770 [ 235.534737] ? skb_scrub_packet+0x490/0x490 [ 235.534753] ? ip6_route_multipath_add+0x18a0/0x18a0 [ 235.534783] ? ip6_route_multipath_add+0x18a0/0x18a0 [ 235.543058] netlink_ack+0x2c5/0xb80 [ 235.543078] ? netlink_sendmsg+0xfc0/0xfc0 [ 235.543100] netlink_rcv_skb+0x35d/0x440 [ 235.543114] ? rtnetlink_put_metrics+0x690/0x690 [ 235.543150] ? netlink_ack+0xb80/0xb80 [ 235.561376] rtnetlink_rcv+0x1c/0x20 [ 235.561393] netlink_unicast+0x5a5/0x760 [ 235.561412] ? netlink_attachskb+0x9a0/0x9a0 [ 235.569691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.569706] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 235.569729] netlink_sendmsg+0xa18/0xfc0 [ 235.582070] ? netlink_unicast+0x760/0x760 [ 235.582105] ? smack_socket_sendmsg+0xb0/0x190 [ 235.582120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.582134] ? security_socket_sendmsg+0x94/0xc0 [ 235.582161] ? netlink_unicast+0x760/0x760 [ 235.582179] sock_sendmsg+0xd5/0x120 23:59:54 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) [ 235.590639] ___sys_sendmsg+0x7fd/0x930 [ 235.590658] ? copy_msghdr_from_user+0x580/0x580 [ 235.590677] ? lock_downgrade+0x900/0x900 [ 235.605262] ? proc_fail_nth_write+0x9e/0x210 [ 235.605281] ? __fget_light+0x2e9/0x430 [ 235.605296] ? fget_raw+0x20/0x20 [ 235.605321] ? wait_for_completion+0x8a0/0x8a0 [ 235.605338] ? lock_release+0x970/0x970 [ 235.614148] ? check_preemption_disabled+0x48/0x200 [ 235.614169] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 235.614182] ? sockfd_lookup_light+0xc5/0x160 [ 235.614199] __sys_sendmsg+0x11d/0x280 [ 235.614217] ? __ia32_sys_shutdown+0x80/0x80 [ 235.689012] ? __sb_end_write+0xd9/0x110 [ 235.693088] ? fput+0x130/0x1a0 [ 235.696391] ? ksys_write+0x1ae/0x260 [ 235.700208] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 235.705672] __x64_sys_sendmsg+0x78/0xb0 [ 235.709744] do_syscall_64+0x1b9/0x820 [ 235.713636] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 235.719007] ? syscall_return_slowpath+0x5e0/0x5e0 [ 235.723970] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.723988] ? trace_hardirqs_on_caller+0x310/0x310 [ 235.724004] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 235.724020] ? prepare_exit_to_usermode+0x291/0x3b0 [ 235.724039] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.724059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.724069] RIP: 0033:0x457579 [ 235.724085] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 235.724091] RSP: 002b:00007f094c491c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:59:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="5f3bf93a12"], &(0x7f0000000100)=""/203, 0xcb) recvfrom$llc(r0, &(0x7f0000000200)=""/40, 0x28, 0x12022, &(0x7f0000000240)={0x1a, 0x104, 0x9, 0x3, 0x8, 0x5, @dev={[], 0x12}}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="1b0000001a00010000001000000000001c00000000000000000000000c0001000000000000000000e919e8e0c2d847168fdd58f84f3c2c8dcabe036fa353e4ac"], 0x28}}, 0x0) 23:59:54 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:54 executing program 4 (fault-call:3 fault-nth:5): r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 235.724105] RAX: ffffffffffffffda RBX: 00007f094c491c90 RCX: 0000000000457579 [ 235.724113] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 [ 235.724120] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 235.724127] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f094c4926d4 [ 235.724135] R13: 00000000004c3536 R14: 00000000004d5328 R15: 0000000000000005 23:59:54 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 235.838237] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 23:59:54 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) [ 235.879786] FAULT_INJECTION: forcing a failure. [ 235.879786] name failslab, interval 1, probability 0, space 0, times 0 [ 235.914012] CPU: 1 PID: 8667 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #44 [ 235.921248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.930619] Call Trace: [ 235.933212] dump_stack+0x1c4/0x2b4 [ 235.936858] ? dump_stack_print_info.cold.2+0x52/0x52 [ 235.942068] should_fail.cold.4+0xa/0x17 [ 235.946129] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 235.951220] ? __save_stack_trace+0x8d/0xf0 [ 235.955547] ? save_stack+0xa9/0xd0 [ 235.959161] ? save_stack+0x43/0xd0 [ 235.962781] ? kasan_kmalloc+0xc7/0xe0 [ 235.966685] ? kasan_slab_alloc+0x12/0x20 [ 235.970835] ? kmem_cache_alloc_node+0x144/0x730 [ 235.975593] ? __alloc_skb+0x119/0x770 [ 235.979488] ? netlink_ack+0x2c5/0xb80 [ 235.983382] ? netlink_rcv_skb+0x35d/0x440 [ 235.987604] ? rtnetlink_rcv+0x1c/0x20 [ 235.991475] ? netlink_unicast+0x5a5/0x760 [ 235.995711] ? netlink_sendmsg+0xa18/0xfc0 [ 235.999929] ? sock_sendmsg+0xd5/0x120 [ 236.003826] ? ___sys_sendmsg+0x7fd/0x930 [ 236.007981] ? __x64_sys_sendmsg+0x78/0xb0 [ 236.012235] ? fs_reclaim_acquire+0x20/0x20 [ 236.016674] ? lock_downgrade+0x900/0x900 [ 236.020814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.026351] ? ___might_sleep+0x1ed/0x300 [ 236.030498] ? arch_local_save_flags+0x40/0x40 [ 236.035078] ? lock_downgrade+0x900/0x900 [ 236.039230] __should_failslab+0x124/0x180 [ 236.043685] should_failslab+0x9/0x14 [ 236.047480] kmem_cache_alloc_node_trace+0x270/0x740 [ 236.052566] ? kasan_unpoison_shadow+0x35/0x50 [ 236.057166] ? kasan_kmalloc+0xc7/0xe0 [ 236.061047] __kmalloc_node_track_caller+0x33/0x70 [ 236.065965] __kmalloc_reserve.isra.39+0x41/0xe0 [ 236.070706] __alloc_skb+0x155/0x770 [ 236.074405] ? skb_scrub_packet+0x490/0x490 [ 236.078713] ? ip6_route_multipath_add+0x18a0/0x18a0 [ 236.083819] ? ip6_route_multipath_add+0x18a0/0x18a0 [ 236.088917] netlink_ack+0x2c5/0xb80 [ 236.092620] ? netlink_sendmsg+0xfc0/0xfc0 [ 236.096861] netlink_rcv_skb+0x35d/0x440 [ 236.100910] ? rtnetlink_put_metrics+0x690/0x690 [ 236.105687] ? netlink_ack+0xb80/0xb80 [ 236.109615] rtnetlink_rcv+0x1c/0x20 [ 236.113331] netlink_unicast+0x5a5/0x760 [ 236.117405] ? netlink_attachskb+0x9a0/0x9a0 [ 236.121819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.127363] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 236.132392] netlink_sendmsg+0xa18/0xfc0 [ 236.136444] ? netlink_unicast+0x760/0x760 [ 236.140679] ? smack_socket_sendmsg+0xb0/0x190 [ 236.145256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.150836] ? security_socket_sendmsg+0x94/0xc0 [ 236.155608] ? netlink_unicast+0x760/0x760 [ 236.159891] sock_sendmsg+0xd5/0x120 [ 236.163595] ___sys_sendmsg+0x7fd/0x930 [ 236.167601] ? copy_msghdr_from_user+0x580/0x580 [ 236.172347] ? lock_downgrade+0x900/0x900 [ 236.176480] ? proc_fail_nth_write+0x9e/0x210 [ 236.180964] ? __fget_light+0x2e9/0x430 [ 236.184936] ? fget_raw+0x20/0x20 [ 236.188410] ? wait_for_completion+0x8a0/0x8a0 [ 236.192992] ? lock_release+0x970/0x970 [ 236.196962] ? check_preemption_disabled+0x48/0x200 [ 236.201992] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.207527] ? sockfd_lookup_light+0xc5/0x160 [ 236.212011] __sys_sendmsg+0x11d/0x280 [ 236.215886] ? __ia32_sys_shutdown+0x80/0x80 [ 236.220307] ? __sb_end_write+0xd9/0x110 [ 236.224356] ? fput+0x130/0x1a0 [ 236.227624] ? ksys_write+0x1ae/0x260 [ 236.231435] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 236.236875] __x64_sys_sendmsg+0x78/0xb0 [ 236.240958] do_syscall_64+0x1b9/0x820 [ 236.244840] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 236.250208] ? syscall_return_slowpath+0x5e0/0x5e0 [ 236.255148] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 236.259979] ? trace_hardirqs_on_caller+0x310/0x310 [ 236.264985] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 236.269993] ? prepare_exit_to_usermode+0x291/0x3b0 [ 236.275011] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 236.279845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.285020] RIP: 0033:0x457579 [ 236.288197] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 236.307089] RSP: 002b:00007f094c491c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 236.314827] RAX: ffffffffffffffda RBX: 00007f094c491c90 RCX: 0000000000457579 [ 236.322105] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 23:59:55 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x50, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=r0, 0x4) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000300)={0x0, 0xfe, 0x7, 0x10000, 0x1, 0x9, 0x8, 0x101, {0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x1, 0x6, 0x101, 0xc00000, 0x2}}, &(0x7f00000003c0)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000400)={r2, @in={{0x2, 0x4e22, @loopback}}, 0xff, 0x100000001, 0x5f, 0xff}, &(0x7f00000004c0)=0x98) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2f, 'cpu'}, {0x2b, 'memory'}, {0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'io'}, {0x2b, 'io'}, {0x2b, 'rdma'}, {0x2f, 'pids'}]}, 0x2d) clock_adjtime(0x3, &(0x7f0000000500)={0x9, 0x2, 0x7, 0x7, 0x5, 0x1ff, 0x2, 0x0, 0x44e800000000, 0x9, 0x9, 0x3ff, 0x5, 0x5, 0x3, 0xb24, 0x0, 0x3, 0x8000, 0x8, 0x7, 0x0, 0x81, 0x20, 0x4c4, 0xe5e}) syz_emit_ethernet(0xffffffffffffffab, &(0x7f00000001c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [{[{0x9100, 0x7fff, 0x1, 0x1}], {0x8100, 0xfa, 0x8, 0x4}}], {@ipx={0x8137, {0xffff, 0x0, 0xad, 0x15, {@random, @random="ea4231d28875", 0x8}, {@random=0x467b, @current, 0x3}, "9570cfc521c2aa31d01bcbbfff445b0e05394bc8980e3941a3d8686b4b182ae09257ca99daaa5819cc2a519c686f835e9d868d67fc73584f39c33dc87911af3195ca79b16a58d8c1d461b9730d8851e3e802ac3eaf36f51296d37250944a8f8ab5b2d7a3a9fe7c98758eee69f3c98fe5843f1b8cf001b718df6453862b3577e0df83f86cd570557ec435d2c3e5df18ead9d355436899ce4d6122ec887cc44e88976eac249bf1bbd3f10b54ee4be151b5f55b6236d08f3528a5f0ba48eec39575296ce66e24c958f159c7f95cd7dfb9"}}}}, &(0x7f0000000040)={0x8000, 0xfffffffffffffffc, [0x0, 0x119]}) 23:59:55 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:55 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 236.329364] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 236.336620] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f094c4926d4 [ 236.343877] R13: 00000000004c3536 R14: 00000000004d5328 R15: 0000000000000005 23:59:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x315) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_group_source_req(r0, 0x0, 0xa1f5101bde6d4563, &(0x7f0000000780)={0x8, {{0x2, 0x4e23, @broadcast}}, {{0x2, 0x4e24, @local}}}, 0x108) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000580)={0x0, 0x0, 0x5, 0x0, [], [{0x260577c1, 0x7f, 0x50d, 0xee6, 0x1, 0x100000000}, {0x4, 0x80000000, 0x101, 0xfffffffffffffffa, 0x100000001, 0x80000000}], [[], [], [], [], []]}) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f0000000340)) fchown(r3, 0x0, r4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x9, 0xffffffffffffffe1, 0x100000001, 0x0, 0x81}, &(0x7f00000004c0)=0x14) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000500)=@assoc_value={r5, 0x4}, &(0x7f0000000540)=0x8) listen(r3, 0x18) r6 = socket$inet6(0xa, 0x5, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 23:59:55 executing program 4 (fault-call:3 fault-nth:6): r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:55 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getpeername$packet(r0, &(0x7f0000007880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000078c0)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000100001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) open$dir(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)=@report={0xd0, 0x20, 0x200, 0x70bd2c, 0x25dfdbfc, {0x32, {@in6=@remote, @in6=@dev={0xfe, 0x80, [], 0xf}, 0x4e23, 0x9, 0x4e20, 0x1000, 0xa, 0xa0, 0x0, 0x7f, r1, r2}}, [@algo_crypt={0x84, 0x2, {{'ecb-cast6-avx\x00'}, 0x1c8, "b6c0ce77f6d7fd47dd053dddd0bc0e78b474c88006582f0856962ddbee92e7e7977a7b96553531f7f155456e202c4ade8f06d61ca9702b5846"}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x40000}, 0x91) 23:59:55 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:55 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 236.477593] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 23:59:55 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:55 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) [ 236.647375] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 23:59:55 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:55 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:55 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x48}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:55 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) [ 236.665727] loop3: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 236.882035] loop3: partition table partially beyond EOD, truncated [ 236.901420] loop3: p1 start 1 is beyond EOD, truncated [ 236.926065] loop3: p2 size 2 extends beyond EOD, truncated [ 236.959417] loop3: p3 start 201 is beyond EOD, truncated [ 236.966031] loop3: p4 start 301 is beyond EOD, truncated [ 236.971643] loop3: p5 start 1 is beyond EOD, truncated [ 236.979964] loop3: p6 start 1 is beyond EOD, truncated [ 236.985825] loop3: p7 start 1 is beyond EOD, truncated [ 236.991303] loop3: p8 start 1 is beyond EOD, truncated [ 236.997209] loop3: p9 start 1 is beyond EOD, truncated [ 237.003049] loop3: p10 start 1 is beyond EOD, truncated [ 237.008553] loop3: p11 start 1 is beyond EOD, truncated [ 237.015152] loop3: p12 start 1 is beyond EOD, truncated [ 237.020669] loop3: p13 start 1 is beyond EOD, truncated [ 237.028204] loop3: p14 start 1 is beyond EOD, truncated [ 237.034885] loop3: p15 start 1 is beyond EOD, truncated [ 237.040899] loop3: p16 start 1 is beyond EOD, truncated [ 237.046807] loop3: p17 start 1 is beyond EOD, truncated [ 237.052927] loop3: p18 start 1 is beyond EOD, truncated 23:59:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd24d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000580)=0x19fc, 0x4) sendto$inet(r1, &(0x7f00000000c0)="b0", 0x1, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r1, &(0x7f00000032c0)=[{{&(0x7f0000000100), 0x80, &(0x7f0000000640)=[{&(0x7f0000000200)=""/218, 0xda}, {&(0x7f0000000300)=""/146, 0x92}, {&(0x7f00000031c0)=""/241, 0xf1}, {&(0x7f00000004c0)=""/90, 0x5a}, {&(0x7f00000005c0)=""/89, 0x59}], 0x5}}, {{&(0x7f0000000b40)=@nfc, 0x80, &(0x7f0000001f00), 0x3ab, &(0x7f0000000540)=""/17, 0x11}}], 0x2, 0x2102, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x2, 0x203) getresuid(&(0x7f0000000440), &(0x7f0000000480)=0x0, &(0x7f00000006c0)) fstat(r1, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r2, &(0x7f0000000780)={0xa0, 0x19, 0x1, {0x88, {0x8, 0x3, 0x5}, 0x80, r3, r4, 0x7, 0x8, 0x0, 0x1, 0x8000, 0x4, 0x80000001, 0x3f, 0x7ff, 0x400, 0xfffffffffffffffd, 0x7, 0x7f, 0x2, 0x3}}, 0xa0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setitimer(0x0, &(0x7f0000000180)={{0x0, 0x2710}, {r5, r6/1000+30000}}, &(0x7f00000003c0)) 23:59:55 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:55 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x2f}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 237.060682] loop3: p19 start 1 is beyond EOD, truncated [ 237.066579] loop3: p20 start 1 is beyond EOD, truncated [ 237.072501] loop3: p21 start 1 is beyond EOD, truncated [ 237.078005] loop3: p22 start 1 is beyond EOD, truncated [ 237.084211] loop3: p23 start 1 is beyond EOD, truncated [ 237.089682] loop3: p24 start 1 is beyond EOD, truncated [ 237.096912] loop3: p25 start 1 is beyond EOD, truncated [ 237.109555] loop3: p26 start 1 is beyond EOD, truncated [ 237.119209] loop3: p27 start 1 is beyond EOD, truncated [ 237.126673] loop3: p28 start 1 is beyond EOD, [ 237.134508] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 237.146232] truncated [ 237.159222] loop3: p29 start 1 is beyond EOD, truncated [ 237.169747] loop3: p30 start 1 is beyond EOD, truncated [ 237.175600] loop3: p31 start 1 is beyond EOD, truncated [ 237.183243] loop3: p32 start 1 is beyond EOD, truncated [ 237.188844] loop3: p33 start 1 is beyond EOD, truncated [ 237.203617] loop3: p34 start 1 is beyond EOD, truncated [ 237.209180] loop3: p35 start 1 is beyond EOD, truncated [ 237.215130] loop3: p36 start 1 is beyond EOD, truncated [ 237.220651] loop3: p37 start 1 is beyond EOD, truncated [ 237.226496] loop3: p38 start 1 is beyond EOD, truncated [ 237.232395] loop3: p39 start 1 is beyond EOD, truncated [ 237.237874] loop3: p40 start 1 is beyond EOD, truncated [ 237.244875] loop3: p41 start 1 is beyond EOD, truncated [ 237.250379] loop3: p42 start 1 is beyond EOD, truncated [ 237.256224] loop3: p43 start 1 is beyond EOD, truncated [ 237.261667] loop3: p44 start 1 is beyond EOD, truncated [ 237.267132] loop3: p45 start 1 is beyond EOD, truncated [ 237.272566] loop3: p46 start 1 is beyond EOD, truncated [ 237.277938] loop3: p47 start 1 is beyond EOD, truncated [ 237.283461] loop3: p48 start 1 is beyond EOD, truncated [ 237.288850] loop3: p49 start 1 is beyond EOD, truncated [ 237.294592] loop3: p50 start 1 is beyond EOD, truncated [ 237.299942] loop3: p51 start 1 is beyond EOD, truncated [ 237.305326] loop3: p52 start 1 is beyond EOD, truncated [ 237.310684] loop3: p53 start 1 is beyond EOD, truncated [ 237.316105] loop3: p54 start 1 is beyond EOD, truncated [ 237.321481] loop3: p55 start 1 is beyond EOD, truncated [ 237.326891] loop3: p56 start 1 is beyond EOD, truncated [ 237.332315] loop3: p57 start 1 is beyond EOD, truncated [ 237.337677] loop3: p58 start 1 is beyond EOD, truncated [ 237.343063] loop3: p59 start 1 is beyond EOD, truncated [ 237.348426] loop3: p60 start 1 is beyond EOD, truncated [ 237.353877] loop3: p61 start 1 is beyond EOD, truncated [ 237.359241] loop3: p62 start 1 is beyond EOD, truncated [ 237.364659] loop3: p63 start 1 is beyond EOD, truncated [ 237.370025] loop3: p64 start 1 is beyond EOD, truncated [ 237.375440] loop3: p65 start 1 is beyond EOD, truncated [ 237.380830] loop3: p66 start 1 is beyond EOD, truncated [ 237.386245] loop3: p67 start 1 is beyond EOD, truncated [ 237.391641] loop3: p68 start 1 is beyond EOD, truncated [ 237.397060] loop3: p69 start 1 is beyond EOD, truncated [ 237.402509] loop3: p70 start 1 is beyond EOD, truncated [ 237.407866] loop3: p71 start 1 is beyond EOD, truncated [ 237.413281] loop3: p72 start 1 is beyond EOD, truncated [ 237.418661] loop3: p73 start 1 is beyond EOD, truncated [ 237.424424] loop3: p74 start 1 is beyond EOD, truncated [ 237.429780] loop3: p75 start 1 is beyond EOD, truncated [ 237.435184] loop3: p76 start 1 is beyond EOD, truncated [ 237.440583] loop3: p77 start 1 is beyond EOD, truncated [ 237.445976] loop3: p78 start 1 is beyond EOD, truncated [ 237.451381] loop3: p79 start 1 is beyond EOD, truncated [ 237.456802] loop3: p80 start 1 is beyond EOD, truncated [ 237.462227] loop3: p81 start 1 is beyond EOD, truncated [ 237.467582] loop3: p82 start 1 is beyond EOD, truncated [ 237.473002] loop3: p83 start 1 is beyond EOD, truncated [ 237.478424] loop3: p84 start 1 is beyond EOD, truncated [ 237.484438] loop3: p85 start 1 is beyond EOD, truncated [ 237.489795] loop3: p86 start 1 is beyond EOD, truncated [ 237.495269] loop3: p87 start 1 is beyond EOD, truncated [ 237.500647] loop3: p88 start 1 is beyond EOD, truncated [ 237.506072] loop3: p89 start 1 is beyond EOD, truncated [ 237.511462] loop3: p90 start 1 is beyond EOD, truncated [ 237.516896] loop3: p91 start 1 is beyond EOD, truncated [ 237.522334] loop3: p92 start 1 is beyond EOD, truncated [ 237.527686] loop3: p93 start 1 is beyond EOD, truncated [ 237.533099] loop3: p94 start 1 is beyond EOD, truncated [ 237.538479] loop3: p95 start 1 is beyond EOD, truncated [ 237.543890] loop3: p96 start 1 is beyond EOD, truncated [ 237.549251] loop3: p97 start 1 is beyond EOD, truncated [ 237.555095] loop3: p98 start 1 is beyond EOD, truncated [ 237.560464] loop3: p99 start 1 is beyond EOD, truncated [ 237.566354] loop3: p100 start 1 is beyond EOD, truncated [ 237.571859] loop3: p101 start 1 is beyond EOD, truncated [ 237.577354] loop3: p102 start 1 is beyond EOD, truncated [ 237.582841] loop3: p103 start 1 is beyond EOD, truncated [ 237.588291] loop3: p104 start 1 is beyond EOD, truncated [ 237.593768] loop3: p105 start 1 is beyond EOD, truncated [ 237.599223] loop3: p106 start 1 is beyond EOD, truncated [ 237.604699] loop3: p107 start 1 is beyond EOD, truncated [ 237.610172] loop3: p108 start 1 is beyond EOD, truncated [ 237.615654] loop3: p109 start 1 is beyond EOD, truncated [ 237.621112] loop3: p110 start 1 is beyond EOD, truncated [ 237.626652] loop3: p111 start 1 is beyond EOD, truncated [ 237.632141] loop3: p112 start 1 is beyond EOD, truncated [ 237.637594] loop3: p113 start 1 is beyond EOD, truncated [ 237.643073] loop3: p114 start 1 is beyond EOD, truncated [ 237.648523] loop3: p115 start 1 is beyond EOD, truncated [ 237.654001] loop3: p116 start 1 is beyond EOD, truncated [ 237.659501] loop3: p117 start 1 is beyond EOD, truncated [ 237.664983] loop3: p118 start 1 is beyond EOD, truncated [ 237.670437] loop3: p119 start 1 is beyond EOD, truncated [ 237.675942] loop3: p120 start 1 is beyond EOD, truncated [ 237.681392] loop3: p121 start 1 is beyond EOD, truncated [ 237.687267] loop3: p122 start 1 is beyond EOD, truncated [ 237.692779] loop3: p123 start 1 is beyond EOD, truncated [ 237.698242] loop3: p124 start 1 is beyond EOD, truncated [ 237.703745] loop3: p125 start 1 is beyond EOD, truncated [ 237.709211] loop3: p126 start 1 is beyond EOD, truncated [ 237.714714] loop3: p127 start 1 is beyond EOD, truncated [ 237.720180] loop3: p128 start 1 is beyond EOD, truncated [ 237.725696] loop3: p129 start 1 is beyond EOD, truncated [ 237.731145] loop3: p130 start 1 is beyond EOD, truncated [ 237.736663] loop3: p131 start 1 is beyond EOD, truncated [ 237.742171] loop3: p132 start 1 is beyond EOD, truncated [ 237.747631] loop3: p133 start 1 is beyond EOD, truncated [ 237.753145] loop3: p134 start 1 is beyond EOD, truncated [ 237.758595] loop3: p135 start 1 is beyond EOD, truncated [ 237.764073] loop3: p136 start 1 is beyond EOD, truncated [ 237.769557] loop3: p137 start 1 is beyond EOD, truncated [ 237.775046] loop3: p138 start 1 is beyond EOD, truncated [ 237.780497] loop3: p139 start 1 is beyond EOD, truncated [ 237.785972] loop3: p140 start 1 is beyond EOD, truncated [ 237.791424] loop3: p141 start 1 is beyond EOD, truncated [ 237.796916] loop3: p142 start 1 is beyond EOD, truncated [ 237.802481] loop3: p143 start 1 is beyond EOD, truncated [ 237.807940] loop3: p144 start 1 is beyond EOD, truncated [ 237.813765] loop3: p145 start 1 is beyond EOD, truncated [ 237.819212] loop3: p146 start 1 is beyond EOD, truncated [ 237.824718] loop3: p147 start 1 is beyond EOD, truncated [ 237.830169] loop3: p148 start 1 is beyond EOD, truncated [ 237.835667] loop3: p149 start 1 is beyond EOD, truncated [ 237.841119] loop3: p150 start 1 is beyond EOD, truncated [ 237.846603] loop3: p151 start 1 is beyond EOD, truncated [ 237.852097] loop3: p152 start 1 is beyond EOD, truncated [ 237.857533] loop3: p153 start 1 is beyond EOD, truncated [ 237.863014] loop3: p154 start 1 is beyond EOD, truncated [ 237.868473] loop3: p155 start 1 is beyond EOD, truncated [ 237.873968] loop3: p156 start 1 is beyond EOD, truncated [ 237.879417] loop3: p157 start 1 is beyond EOD, truncated [ 237.884931] loop3: p158 start 1 is beyond EOD, truncated [ 237.890383] loop3: p159 start 1 is beyond EOD, truncated [ 237.895977] loop3: p160 start 1 is beyond EOD, truncated [ 237.901431] loop3: p161 start 1 is beyond EOD, truncated [ 237.906923] loop3: p162 start 1 is beyond EOD, truncated [ 237.912936] loop3: p163 start 1 is beyond EOD, truncated [ 237.918375] loop3: p164 start 1 is beyond EOD, truncated [ 237.923884] loop3: p165 start 1 is beyond EOD, truncated [ 237.929432] loop3: p166 start 1 is beyond EOD, truncated [ 237.934930] loop3: p167 start 1 is beyond EOD, truncated [ 237.940382] loop3: p168 start 1 is beyond EOD, truncated [ 237.946237] loop3: p169 start 1 is beyond EOD, truncated [ 237.951686] loop3: p170 start 1 is beyond EOD, truncated [ 237.957167] loop3: p171 start 1 is beyond EOD, truncated [ 237.962656] loop3: p172 start 1 is beyond EOD, truncated [ 237.968092] loop3: p173 start 1 is beyond EOD, truncated [ 237.973647] loop3: p174 start 1 is beyond EOD, truncated [ 237.979104] loop3: p175 start 1 is beyond EOD, truncated [ 237.984591] loop3: p176 start 1 is beyond EOD, truncated [ 237.990057] loop3: p177 start 1 is beyond EOD, truncated [ 237.995583] loop3: p178 start 1 is beyond EOD, truncated [ 238.001043] loop3: p179 start 1 is beyond EOD, truncated [ 238.006512] loop3: p180 start 1 is beyond EOD, truncated [ 238.012038] loop3: p181 start 1 is beyond EOD, truncated [ 238.017475] loop3: p182 start 1 is beyond EOD, truncated [ 238.022953] loop3: p183 start 1 is beyond EOD, truncated [ 238.028422] loop3: p184 start 1 is beyond EOD, truncated [ 238.033908] loop3: p185 start 1 is beyond EOD, truncated [ 238.039379] loop3: p186 start 1 is beyond EOD, truncated [ 238.044869] loop3: p187 start 1 is beyond EOD, truncated [ 238.050320] loop3: p188 start 1 is beyond EOD, truncated [ 238.055787] loop3: p189 start 1 is beyond EOD, truncated [ 238.061248] loop3: p190 start 1 is beyond EOD, truncated [ 238.066716] loop3: p191 start 1 is beyond EOD, truncated [ 238.072460] loop3: p192 start 1 is beyond EOD, truncated [ 238.077914] loop3: p193 start 1 is beyond EOD, truncated [ 238.083397] loop3: p194 start 1 is beyond EOD, truncated [ 238.088867] loop3: p195 start 1 is beyond EOD, truncated [ 238.094363] loop3: p196 start 1 is beyond EOD, truncated [ 238.099822] loop3: p197 start 1 is beyond EOD, truncated [ 238.105311] loop3: p198 start 1 is beyond EOD, truncated [ 238.110759] loop3: p199 start 1 is beyond EOD, truncated [ 238.116238] loop3: p200 start 1 is beyond EOD, truncated [ 238.121697] loop3: p201 start 1 is beyond EOD, truncated [ 238.128206] loop3: p202 start 1 is beyond EOD, truncated [ 238.133737] loop3: p203 start 1 is beyond EOD, truncated [ 238.139233] loop3: p204 start 1 is beyond EOD, truncated [ 238.144736] loop3: p205 start 1 is beyond EOD, truncated [ 238.150214] loop3: p206 start 1 is beyond EOD, truncated [ 238.155726] loop3: p207 start 1 is beyond EOD, truncated [ 238.161197] loop3: p208 start 1 is beyond EOD, truncated [ 238.166840] loop3: p209 start 1 is beyond EOD, truncated [ 238.172357] loop3: p210 start 1 is beyond EOD, truncated [ 238.177817] loop3: p211 start 1 is beyond EOD, truncated [ 238.183313] loop3: p212 start 1 is beyond EOD, truncated [ 238.188782] loop3: p213 start 1 is beyond EOD, truncated [ 238.194284] loop3: p214 start 1 is beyond EOD, truncated [ 238.199752] loop3: p215 start 1 is beyond EOD, truncated [ 238.205566] loop3: p216 start 1 is beyond EOD, truncated [ 238.211018] loop3: p217 start 1 is beyond EOD, truncated [ 238.216496] loop3: p218 start 1 is beyond EOD, truncated [ 238.221975] loop3: p219 start 1 is beyond EOD, truncated [ 238.227428] loop3: p220 start 1 is beyond EOD, truncated [ 238.232903] loop3: p221 start 1 is beyond EOD, truncated [ 238.238367] loop3: p222 start 1 is beyond EOD, truncated [ 238.243870] loop3: p223 start 1 is beyond EOD, truncated [ 238.249324] loop3: p224 start 1 is beyond EOD, truncated [ 238.254805] loop3: p225 start 1 is beyond EOD, truncated [ 238.260265] loop3: p226 start 1 is beyond EOD, truncated [ 238.265742] loop3: p227 start 1 is beyond EOD, truncated [ 238.271202] loop3: p228 start 1 is beyond EOD, truncated [ 238.276704] loop3: p229 start 1 is beyond EOD, truncated [ 238.282194] loop3: p230 start 1 is beyond EOD, truncated [ 238.287630] loop3: p231 start 1 is beyond EOD, truncated [ 238.293141] loop3: p232 start 1 is beyond EOD, truncated [ 238.298628] loop3: p233 start 1 is beyond EOD, truncated [ 238.304115] loop3: p234 start 1 is beyond EOD, truncated [ 238.309586] loop3: p235 start 1 is beyond EOD, truncated [ 238.315080] loop3: p236 start 1 is beyond EOD, truncated [ 238.320530] loop3: p237 start 1 is beyond EOD, truncated [ 238.326023] loop3: p238 start 1 is beyond EOD, truncated [ 238.331471] loop3: p239 start 1 is beyond EOD, truncated [ 238.337323] loop3: p240 start 1 is beyond EOD, truncated [ 238.342832] loop3: p241 start 1 is beyond EOD, truncated [ 238.348284] loop3: p242 start 1 is beyond EOD, truncated [ 238.353795] loop3: p243 start 1 is beyond EOD, truncated [ 238.359289] loop3: p244 start 1 is beyond EOD, truncated [ 238.364780] loop3: p245 start 1 is beyond EOD, truncated [ 238.370270] loop3: p246 start 1 is beyond EOD, truncated [ 238.375783] loop3: p247 start 1 is beyond EOD, truncated [ 238.381255] loop3: p248 start 1 is beyond EOD, truncated [ 238.386767] loop3: p249 start 1 is beyond EOD, truncated [ 238.392270] loop3: p250 start 1 is beyond EOD, truncated [ 238.397720] loop3: p251 start 1 is beyond EOD, truncated [ 238.403224] loop3: p252 start 1 is beyond EOD, truncated [ 238.408684] loop3: p253 start 1 is beyond EOD, truncated [ 238.414179] loop3: p254 start 1 is beyond EOD, truncated [ 238.419648] loop3: p255 start 1 is beyond EOD, truncated 23:59:57 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007800)={0x0, @rand_addr, @multicast1}, &(0x7f0000007840)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:57 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:57 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x20000210}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/icmp6\x00') ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000240)=0x240) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000004880)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="c744240006000000c744240200000080c7442406000000000f01142466b8c2008ec80f070f0f369a0f2002674669f9c12c000026660f38157e0f660f0dbead00000066baf80cb8bcecb281ef66bafc0cb80b000000ef0f20d835080000000f22d8", 0x61}], 0x1, 0x0, &(0x7f0000000040), 0x3c7) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x4, 0x8000) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, &(0x7f00000001c0)={'bond_slave_1\x00', {0x2, 0x4e23, @rand_addr=0x9}}) pipe(&(0x7f00000002c0)) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000000200)) 23:59:57 executing program 1: syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') r0 = socket(0x820000000000000a, 0x80003, 0x100000000) getsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) modify_ldt$write(0x1, &(0x7f0000000040)={0x7, 0x20000000, 0x400, 0x1, 0x10001, 0x4, 0x75e, 0x19, 0x1, 0xdf}, 0x10) 23:59:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:57 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x2}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:57 executing program 1: r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000080)={0x0, &(0x7f0000000040), 0x0, r0}) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000000, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) 23:59:57 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0xa}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:57 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:57 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10002000000000, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000480)=""/4096, &(0x7f00000000c0)=0x1000) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x0, 0x0) io_setup(0x3, &(0x7f0000000080)=0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000240)={0x800, 0x5, 0x8, 0x9, 0x9, 0x100000000}) connect$unix(r0, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e22}, 0x6e) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)}]) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000001480)={{0x0, 0x4, 0x1655, 0xf8, '\x00', 0x6}, 0x0, [0x6, 0x3f, 0x4, 0x4, 0x7fff, 0x80000001, 0x100000001, 0x3ff, 0xfff, 0x13, 0x7, 0x8, 0xe504, 0x1ff, 0x400, 0x80000001, 0x8f, 0x9, 0xad, 0x80000000, 0x5f58ef00, 0x1ff, 0xfffffffffffffff7, 0x90000000, 0xfffffffffffffbff, 0x2, 0x6, 0x8001, 0x3aa0000000000, 0x8, 0xffff, 0x36e, 0x401, 0x5, 0x2, 0x20, 0x5, 0x100000000, 0x5, 0x7fffffff, 0x6, 0x2, 0xb3d, 0x1, 0x3, 0x8, 0xc000000000000000, 0x100000001, 0x4e09, 0xff7, 0x9, 0x3f, 0x10000, 0x800, 0x9, 0x0, 0x4, 0x0, 0x104c, 0x100, 0x8e93, 0x5, 0x8, 0x9, 0x4, 0xffffffff, 0x6, 0xe132000000, 0x9, 0x1, 0x0, 0x5, 0x1, 0x80000000, 0x40, 0x1f, 0x9, 0x5, 0x9, 0x1, 0x6, 0x0, 0x0, 0x4, 0x3, 0x6, 0xdd, 0x1, 0x3ff, 0x842c, 0x100000001, 0x10000, 0x0, 0x9, 0x4, 0x100000001, 0x3ff, 0x1, 0x5, 0x3, 0x2, 0x4, 0x9, 0x1, 0xc4ae, 0x4, 0x3, 0x7, 0x2, 0xfc00000000000000, 0x80000000, 0x20, 0x216, 0x8, 0x0, 0x6, 0xfffffffffffffc00, 0x9147, 0x2, 0x1f, 0x8, 0x1f, 0x4, 0x8, 0x9, 0x81, 0xfffffffffffffffa, 0x3b1], {r3, r4+10000000}}) 23:59:57 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x7}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:57 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x3f00000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") sendto$inet6(r0, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:57 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 238.936342] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 23:59:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) io_setup(0x200, &(0x7f0000000940)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x1}]) 23:59:57 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xfe80000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:57 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="d5b2692ee3138faadd2792c023e3aff8078e0e0c8e7abc17b0f5fb15b6ee7d7c8bdb2f3b8d95e2862211472b053a6a6ff181fc7d5b60124f1518665344df30ac4d6fb70fdf78c7c381b6ddda58be5724c70ca20e1c8f5747b709fdd8f51e351b9e69", 0x62, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) [ 239.035945] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 23:59:57 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xff000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000340)=""/148, 0x94}, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x40000000000037f, 0x0) 23:59:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x4011, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) 23:59:58 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:58 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 239.136265] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 23:59:58 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x2000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:58 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000003240)=""/4096) 23:59:58 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r2, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) clone(0x0, &(0x7f0000000000), &(0x7f00000006c0), &(0x7f0000000940), &(0x7f0000001a00)="fe") 23:59:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x3, @mcast1, 0x7}, 0x1c) [ 239.266887] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 239.279047] audit: type=1804 audit(1538697598.121:33): pid=8871 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir793298784/syzkaller.qfzoIG/41/bus" dev="sda1" ino=16539 res=1 23:59:58 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:58 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xffffff7f00000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 239.298030] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:59:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x3, @mcast1, 0x7}, 0x1c) 23:59:58 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 239.381141] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 23:59:58 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:58 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xf00000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 23:59:58 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x91010000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 239.509794] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 23:59:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 239.581271] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 240.125280] audit: type=1804 audit(1538697598.971:34): pid=8920 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir793298784/syzkaller.qfzoIG/41/bus" dev="sda1" ino=16539 res=1 [ 240.153069] audit: type=1804 audit(1538697598.971:35): pid=8919 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir793298784/syzkaller.qfzoIG/41/bus" dev="sda1" ino=16539 res=1 23:59:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x2}) 23:59:59 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xfffffff0}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:59 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getpeername$packet(r0, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000075c0)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:59 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 23:59:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x100000004e23, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) shutdown(r1, 0x1) recvmmsg(r1, &(0x7f0000003a00), 0x3a1, 0x0, 0x0) 23:59:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 240.469599] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 23:59:59 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xfc000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:59 executing program 5: semget$private(0x0, 0x0, 0x0) r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x14) 23:59:59 executing program 3: 23:59:59 executing program 5: semget$private(0x0, 0x0, 0x0) r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x14) 23:59:59 executing program 1: [ 240.597675] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 23:59:59 executing program 3: 23:59:59 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) accept4$packet(r0, &(0x7f0000007500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007540)=0x14, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:59 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x8000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:59 executing program 1: 23:59:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:59 executing program 3: 23:59:59 executing program 5: semget$private(0x0, 0x0, 0x0) r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x14) 23:59:59 executing program 1: [ 240.805473] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 23:59:59 executing program 5: semget$private(0x0, 0x0, 0x0) r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x14) 23:59:59 executing program 3: 23:59:59 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:59 executing program 1: 23:59:59 executing program 5: semget$private(0x0, 0x0, 0x0) r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 23:59:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 23:59:59 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x3}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 23:59:59 executing program 3: 23:59:59 executing program 1: 23:59:59 executing program 5: semget$private(0x0, 0x0, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 23:59:59 executing program 3: [ 241.024535] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 23:59:59 executing program 1: 00:00:00 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:00 executing program 3: [ 241.120729] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:00 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) accept4$packet(r0, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000073c0)=0x14, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:00 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xf4030000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:00 executing program 1: 00:00:00 executing program 5: semget$private(0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:00 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x82a0323, 0x10}) 00:00:00 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:00 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/214, 0xd6}], 0x1) [ 241.267448] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:00 executing program 5: r0 = socket(0x0, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:00 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 241.334984] vhci_hcd: invalid port number 16 00:00:00 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x9101}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:00 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x40}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 00:00:00 executing program 1: clone(0x20040200, &(0x7f0000000180), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000980), &(0x7f00000006c0)) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000140)=""/10, 0xa}], 0x1, 0x0) timer_create(0x0, &(0x7f0000066000), &(0x7f00009b1ffc)) r0 = syz_open_procfs(0x0, &(0x7f0000000280)="636c6561725f7265667300b04978e60c4ba32fd7b949714bcbe80c57af59747c61a31619cbafea034f5b6bb15332860b9f14c654d1012484f5c9d8edcad2f073e0ca5078fc64d38d1e297b9d66a71452b92cae675696216e08f21e87b8b54da0d1b5f3b4d6f8caf34a15ed2b2c98fcbf581297b31beafaffb76778a196ad93aa3d2d7a06720827") r1 = syz_open_procfs(0x0, &(0x7f0000000440)='syscall\x00') sendfile(r0, r1, &(0x7f0000000240), 0x1) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x3b, 0x6, 0x0, {0x0, 0x0, 0x12, 0x0, 'mime_typemime_type'}}, 0x3b) open$dir(&(0x7f0000000200)='./file0\x00', 0x27e, 0x0) [ 241.431714] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:00 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') r2 = dup2(r0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:00 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x9}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:00 executing program 5: r0 = socket(0xa, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:00 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 241.564434] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:00 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xff00000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:00 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) accept$packet(r0, &(0x7f0000007300), &(0x7f0000007340)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:00 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:00 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:00 executing program 1 (fault-call:2 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 241.746827] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:00 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000007280)={@remote}, &(0x7f00000072c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 241.818411] FAULT_INJECTION: forcing a failure. [ 241.818411] name failslab, interval 1, probability 0, space 0, times 0 [ 241.829757] CPU: 1 PID: 9132 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #44 [ 241.836960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.846329] Call Trace: [ 241.848944] dump_stack+0x1c4/0x2b4 [ 241.852602] ? dump_stack_print_info.cold.2+0x52/0x52 [ 241.857840] should_fail.cold.4+0xa/0x17 [ 241.857884] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 241.867045] ? fib6_table_lookup+0xc80/0x11d0 [ 241.867072] ? rt6_age_exceptions+0x790/0x790 [ 241.876096] ? lock_acquire+0x1ed/0x520 [ 241.880085] ? smack_d_instantiate+0x136/0xea0 [ 241.884682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.890247] ? __rt6_find_exception_rcu+0x379/0x510 [ 241.895304] ? rt6_exception_hash+0x7e0/0x7e0 [ 241.899811] ? mark_held_locks+0x130/0x130 [ 241.904069] ? rcu_bh_qs+0xc0/0xc0 [ 241.907862] ? unwind_dump+0x190/0x190 [ 241.911763] __should_failslab+0x124/0x180 [ 241.916006] should_failslab+0x9/0x14 [ 241.919841] kmem_cache_alloc+0x47/0x730 [ 241.923904] ? lock_release+0x970/0x970 [ 241.927895] ? fib6_remove_prefsrc+0x4b0/0x4b0 [ 241.932489] dst_alloc+0xbb/0x1d0 [ 241.935982] ip6_dst_alloc+0x35/0xa0 [ 241.939702] ip6_pol_route+0x70b/0xd90 [ 241.943626] ? ip6_pol_route_lookup+0xe70/0xe70 [ 241.948315] ? mark_held_locks+0x130/0x130 [ 241.952555] ip6_pol_route_output+0x54/0x70 [ 241.956882] ? ip6_pol_route_input+0x80/0x80 [ 241.961294] fib6_rule_lookup+0x13a/0x860 [ 241.965447] ? fib6_lookup+0x480/0x480 00:00:00 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 241.969345] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 241.975150] ? mark_held_locks+0x130/0x130 [ 241.979520] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 241.984724] ip6_route_output_flags+0x2c5/0x350 [ 241.989410] ip6_dst_lookup_tail+0xe27/0x1d60 [ 241.993917] ? mark_held_locks+0x130/0x130 [ 241.998155] ? mark_held_locks+0x130/0x130 [ 242.002423] ? dst_output+0x180/0x180 [ 242.006245] ? sk_dst_check+0x3ce/0x790 [ 242.010260] ? lock_downgrade+0x900/0x900 [ 242.014438] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 242.020250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.025797] ? process_measurement+0x280/0x1bf0 [ 242.030497] ? mark_held_locks+0x130/0x130 [ 242.034751] ? sk_dst_check+0x4ab/0x790 [ 242.038740] ? sock_def_write_space+0x9c0/0x9c0 [ 242.043908] ? lock_release+0x970/0x970 [ 242.047897] ip6_dst_lookup_flow+0xc8/0x270 [ 242.052227] ? ip6_dst_lookup+0x60/0x60 [ 242.056217] ip6_sk_dst_lookup_flow+0x5e8/0xc50 [ 242.060894] ? ip6_dst_lookup_flow+0x270/0x270 [ 242.065495] ? udp_lib_get_port+0x8e8/0x1b80 [ 242.069910] ? udp_lib_get_port+0x8e8/0x1b80 [ 242.074323] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 242.079520] udpv6_sendmsg+0x2160/0x36b0 [ 242.083615] ? ip_reply_glue_bits+0xc0/0xc0 [ 242.087959] ? udp6_unicast_rcv_skb.isra.24+0x340/0x340 [ 242.093323] ? udp_seq_next+0x80/0x80 [ 242.097154] ? ip6_datagram_release_cb+0x3c3/0x640 [ 242.102122] ? lock_downgrade+0x900/0x900 [ 242.106305] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 242.112123] ? release_sock+0x1ec/0x2c0 [ 242.116114] ? lock_downgrade+0x900/0x900 [ 242.120273] ? trace_hardirqs_on+0xbd/0x310 [ 242.124606] ? _raw_spin_unlock_bh+0x30/0x40 [ 242.129027] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 242.134493] ? __local_bh_enable_ip+0x160/0x260 [ 242.139169] ? _raw_spin_unlock_bh+0x30/0x40 [ 242.143621] ? release_sock+0x1ec/0x2c0 [ 242.147625] ? lock_sock_nested+0x9a/0x120 [ 242.151870] ? __release_sock+0x3a0/0x3a0 [ 242.156026] ? udp_v6_get_port+0x273/0x660 [ 242.160273] inet_sendmsg+0x1a1/0x690 [ 242.164110] ? udp6_unicast_rcv_skb.isra.24+0x340/0x340 [ 242.169497] ? inet_sendmsg+0x1a1/0x690 [ 242.173501] ? ipip_gro_receive+0x100/0x100 [ 242.177842] ? smack_socket_sendmsg+0xb0/0x190 [ 242.182442] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.188019] ? security_socket_sendmsg+0x94/0xc0 [ 242.192789] ? ipip_gro_receive+0x100/0x100 [ 242.197136] sock_sendmsg+0xd5/0x120 [ 242.200874] __sys_sendto+0x3d7/0x670 [ 242.204691] ? __ia32_sys_getpeername+0xb0/0xb0 [ 242.209375] ? wait_for_completion+0x8a0/0x8a0 [ 242.213966] ? lock_release+0x970/0x970 [ 242.217958] ? check_preemption_disabled+0x48/0x200 [ 242.222986] ? fsnotify_first_mark+0x350/0x350 [ 242.227584] ? __fsnotify_parent+0xcc/0x420 [ 242.231917] ? fsnotify+0x12f0/0x12f0 [ 242.235734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.241289] ? __sb_end_write+0xd9/0x110 [ 242.245367] ? fput+0x130/0x1a0 [ 242.248655] ? ksys_write+0x1ae/0x260 [ 242.252465] ? trace_hardirqs_on+0xbd/0x310 [ 242.256794] ? __ia32_sys_read+0xb0/0xb0 [ 242.260877] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.266251] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 242.271713] __x64_sys_sendto+0xe1/0x1a0 [ 242.275786] do_syscall_64+0x1b9/0x820 [ 242.279706] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 242.285080] ? syscall_return_slowpath+0x5e0/0x5e0 [ 242.290019] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 242.294892] ? trace_hardirqs_on_caller+0x310/0x310 [ 242.299918] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 242.304948] ? prepare_exit_to_usermode+0x291/0x3b0 [ 242.309983] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 242.314861] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.320063] RIP: 0033:0x457579 [ 242.323278] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 242.342185] RSP: 002b:00007f1c6a06ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 242.349919] RAX: ffffffffffffffda RBX: 00007f1c6a06ac90 RCX: 0000000000457579 [ 242.357200] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 00:00:01 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xf000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') r2 = dup2(r0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) [ 242.364477] RBP: 000000000072bf00 R08: 0000000020000100 R09: 000000000000001c [ 242.371755] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c6a06b6d4 [ 242.379029] R13: 00000000004c3935 R14: 00000000004d57d8 R15: 0000000000000004 00:00:01 executing program 5: socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:01 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:01 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[]}, 0x78) [ 242.458658] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 242.486195] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:01 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:01 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x6000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:01 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:01 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x0, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB]}, 0x78) [ 242.603787] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 242.638397] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 242.747736] kernel msg: ebtables bug: please report to author: Entries_size never zero 00:00:01 executing program 1 (fault-call:2 fault-nth:1): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:01 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xb00}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:01 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:01 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockname$packet(r0, &(0x7f00000071c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007200)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 242.882851] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 242.912919] FAULT_INJECTION: forcing a failure. [ 242.912919] name failslab, interval 1, probability 0, space 0, times 0 [ 242.954604] CPU: 0 PID: 9200 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #44 [ 242.961866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.971229] Call Trace: [ 242.973853] dump_stack+0x1c4/0x2b4 [ 242.977503] ? dump_stack_print_info.cold.2+0x52/0x52 [ 242.982724] should_fail.cold.4+0xa/0x17 [ 242.986800] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 242.991924] ? __save_stack_trace+0x8d/0xf0 [ 242.996277] ? save_stack+0xa9/0xd0 [ 242.999923] ? save_stack+0x43/0xd0 [ 243.003559] ? kasan_kmalloc+0xc7/0xe0 [ 243.007451] ? kasan_slab_alloc+0x12/0x20 [ 243.011628] ? kmem_cache_alloc_node+0x144/0x730 [ 243.016406] ? __alloc_skb+0x119/0x770 [ 243.020338] ? alloc_skb_with_frags+0x133/0x7d0 [ 243.025014] ? sock_alloc_send_pskb+0x865/0xab0 [ 243.029690] ? sock_alloc_send_skb+0x32/0x40 [ 243.034111] ? __ip6_append_data.isra.46+0x1fd9/0x3530 [ 243.039414] ? ip6_make_skb+0x380/0x5e0 [ 243.043395] ? udpv6_sendmsg+0x2d43/0x36b0 [ 243.047642] ? inet_sendmsg+0x1a1/0x690 [ 243.051634] ? __sys_sendto+0x3d7/0x670 [ 243.055621] ? fs_reclaim_acquire+0x20/0x20 [ 243.059980] ? lock_downgrade+0x900/0x900 [ 243.064152] ? rt6_remove_exception_rt+0x550/0x550 [ 243.069105] ? ___might_sleep+0x1ed/0x300 [ 243.073308] ? arch_local_save_flags+0x40/0x40 [ 243.077902] ? lock_downgrade+0x900/0x900 [ 243.082062] __should_failslab+0x124/0x180 [ 243.086309] should_failslab+0x9/0x14 [ 243.090118] kmem_cache_alloc_node_trace+0x270/0x740 [ 243.095205] ? kasan_unpoison_shadow+0x35/0x50 [ 243.099771] ? kasan_kmalloc+0xc7/0xe0 [ 243.103663] __kmalloc_node_track_caller+0x33/0x70 [ 243.108581] __kmalloc_reserve.isra.39+0x41/0xe0 [ 243.113329] __alloc_skb+0x155/0x770 [ 243.117028] ? lock_downgrade+0x900/0x900 [ 243.121162] ? skb_scrub_packet+0x490/0x490 [ 243.125520] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 243.131310] ? lock_acquire+0x1ed/0x520 [ 243.135271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.140794] ? __rt6_find_exception_rcu+0x379/0x510 [ 243.145859] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 243.151066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.156612] ? ipv6_get_saddr_eval+0x213/0x1070 [ 243.161292] alloc_skb_with_frags+0x133/0x7d0 [ 243.165841] ? mark_held_locks+0x130/0x130 [ 243.170065] ? ipv6_dev_get_saddr+0x54f/0xfe0 [ 243.174561] ? lock_downgrade+0x900/0x900 [ 243.178706] ? skb_complete_wifi_ack+0x1e0/0x1e0 [ 243.183500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.189027] ? check_preemption_disabled+0x48/0x200 [ 243.194036] sock_alloc_send_pskb+0x865/0xab0 [ 243.198521] ? ipv6_dev_get_saddr+0x576/0xfe0 [ 243.203006] ? sock_wmalloc+0x1f0/0x1f0 [ 243.206970] ? addrconf_sysctl_stable_secret+0x920/0x920 [ 243.212421] ? mark_held_locks+0x130/0x130 [ 243.216648] ? ip6_pol_route_output+0x54/0x70 [ 243.221129] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 243.226654] ? fib6_rule_lookup+0x1c8/0x860 [ 243.230965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.236489] ? xfrm_lookup_with_ifid+0x880/0x2b80 [ 243.241323] sock_alloc_send_skb+0x32/0x40 [ 243.245557] __ip6_append_data.isra.46+0x1fd9/0x3530 [ 243.250649] ? lock_downgrade+0x900/0x900 [ 243.254784] ? ip_reply_glue_bits+0xc0/0xc0 [ 243.259120] ? ip6_setup_cork+0x1a30/0x1a30 [ 243.263428] ? dst_output+0x180/0x180 [ 243.267210] ? sk_dst_check+0x3ce/0x790 [ 243.271208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.276765] ? ip6_autoflowlabel.part.47+0x80/0x80 [ 243.281680] ? mark_held_locks+0x130/0x130 [ 243.285900] ? sk_dst_check+0x4ab/0x790 [ 243.289862] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 243.295387] ip6_make_skb+0x380/0x5e0 [ 243.299184] ? ip_reply_glue_bits+0xc0/0xc0 [ 243.303521] ? ip_reply_glue_bits+0xc0/0xc0 [ 243.307849] ? ip6_push_pending_frames+0xf0/0xf0 [ 243.312594] ? ip6_sk_dst_lookup_flow+0x57c/0xc50 [ 243.317434] ? udp_lib_get_port+0x8e8/0x1b80 [ 243.321836] ? udp_lib_get_port+0x8e8/0x1b80 [ 243.326258] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 243.331477] udpv6_sendmsg+0x2d43/0x36b0 [ 243.335524] ? ip_reply_glue_bits+0xc0/0xc0 [ 243.339850] ? udp6_unicast_rcv_skb.isra.24+0x340/0x340 [ 243.345213] ? udp_seq_next+0x80/0x80 [ 243.349010] ? ip6_datagram_release_cb+0x3c3/0x640 [ 243.353926] ? lock_downgrade+0x900/0x900 [ 243.358061] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 243.363863] ? release_sock+0x1ec/0x2c0 [ 243.367831] ? lock_downgrade+0x900/0x900 [ 243.371984] ? trace_hardirqs_on+0xbd/0x310 [ 243.376328] ? _raw_spin_unlock_bh+0x30/0x40 [ 243.380740] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 243.386197] ? __local_bh_enable_ip+0x160/0x260 [ 243.390860] ? udp_v6_get_port+0x273/0x660 [ 243.395091] inet_sendmsg+0x1a1/0x690 [ 243.398881] ? udp6_unicast_rcv_skb.isra.24+0x340/0x340 [ 243.404244] ? inet_sendmsg+0x1a1/0x690 [ 243.408218] ? ipip_gro_receive+0x100/0x100 [ 243.412557] ? smack_socket_sendmsg+0xb0/0x190 [ 243.417149] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.422686] ? security_socket_sendmsg+0x94/0xc0 [ 243.427432] ? ipip_gro_receive+0x100/0x100 [ 243.431741] sock_sendmsg+0xd5/0x120 [ 243.435462] __sys_sendto+0x3d7/0x670 [ 243.439251] ? __ia32_sys_getpeername+0xb0/0xb0 [ 243.443911] ? wait_for_completion+0x8a0/0x8a0 [ 243.448481] ? lock_release+0x970/0x970 [ 243.452456] ? check_preemption_disabled+0x48/0x200 [ 243.457460] ? fsnotify_first_mark+0x350/0x350 [ 243.462026] ? __fsnotify_parent+0xcc/0x420 [ 243.466333] ? fsnotify+0x12f0/0x12f0 [ 243.470123] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.475649] ? __sb_end_write+0xd9/0x110 [ 243.479694] ? fput+0x130/0x1a0 [ 243.482988] ? ksys_write+0x1ae/0x260 [ 243.486790] ? trace_hardirqs_on+0xbd/0x310 [ 243.491103] ? __ia32_sys_read+0xb0/0xb0 [ 243.495149] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.500546] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 243.506001] __x64_sys_sendto+0xe1/0x1a0 [ 243.510053] do_syscall_64+0x1b9/0x820 [ 243.513935] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 243.519291] ? syscall_return_slowpath+0x5e0/0x5e0 [ 243.524215] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 243.529050] ? trace_hardirqs_on_caller+0x310/0x310 [ 243.534071] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 243.539118] ? prepare_exit_to_usermode+0x291/0x3b0 [ 243.544126] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 243.548963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.554135] RIP: 0033:0x457579 [ 243.557315] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 243.576210] RSP: 002b:00007f1c6a06ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 243.583927] RAX: ffffffffffffffda RBX: 00007f1c6a06ac90 RCX: 0000000000457579 [ 243.591182] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 243.598432] RBP: 000000000072bf00 R08: 0000000020000100 R09: 000000000000001c 00:00:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') r2 = dup2(r0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:02 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0xd4, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000"]}, 0x14c) 00:00:02 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xf0}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:02 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:02 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 243.605685] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c6a06b6d4 [ 243.612942] R13: 00000000004c3935 R14: 00000000004d57d8 R15: 0000000000000004 00:00:02 executing program 1 (fault-call:2 fault-nth:2): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:02 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0xd4, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000"]}, 0x14c) [ 243.650813] kernel msg: ebtables bug: please report to author: entries_size too small [ 243.662588] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:02 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x10000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 243.734107] FAULT_INJECTION: forcing a failure. [ 243.734107] name failslab, interval 1, probability 0, space 0, times 0 [ 243.737135] kernel msg: ebtables bug: please report to author: entries_size too small [ 243.778226] CPU: 0 PID: 9223 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #44 [ 243.785457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.794826] Call Trace: [ 243.794857] dump_stack+0x1c4/0x2b4 [ 243.801058] ? dump_stack_print_info.cold.2+0x52/0x52 [ 243.806265] ? lock_downgrade+0x900/0x900 [ 243.810418] ? rt6_remove_exception_rt+0x550/0x550 [ 243.815359] should_fail.cold.4+0xa/0x17 [ 243.819433] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 243.824552] ? kasan_unpoison_shadow+0x35/0x50 [ 243.829196] ? kasan_kmalloc+0xc7/0xe0 [ 243.833176] ? kmem_cache_alloc_node_trace+0x305/0x740 [ 243.838475] ? kasan_unpoison_shadow+0x35/0x50 [ 243.843109] ? kasan_kmalloc+0xc7/0xe0 [ 243.847060] ? __kmalloc_node_track_caller+0x47/0x70 [ 243.852227] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 243.857799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.863405] ? __alloc_skb+0x4c6/0x770 [ 243.867323] ? lock_downgrade+0x900/0x900 [ 243.871486] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 243.877307] ? trace_hardirqs_on+0xbd/0x310 [ 243.881642] __should_failslab+0x124/0x180 [ 243.885886] should_failslab+0x9/0x14 [ 243.889694] kmem_cache_alloc+0x47/0x730 [ 243.893771] ? __nf_conntrack_find_get.part.42+0x110b/0x1cf0 [ 243.899605] __nf_conntrack_alloc+0x1aa/0x7c0 [ 243.904114] ? early_drop+0xc00/0xc00 [ 243.908437] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 243.913981] ? refcount_add_checked+0x2f/0x70 [ 243.918490] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 243.923739] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 243.929286] init_conntrack+0xfc6/0x1380 [ 243.933364] ? nf_conntrack_alloc+0x50/0x50 [ 243.937692] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 243.942911] ? lock_acquire+0x1ed/0x520 [ 243.946914] ? nf_conntrack_in+0x571/0x1130 [ 243.951242] ? get_l4proto+0x600/0x600 [ 243.955146] ? lock_release+0x970/0x970 [ 243.959128] ? hash_conntrack_raw+0x2c9/0x480 [ 243.963634] ? ip6t_do_table+0xd6a/0x1d30 [ 243.967850] ? ip6t_do_table+0xd6a/0x1d30 [ 243.972013] nf_conntrack_in+0xb49/0x1130 [ 243.976171] ? ip6t_do_table+0xded/0x1d30 [ 243.980356] ? nf_conntrack_update+0xb90/0xb90 [ 243.984968] ? ip6t_error+0x40/0x40 [ 243.988602] ? ip6_output+0x9d0/0x9d0 [ 243.992450] ? ipv6_conntrack_in+0x90/0x90 [ 243.996708] ipv6_conntrack_in+0x61/0x90 [ 244.000779] ipv6_conntrack_local+0x25/0x30 [ 244.005121] nf_hook_slow+0xc2/0x1c0 [ 244.008853] __ip6_local_out+0x5d1/0xbb0 [ 244.012917] ? dst_output+0x180/0x180 [ 244.016727] ? ip6_dst_hoplimit+0x4d0/0x4d0 [ 244.021060] ? ip_reply_glue_bits+0xc0/0xc0 [ 244.025405] ip6_local_out+0x2d/0x1b0 [ 244.029220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.034764] ip6_send_skb+0xbc/0x340 [ 244.038533] udp_v6_send_skb.isra.26+0x86d/0x1540 [ 244.043647] udpv6_sendmsg+0x2d92/0x36b0 [ 244.047753] ? ip_reply_glue_bits+0xc0/0xc0 [ 244.052112] ? udp6_unicast_rcv_skb.isra.24+0x340/0x340 [ 244.057527] ? udp_seq_next+0x80/0x80 [ 244.061379] ? ip6_datagram_release_cb+0x3c3/0x640 [ 244.066578] ? lock_downgrade+0x900/0x900 [ 244.070740] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 244.076560] ? release_sock+0x1ec/0x2c0 [ 244.080539] ? lock_downgrade+0x900/0x900 [ 244.084691] ? trace_hardirqs_on+0xbd/0x310 [ 244.089022] ? _raw_spin_unlock_bh+0x30/0x40 [ 244.093445] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 244.098909] ? __local_bh_enable_ip+0x160/0x260 [ 244.103597] ? udp_v6_get_port+0x273/0x660 [ 244.107859] inet_sendmsg+0x1a1/0x690 [ 244.111669] ? udp6_unicast_rcv_skb.isra.24+0x340/0x340 [ 244.117038] ? inet_sendmsg+0x1a1/0x690 [ 244.121030] ? ipip_gro_receive+0x100/0x100 [ 244.125389] ? smack_socket_sendmsg+0xb0/0x190 [ 244.129987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.135536] ? security_socket_sendmsg+0x94/0xc0 [ 244.140317] ? ipip_gro_receive+0x100/0x100 [ 244.144653] sock_sendmsg+0xd5/0x120 [ 244.148397] __sys_sendto+0x3d7/0x670 [ 244.152207] ? __ia32_sys_getpeername+0xb0/0xb0 [ 244.156891] ? wait_for_completion+0x8a0/0x8a0 [ 244.161482] ? lock_release+0x970/0x970 [ 244.165473] ? check_preemption_disabled+0x48/0x200 [ 244.170504] ? fsnotify_first_mark+0x350/0x350 [ 244.175102] ? __fsnotify_parent+0xcc/0x420 00:00:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') r2 = dup2(r0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) [ 244.179431] ? fsnotify+0x12f0/0x12f0 [ 244.183245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.188793] ? __sb_end_write+0xd9/0x110 [ 244.192899] ? fput+0x130/0x1a0 [ 244.196192] ? ksys_write+0x1ae/0x260 [ 244.200007] ? trace_hardirqs_on+0xbd/0x310 [ 244.204340] ? __ia32_sys_read+0xb0/0xb0 [ 244.208410] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.213796] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 244.219334] __x64_sys_sendto+0xe1/0x1a0 [ 244.223412] do_syscall_64+0x1b9/0x820 [ 244.227310] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 244.232694] ? syscall_return_slowpath+0x5e0/0x5e0 [ 244.237638] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.242496] ? trace_hardirqs_on_caller+0x310/0x310 [ 244.247561] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 244.252620] ? prepare_exit_to_usermode+0x291/0x3b0 [ 244.257655] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 244.262518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.267721] RIP: 0033:0x457579 [ 244.270925] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.289847] RSP: 002b:00007f1c6a06ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 244.297619] RAX: ffffffffffffffda RBX: 00007f1c6a06ac90 RCX: 0000000000457579 [ 244.304902] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 244.312211] RBP: 000000000072bf00 R08: 0000000020000100 R09: 000000000000001c [ 244.319503] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c6a06b6d4 00:00:03 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x38a}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:03 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0xd4, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000"]}, 0x14c) [ 244.326825] R13: 00000000004c3935 R14: 00000000004d57d8 R15: 0000000000000004 00:00:03 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x13e, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x1b6) [ 244.357377] kernel msg: ebtables bug: please report to author: entries_size too small [ 244.366152] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:03 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x6}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:03 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x13e, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x1b6) 00:00:03 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002400)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 244.405603] kernel msg: ebtables bug: please report to author: entries_size too small 00:00:03 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:03 executing program 1 (fault-call:2 fault-nth:3): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 244.461364] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:03 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x13e, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x1b6) 00:00:03 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x34000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 244.506517] kernel msg: ebtables bug: please report to author: entries_size too small [ 244.542007] FAULT_INJECTION: forcing a failure. [ 244.542007] name failslab, interval 1, probability 0, space 0, times 0 [ 244.588761] kernel msg: ebtables bug: please report to author: entries_size too small [ 244.601973] CPU: 0 PID: 9269 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #44 [ 244.609214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.618595] Call Trace: [ 244.621224] dump_stack+0x1c4/0x2b4 [ 244.624868] ? dump_stack_print_info.cold.2+0x52/0x52 [ 244.630089] ? mark_held_locks+0x130/0x130 [ 244.634377] ? kernel_text_address+0x79/0xf0 00:00:03 executing program 2 (fault-call:3 fault-nth:0): open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 244.638809] should_fail.cold.4+0xa/0x17 [ 244.642915] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 244.648034] ? save_stack+0xa9/0xd0 [ 244.651667] ? save_stack+0x43/0xd0 [ 244.655301] ? kasan_kmalloc+0xc7/0xe0 [ 244.659189] ? kasan_slab_alloc+0x12/0x20 [ 244.663341] ? kmem_cache_alloc+0x12e/0x730 [ 244.667665] ? __nf_conntrack_alloc+0x1aa/0x7c0 [ 244.672359] ? init_conntrack+0xfc6/0x1380 [ 244.676630] ? nf_conntrack_in+0xb49/0x1130 [ 244.680958] ? ipv6_conntrack_in+0x61/0x90 [ 244.685193] ? ipv6_conntrack_local+0x25/0x30 [ 244.689687] ? nf_hook_slow+0xc2/0x1c0 [ 244.693579] ? __ip6_local_out+0x5d1/0xbb0 [ 244.697835] ? ip6_local_out+0x2d/0x1b0 [ 244.701827] ? ip6_send_skb+0xbc/0x340 [ 244.705742] ? udp_v6_send_skb.isra.26+0x86d/0x1540 [ 244.710777] ? udpv6_sendmsg+0x2d92/0x36b0 [ 244.715015] ? inet_sendmsg+0x1a1/0x690 [ 244.718990] ? sock_sendmsg+0xd5/0x120 [ 244.722886] ? __sys_sendto+0x3d7/0x670 [ 244.726870] ? __x64_sys_sendto+0xe1/0x1a0 [ 244.731114] ? do_syscall_64+0x1b9/0x820 [ 244.735191] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.740563] ? __kmalloc_node_track_caller+0x47/0x70 [ 244.745692] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 244.751246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.756792] ? __alloc_skb+0x4c6/0x770 [ 244.760714] __should_failslab+0x124/0x180 [ 244.764964] should_failslab+0x9/0x14 [ 244.768783] __kmalloc_track_caller+0x5f/0x750 [ 244.773386] ? kasan_slab_alloc+0x12/0x20 [ 244.777551] ? nf_ct_ext_add+0x369/0x7b0 [ 244.781626] __krealloc+0x6f/0xb0 [ 244.785177] nf_ct_ext_add+0x369/0x7b0 [ 244.789087] ? nf_ct_ext_destroy+0x370/0x370 [ 244.793542] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 244.799105] ? refcount_add_checked+0x2f/0x70 [ 244.803605] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 244.808802] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 244.814359] ? tcp_packet.cold.16+0x178/0x178 [ 244.817149] FAULT_INJECTION: forcing a failure. [ 244.817149] name failslab, interval 1, probability 0, space 0, times 0 [ 244.818882] init_conntrack+0x5e1/0x1380 [ 244.818912] ? nf_conntrack_alloc+0x50/0x50 [ 244.834197] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 244.838480] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 244.838499] ? lock_acquire+0x1ed/0x520 [ 244.854136] ? nf_conntrack_in+0x571/0x1130 [ 244.858475] ? get_l4proto+0x600/0x600 [ 244.862388] ? lock_release+0x970/0x970 [ 244.866376] ? hash_conntrack_raw+0x2c9/0x480 [ 244.870886] ? ip6t_do_table+0xd6a/0x1d30 [ 244.875040] ? ip6t_do_table+0xd6a/0x1d30 [ 244.879204] nf_conntrack_in+0xb49/0x1130 [ 244.883362] ? ip6t_do_table+0xded/0x1d30 [ 244.887524] ? nf_conntrack_update+0xb90/0xb90 [ 244.892144] ? ip6t_error+0x40/0x40 [ 244.895791] ? ip6_output+0x9d0/0x9d0 [ 244.899619] ? ipv6_conntrack_in+0x90/0x90 [ 244.903860] ipv6_conntrack_in+0x61/0x90 [ 244.908154] ipv6_conntrack_local+0x25/0x30 [ 244.912482] nf_hook_slow+0xc2/0x1c0 [ 244.912500] __ip6_local_out+0x5d1/0xbb0 [ 244.912514] ? dst_output+0x180/0x180 [ 244.912531] ? ip6_dst_hoplimit+0x4d0/0x4d0 [ 244.924100] ? ip_reply_glue_bits+0xc0/0xc0 [ 244.924117] ip6_local_out+0x2d/0x1b0 [ 244.924133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.924156] ip6_send_skb+0xbc/0x340 [ 244.945928] udp_v6_send_skb.isra.26+0x86d/0x1540 [ 244.950796] udpv6_sendmsg+0x2d92/0x36b0 [ 244.954891] ? ip_reply_glue_bits+0xc0/0xc0 [ 244.959234] ? udp6_unicast_rcv_skb.isra.24+0x340/0x340 [ 244.964598] ? udp_seq_next+0x80/0x80 [ 244.968416] ? ip6_datagram_release_cb+0x3c3/0x640 [ 244.973360] ? lock_downgrade+0x900/0x900 [ 244.977526] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 244.983348] ? release_sock+0x1ec/0x2c0 00:00:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') dup2(r0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:00:03 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xfffffffffffff000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 244.987341] ? lock_downgrade+0x900/0x900 [ 244.991505] ? trace_hardirqs_on+0xbd/0x310 [ 244.995854] ? _raw_spin_unlock_bh+0x30/0x40 [ 245.000279] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 245.005749] ? __local_bh_enable_ip+0x160/0x260 [ 245.010482] ? udp_v6_get_port+0x273/0x660 [ 245.014776] inet_sendmsg+0x1a1/0x690 [ 245.018578] ? udp6_unicast_rcv_skb.isra.24+0x340/0x340 [ 245.023951] ? inet_sendmsg+0x1a1/0x690 [ 245.028068] ? ipip_gro_receive+0x100/0x100 [ 245.032454] ? smack_socket_sendmsg+0xb0/0x190 [ 245.033543] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 245.037050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.037075] ? security_socket_sendmsg+0x94/0xc0 [ 245.054378] ? ipip_gro_receive+0x100/0x100 [ 245.058716] sock_sendmsg+0xd5/0x120 [ 245.062437] __sys_sendto+0x3d7/0x670 [ 245.066253] ? __ia32_sys_getpeername+0xb0/0xb0 [ 245.070949] ? wait_for_completion+0x8a0/0x8a0 [ 245.075543] ? lock_release+0x970/0x970 [ 245.079526] ? check_preemption_disabled+0x48/0x200 [ 245.084555] ? fsnotify_first_mark+0x350/0x350 [ 245.089144] ? __fsnotify_parent+0xcc/0x420 [ 245.093510] ? fsnotify+0x12f0/0x12f0 [ 245.097332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.102882] ? __sb_end_write+0xd9/0x110 [ 245.106952] ? fput+0x130/0x1a0 [ 245.110242] ? ksys_write+0x1ae/0x260 [ 245.114091] ? trace_hardirqs_on+0xbd/0x310 [ 245.118431] ? __ia32_sys_read+0xb0/0xb0 [ 245.122499] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.127899] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 245.133362] __x64_sys_sendto+0xe1/0x1a0 [ 245.137440] do_syscall_64+0x1b9/0x820 [ 245.141356] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 245.146740] ? syscall_return_slowpath+0x5e0/0x5e0 [ 245.151678] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.156532] ? trace_hardirqs_on_caller+0x310/0x310 [ 245.161558] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 245.166601] ? prepare_exit_to_usermode+0x291/0x3b0 [ 245.171635] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.176488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.181688] RIP: 0033:0x457579 [ 245.184892] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.199044] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 245.203840] RSP: 002b:00007f1c6a06ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 245.203860] RAX: ffffffffffffffda RBX: 00007f1c6a06ac90 RCX: 0000000000457579 [ 245.203868] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 245.203875] RBP: 000000000072bf00 R08: 0000000020000100 R09: 000000000000001c 00:00:04 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xb00000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 245.203896] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c6a06b6d4 [ 245.247161] R13: 00000000004c3935 R14: 00000000004d57d8 R15: 0000000000000004 [ 245.256274] CPU: 1 PID: 9281 Comm: syz-executor2 Not tainted 4.19.0-rc6+ #44 [ 245.263497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.272868] Call Trace: [ 245.275477] dump_stack+0x1c4/0x2b4 [ 245.279124] ? dump_stack_print_info.cold.2+0x52/0x52 [ 245.284336] ? mark_held_locks+0x130/0x130 [ 245.288587] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 245.293619] should_fail.cold.4+0xa/0x17 [ 245.297695] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 245.302858] ? lock_downgrade+0x900/0x900 [ 245.307025] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 245.312866] ? kasan_check_read+0x11/0x20 [ 245.317031] ? rcu_bh_qs+0xc0/0xc0 [ 245.320620] ? unwind_dump+0x190/0x190 [ 245.324521] ? mark_held_locks+0x130/0x130 [ 245.328793] ? is_bpf_text_address+0xd3/0x170 [ 245.333311] ? fs_reclaim_acquire+0x20/0x20 [ 245.337642] ? lock_downgrade+0x900/0x900 [ 245.341828] ? ___might_sleep+0x1ed/0x300 [ 245.345989] ? arch_local_save_flags+0x40/0x40 [ 245.350576] ? copy_process+0x949/0x8780 [ 245.354655] __should_failslab+0x124/0x180 [ 245.358908] should_failslab+0x9/0x14 [ 245.362719] kmem_cache_alloc_node+0x26e/0x730 [ 245.367315] ? kasan_check_write+0x14/0x20 [ 245.371565] ? do_raw_spin_lock+0xc1/0x200 [ 245.375856] copy_process+0x1ff4/0x8780 [ 245.379875] ? __mutex_lock+0x85e/0x1700 [ 245.383948] ? __kernel_text_address+0xd/0x40 [ 245.388466] ? smack_d_instantiate+0x136/0xea0 [ 245.393073] ? unwind_get_return_address+0x61/0xa0 [ 245.398014] ? mark_held_locks+0x130/0x130 [ 245.402259] ? mark_held_locks+0x130/0x130 [ 245.406510] ? __cleanup_sighand+0x70/0x70 [ 245.410759] ? __wake_up_common_lock+0x1d0/0x330 [ 245.415525] ? lock_downgrade+0x900/0x900 [ 245.419739] ? proc_tid_base_lookup+0x29/0x30 [ 245.424245] ? trace_hardirqs_on+0xbd/0x310 [ 245.428587] ? ima_match_policy+0x848/0x1560 [ 245.433005] ? lock_downgrade+0x900/0x900 [ 245.437162] ? do_raw_spin_lock+0xc1/0x200 [ 245.441411] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 245.447222] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 245.452336] ? __wake_up_common_lock+0x1d0/0x330 [ 245.457107] ? __wake_up_common+0x7d0/0x7d0 [ 245.461435] ? __lockdep_init_map+0x105/0x590 [ 245.465953] ? mark_held_locks+0x130/0x130 [ 245.470328] ? arch_local_save_flags+0x40/0x40 [ 245.474928] ? mark_held_locks+0x130/0x130 [ 245.479213] ? mark_held_locks+0x130/0x130 [ 245.483511] ? up_write+0x7b/0x220 [ 245.487056] ? up_read+0x110/0x110 [ 245.490610] ? down_read+0x1d0/0x1d0 [ 245.494334] ? ima_get_action+0x7e/0xa0 [ 245.498323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.503873] ? process_measurement+0x280/0x1bf0 [ 245.508556] ? smack_log+0x423/0x590 [ 245.512286] ? ima_add_template_entry.cold.4+0x3c/0x3c [ 245.517586] ? mark_held_locks+0x130/0x130 [ 245.521859] ? mark_held_locks+0x130/0x130 [ 245.526136] ? mark_held_locks+0x130/0x130 [ 245.530391] ? mark_held_locks+0x130/0x130 [ 245.534654] ? dput.part.26+0x241/0x790 [ 245.538639] ? lock_downgrade+0x900/0x900 [ 245.542802] ? mark_held_locks+0x130/0x130 [ 245.547065] ? mnt_get_count+0x150/0x150 [ 245.551134] ? dput.part.26+0x26d/0x790 [ 245.555116] ? shrink_dcache_sb+0x350/0x350 [ 245.559454] ? lock_acquire+0x1ed/0x520 [ 245.563442] ? __fdget_pos+0x1bb/0x200 [ 245.567356] ? lock_release+0x970/0x970 [ 245.571352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.576893] ? _parse_integer+0x134/0x180 [ 245.581053] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 245.586607] ? _kstrtoull+0x188/0x250 [ 245.590418] ? _parse_integer+0x180/0x180 [ 245.594598] ? lock_release+0x970/0x970 [ 245.598606] ? arch_local_save_flags+0x40/0x40 [ 245.598904] FAULT_INJECTION: forcing a failure. [ 245.598904] name failslab, interval 1, probability 0, space 0, times 0 [ 245.603196] ? usercopy_warn+0x110/0x110 [ 245.603217] ? get_pid_task+0xd6/0x1a0 [ 245.603233] ? lock_downgrade+0x900/0x900 [ 245.603261] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 245.632332] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 245.637886] ? pid_task+0x115/0x200 [ 245.641543] ? find_vpid+0xf0/0xf0 [ 245.645098] ? __f_unlock_pos+0x19/0x20 [ 245.649095] ? lock_downgrade+0x900/0x900 [ 245.653283] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 245.658837] ? proc_fail_nth_write+0x9e/0x210 [ 245.663335] ? proc_cwd_link+0x1d0/0x1d0 [ 245.667420] ? kasan_check_read+0x11/0x20 [ 245.671594] _do_fork+0x1cb/0x11d0 [ 245.675147] ? fork_idle+0x1d0/0x1d0 [ 245.678904] ? check_preemption_disabled+0x48/0x200 [ 245.683930] ? fsnotify_first_mark+0x350/0x350 [ 245.688526] ? __fsnotify_parent+0xcc/0x420 [ 245.692875] ? fsnotify+0x12f0/0x12f0 [ 245.696681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.702229] ? check_preemption_disabled+0x48/0x200 [ 245.707253] ? __sb_end_write+0xd9/0x110 [ 245.711323] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 245.716875] ? fput+0x130/0x1a0 [ 245.720160] ? ksys_write+0x1ae/0x260 [ 245.723971] ? trace_hardirqs_on+0xbd/0x310 [ 245.728300] ? __ia32_sys_read+0xb0/0xb0 [ 245.732373] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.737756] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 245.743251] __x64_sys_clone+0xbf/0x150 [ 245.747266] do_syscall_64+0x1b9/0x820 [ 245.751172] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 245.756574] ? syscall_return_slowpath+0x5e0/0x5e0 [ 245.761515] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.766369] ? trace_hardirqs_on_caller+0x310/0x310 [ 245.771407] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 245.776429] ? prepare_exit_to_usermode+0x291/0x3b0 [ 245.781483] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.786353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.791561] RIP: 0033:0x457579 [ 245.794772] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.813671] RSP: 002b:00007ffa06684c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 245.821386] RAX: ffffffffffffffda RBX: 00007ffa06684c90 RCX: 0000000000457579 [ 245.828658] RDX: 0000000020000000 RSI: 0000000020000200 RDI: 0000000000000000 [ 245.835929] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 00:00:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') r2 = dup2(r0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:04 executing program 1 (fault-call:2 fault-nth:4): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:04 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:04 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x173, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x1eb) [ 245.843202] R10: 0000000020000100 R11: 0000000000000246 R12: 00007ffa066856d4 [ 245.850470] R13: 00000000004bd9fa R14: 00000000004cc448 R15: 0000000000000006 [ 245.857754] CPU: 0 PID: 9300 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #44 [ 245.864984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.864989] Call Trace: [ 245.865010] dump_stack+0x1c4/0x2b4 [ 245.865031] ? dump_stack_print_info.cold.2+0x52/0x52 [ 245.885750] ? lock_downgrade+0x900/0x900 [ 245.889914] should_fail.cold.4+0xa/0x17 [ 245.893989] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 245.899142] ? fib_rules_lookup+0x54c/0xcc0 [ 245.899176] ? fib_rules_net_exit+0x120/0x120 [ 245.908239] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 245.914095] ? nf_conntrack_double_unlock+0x57/0x70 [ 245.914118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.914137] ? ip6mr_fib_lookup.isra.21+0x1f0/0x2b0 [ 245.924712] ? ipv6_chk_mcast_addr+0x350/0x940 [ 245.924732] __should_failslab+0x124/0x180 [ 245.938531] should_failslab+0x9/0x14 [ 245.942356] kmem_cache_alloc+0x47/0x730 [ 245.946431] ? ipv6_chk_mcast_addr+0x31a/0x940 [ 245.951032] ? ipv6_chk_mcast_addr+0x31a/0x940 [ 245.955630] skb_clone+0x1bb/0x500 [ 245.959182] ? skb_split+0x11e0/0x11e0 [ 245.963094] ? ipv6_dev_mc_dec+0x260/0x260 [ 245.967351] ip6_finish_output2+0x17d5/0x27a0 [ 245.971882] ? nf_ct_deliver_cached_events+0x28b/0x7d0 [ 245.977172] ? ip6_copy_metadata+0xe30/0xe30 [ 245.981593] ? ip6_mtu+0x39c/0x520 [ 245.985172] ? lock_downgrade+0x900/0x900 [ 245.989361] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 245.995185] ? ipv6_confirm+0x46e/0x650 [ 245.999189] ? ipv6_helper+0x540/0x540 [ 246.003120] ? ip6_mtu+0x160/0x520 [ 246.006663] ? dst_hold+0x2f0/0x2f0 [ 246.010315] ? nf_nat_ipv6_out+0x212/0x550 [ 246.014571] ip6_finish_output+0x5fe/0xbc0 [ 246.018812] ? ip6_finish_output+0x5fe/0xbc0 [ 246.023256] ip6_output+0x232/0x9d0 [ 246.026912] ? ip6_finish_output+0xbc0/0xbc0 [ 246.031332] ? ip6_fragment+0x38c0/0x38c0 [ 246.035494] ? ip_reply_glue_bits+0xc0/0xc0 [ 246.040182] ip6_local_out+0xc5/0x1b0 00:00:04 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xa00000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 246.043999] ip6_send_skb+0xbc/0x340 [ 246.047720] udp_v6_send_skb.isra.26+0x86d/0x1540 [ 246.052571] udpv6_sendmsg+0x2d92/0x36b0 [ 246.056639] ? ip_reply_glue_bits+0xc0/0xc0 [ 246.060997] ? udp6_unicast_rcv_skb.isra.24+0x340/0x340 [ 246.066462] ? udp_seq_next+0x80/0x80 [ 246.070278] ? ip6_datagram_release_cb+0x3c3/0x640 [ 246.075237] ? lock_downgrade+0x900/0x900 [ 246.079407] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 246.085219] ? release_sock+0x1ec/0x2c0 [ 246.089206] ? lock_downgrade+0x900/0x900 [ 246.093370] ? trace_hardirqs_on+0xbd/0x310 [ 246.097703] ? _raw_spin_unlock_bh+0x30/0x40 [ 246.102119] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 246.107595] ? __local_bh_enable_ip+0x160/0x260 [ 246.112281] ? udp_v6_get_port+0x273/0x660 [ 246.116543] inet_sendmsg+0x1a1/0x690 [ 246.120348] ? udp6_unicast_rcv_skb.isra.24+0x340/0x340 [ 246.125741] ? inet_sendmsg+0x1a1/0x690 [ 246.129726] ? ipip_gro_receive+0x100/0x100 [ 246.134062] ? smack_socket_sendmsg+0xb0/0x190 [ 246.138661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.144224] ? security_socket_sendmsg+0x94/0xc0 [ 246.149010] ? ipip_gro_receive+0x100/0x100 [ 246.153344] sock_sendmsg+0xd5/0x120 [ 246.157071] __sys_sendto+0x3d7/0x670 [ 246.160890] ? __ia32_sys_getpeername+0xb0/0xb0 [ 246.165573] ? wait_for_completion+0x8a0/0x8a0 [ 246.170216] ? lock_release+0x970/0x970 [ 246.174201] ? check_preemption_disabled+0x48/0x200 [ 246.179225] ? fsnotify_first_mark+0x350/0x350 [ 246.183829] ? __fsnotify_parent+0xcc/0x420 [ 246.188165] ? fsnotify+0x12f0/0x12f0 [ 246.191976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.197549] ? __sb_end_write+0xd9/0x110 [ 246.201621] ? fput+0x130/0x1a0 [ 246.204935] ? ksys_write+0x1ae/0x260 [ 246.208772] ? trace_hardirqs_on+0xbd/0x310 [ 246.213121] ? __ia32_sys_read+0xb0/0xb0 [ 246.217242] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.222616] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 246.228073] __x64_sys_sendto+0xe1/0x1a0 [ 246.232188] do_syscall_64+0x1b9/0x820 [ 246.236097] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 246.241498] ? syscall_return_slowpath+0x5e0/0x5e0 00:00:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) [ 246.246478] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.251371] ? trace_hardirqs_on_caller+0x310/0x310 [ 246.256395] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 246.261418] ? prepare_exit_to_usermode+0x291/0x3b0 [ 246.266491] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.271361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.276553] RIP: 0033:0x457579 00:00:05 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x4000000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:05 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x18e, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x206) [ 246.279777] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.298700] RSP: 002b:00007f1c6a06ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 246.306410] RAX: ffffffffffffffda RBX: 00007f1c6a06ac90 RCX: 0000000000457579 [ 246.313677] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 246.320946] RBP: 000000000072bf00 R08: 0000000020000100 R09: 000000000000001c [ 246.328234] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c6a06b6d4 [ 246.328241] R13: 00000000004c3935 R14: 00000000004d57d8 R15: 0000000000000004 [ 246.358610] kernel msg: ebtables bug: please report to author: entries_size too small [ 246.387131] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 246.437311] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:05 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:05 executing program 1 (fault-call:2 fault-nth:5): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:05 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x19b, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x213) 00:00:05 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xa}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:05 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) accept4$packet(r0, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:05 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x19b, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x213) [ 246.581466] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 246.593398] kernel msg: ebtables bug: please report to author: entries_size too small [ 246.605399] FAULT_INJECTION: forcing a failure. [ 246.605399] name failslab, interval 1, probability 0, space 0, times 0 [ 246.651027] CPU: 1 PID: 9339 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #44 [ 246.658247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.667614] Call Trace: [ 246.670215] dump_stack+0x1c4/0x2b4 [ 246.673867] ? dump_stack_print_info.cold.2+0x52/0x52 [ 246.679074] ? lock_downgrade+0x900/0x900 [ 246.683248] should_fail.cold.4+0xa/0x17 [ 246.687321] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 246.692445] ? fib_rules_lookup+0x54c/0xcc0 [ 246.696784] ? fib_rules_net_exit+0x120/0x120 [ 246.701307] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 246.707120] ? nf_conntrack_double_unlock+0x57/0x70 [ 246.712187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.717757] ? ip6mr_fib_lookup.isra.21+0x1f0/0x2b0 [ 246.722787] ? ipv6_chk_mcast_addr+0x350/0x940 [ 246.727394] __should_failslab+0x124/0x180 [ 246.731640] should_failslab+0x9/0x14 [ 246.735454] kmem_cache_alloc+0x47/0x730 [ 246.739526] ? ipv6_chk_mcast_addr+0x31a/0x940 [ 246.744118] ? ipv6_chk_mcast_addr+0x31a/0x940 [ 246.748715] skb_clone+0x1bb/0x500 [ 246.752262] ? skb_split+0x11e0/0x11e0 [ 246.756164] ? ipv6_dev_mc_dec+0x260/0x260 [ 246.760418] ip6_finish_output2+0x17d5/0x27a0 [ 246.764943] ? nf_ct_deliver_cached_events+0x28b/0x7d0 [ 246.770248] ? ip6_copy_metadata+0xe30/0xe30 [ 246.774664] ? ip6_mtu+0x39c/0x520 [ 246.778218] ? lock_downgrade+0x900/0x900 [ 246.782379] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 246.788181] ? ipv6_confirm+0x46e/0x650 [ 246.792161] ? ipv6_helper+0x540/0x540 [ 246.796058] ? ip6_mtu+0x160/0x520 [ 246.799633] ? dst_hold+0x2f0/0x2f0 [ 246.803273] ? nf_nat_ipv6_out+0x212/0x550 [ 246.807513] ip6_finish_output+0x5fe/0xbc0 [ 246.811751] ? ip6_finish_output+0x5fe/0xbc0 [ 246.816186] ip6_output+0x232/0x9d0 [ 246.819836] ? ip6_finish_output+0xbc0/0xbc0 [ 246.824261] ? ip6_fragment+0x38c0/0x38c0 [ 246.824279] ? ip_reply_glue_bits+0xc0/0xc0 [ 246.824295] ip6_local_out+0xc5/0x1b0 [ 246.832748] ip6_send_skb+0xbc/0x340 [ 246.832765] udp_v6_send_skb.isra.26+0x86d/0x1540 [ 246.832783] udpv6_sendmsg+0x2d92/0x36b0 [ 246.849159] ? ip_reply_glue_bits+0xc0/0xc0 [ 246.853495] ? udp6_unicast_rcv_skb.isra.24+0x340/0x340 [ 246.858875] ? udp_seq_next+0x80/0x80 [ 246.862695] ? ip6_datagram_release_cb+0x3c3/0x640 [ 246.867635] ? lock_downgrade+0x900/0x900 [ 246.871799] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 246.877625] ? release_sock+0x1ec/0x2c0 [ 246.881615] ? lock_downgrade+0x900/0x900 [ 246.885774] ? trace_hardirqs_on+0xbd/0x310 [ 246.890107] ? _raw_spin_unlock_bh+0x30/0x40 [ 246.894543] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 246.900027] ? __local_bh_enable_ip+0x160/0x260 [ 246.904725] ? udp_v6_get_port+0x273/0x660 [ 246.908986] inet_sendmsg+0x1a1/0x690 [ 246.912790] ? udp6_unicast_rcv_skb.isra.24+0x340/0x340 [ 246.918191] ? inet_sendmsg+0x1a1/0x690 [ 246.922197] ? ipip_gro_receive+0x100/0x100 [ 246.922215] ? smack_socket_sendmsg+0xb0/0x190 [ 246.922231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.922267] ? security_socket_sendmsg+0x94/0xc0 [ 246.931193] ? ipip_gro_receive+0x100/0x100 [ 246.931209] sock_sendmsg+0xd5/0x120 [ 246.931226] __sys_sendto+0x3d7/0x670 [ 246.953332] ? __ia32_sys_getpeername+0xb0/0xb0 [ 246.953920] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 246.958010] ? wait_for_completion+0x8a0/0x8a0 [ 246.958025] ? lock_release+0x970/0x970 [ 246.958047] ? check_preemption_disabled+0x48/0x200 [ 246.978077] ? fsnotify_first_mark+0x350/0x350 [ 246.982669] ? __fsnotify_parent+0xcc/0x420 [ 246.987026] ? fsnotify+0x12f0/0x12f0 [ 246.990842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.996389] ? __sb_end_write+0xd9/0x110 [ 247.000453] ? fput+0x130/0x1a0 [ 247.003736] ? ksys_write+0x1ae/0x260 [ 247.007541] ? trace_hardirqs_on+0xbd/0x310 [ 247.008950] kernel msg: ebtables bug: please report to author: entries_size too small [ 247.011866] ? __ia32_sys_read+0xb0/0xb0 [ 247.011883] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.011899] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 247.011918] __x64_sys_sendto+0xe1/0x1a0 [ 247.023940] do_syscall_64+0x1b9/0x820 [ 247.023955] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 247.023975] ? syscall_return_slowpath+0x5e0/0x5e0 [ 247.034766] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.034782] ? trace_hardirqs_on_caller+0x310/0x310 [ 247.034800] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 247.063394] ? prepare_exit_to_usermode+0x291/0x3b0 [ 247.063414] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.063432] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.063448] RIP: 0033:0x457579 00:00:05 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:05 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:05 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x300000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:06 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x9000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:06 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x19b, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000"]}, 0x213) 00:00:06 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0xffffffeb, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 247.073471] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.073480] RSP: 002b:00007f1c6a06ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 247.073494] RAX: ffffffffffffffda RBX: 00007f1c6a06ac90 RCX: 0000000000457579 [ 247.073502] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 247.073516] RBP: 000000000072bf00 R08: 0000000020000100 R09: 000000000000001c [ 247.135159] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c6a06b6d4 [ 247.142413] R13: 00000000004c3935 R14: 00000000004d57d8 R15: 0000000000000004 00:00:06 executing program 1 (fault-call:2 fault-nth:6): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 247.169854] kernel msg: ebtables bug: please report to author: entries_size too small [ 247.184660] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:06 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x300}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:06 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a2, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x21a) 00:00:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:06 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a5, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681"]}, 0x21d) [ 247.283499] kernel msg: ebtables bug: please report to author: entries_size too small [ 247.295545] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:06 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xc0fe}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:06 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x1000000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 247.452566] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 247.468622] kernel msg: ebtables bug: please report to author: entries_size too small 00:00:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xced423) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:06 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x2000000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:06 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a7, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x21f) 00:00:06 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x20010, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x30000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:06 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000002200)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:06 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a7, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x21f) [ 247.701920] kernel msg: ebtables bug: please report to author: entries_size too small [ 247.715361] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:06 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a7, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d66810000"]}, 0x21f) 00:00:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xe8030000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 247.766350] kernel msg: ebtables bug: please report to author: entries_size too small 00:00:06 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x1000000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:06 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0xf6ffffff00000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 247.848294] kernel msg: ebtables bug: please report to author: entries_size too small 00:00:06 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 247.889466] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x3000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:06 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x1a0ffffffff}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:06 executing program 5 (fault-call:2 fault-nth:0): r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x21f) 00:00:06 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x7f510100, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:06 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x1000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 248.132091] kernel msg: ebtables bug: please report to author: Wrong len argument [ 248.144841] FAULT_INJECTION: forcing a failure. [ 248.144841] name failslab, interval 1, probability 0, space 0, times 0 [ 248.156053] CPU: 1 PID: 9474 Comm: syz-executor5 Not tainted 4.19.0-rc6+ #44 [ 248.163237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.172594] Call Trace: [ 248.175206] dump_stack+0x1c4/0x2b4 [ 248.178871] ? dump_stack_print_info.cold.2+0x52/0x52 [ 248.184093] ? lock_downgrade+0x900/0x900 [ 248.188265] should_fail.cold.4+0xa/0x17 [ 248.188284] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 248.188303] ? __free_pages+0x149/0x190 [ 248.197456] ? free_unref_page+0x960/0x960 [ 248.197492] ? kasan_check_write+0x14/0x20 [ 248.197511] ? finish_task_switch+0x616/0x900 [ 248.214417] ? __switch_to_asm+0x40/0x70 [ 248.218493] ? preempt_notifier_register+0x200/0x200 [ 248.223610] ? __switch_to_asm+0x34/0x70 [ 248.227676] ? __switch_to_asm+0x34/0x70 00:00:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x10000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 248.231741] ? __switch_to_asm+0x40/0x70 [ 248.235815] ? __switch_to_asm+0x34/0x70 [ 248.239910] ? __switch_to_asm+0x40/0x70 [ 248.243978] ? __switch_to_asm+0x34/0x70 [ 248.248041] ? __switch_to_asm+0x40/0x70 [ 248.252101] ? __switch_to_asm+0x34/0x70 [ 248.256166] ? __switch_to_asm+0x34/0x70 [ 248.260227] ? __switch_to_asm+0x40/0x70 [ 248.264295] ? __switch_to_asm+0x34/0x70 [ 248.268364] ? __switch_to_asm+0x40/0x70 [ 248.272433] ? __switch_to_asm+0x34/0x70 [ 248.272447] ? __switch_to_asm+0x40/0x70 00:00:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) [ 248.272466] ? __schedule+0x874/0x1ed0 [ 248.272487] ? __sigqueue_alloc+0x251/0x710 [ 248.280592] ? lock_downgrade+0x900/0x900 [ 248.292902] __should_failslab+0x124/0x180 [ 248.297141] should_failslab+0x9/0x14 [ 248.300952] kmem_cache_alloc+0x47/0x730 [ 248.305027] __sigqueue_alloc+0x3db/0x710 [ 248.309203] ? dequeue_signal+0x630/0x630 [ 248.313351] ? irq_work_queue+0x36/0x1d0 [ 248.317417] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 248.322997] ? wake_up_klogd+0x11a/0x180 [ 248.327068] ? preempt_schedule_common+0x1f/0xd0 00:00:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xffffffff00000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 248.331915] ? console_device+0xc0/0xc0 [ 248.335895] ? ___preempt_schedule+0x16/0x18 [ 248.340326] ? vprintk_emit+0x268/0x930 [ 248.344323] __send_signal+0xe77/0x1a00 [ 248.348317] ? _parse_integer+0x134/0x180 [ 248.352473] ? prepare_signal+0xcf0/0xcf0 [ 248.356661] ? __might_fault+0x12b/0x1e0 [ 248.360728] ? lock_downgrade+0x900/0x900 [ 248.364888] ? lock_acquire+0x1ed/0x520 [ 248.364902] ? force_sig_info+0x55/0x310 [ 248.364919] ? lock_release+0x970/0x970 [ 248.372938] ? trace_hardirqs_off+0xb8/0x310 [ 248.372953] ? force_sig_info+0x55/0x310 [ 248.372972] ? trace_hardirqs_on+0x310/0x310 [ 248.389774] send_signal+0x4a/0xe0 [ 248.393325] force_sig_info+0x250/0x310 [ 248.397315] force_sig_info_fault.constprop.29+0x2b7/0x4a0 [ 248.402960] ? is_prefetch.isra.27+0x530/0x530 [ 248.407563] ? ___might_sleep+0x1ed/0x300 [ 248.411753] __bad_area_nosemaphore+0x30c/0x3f0 [ 248.416451] bad_area+0x69/0x80 [ 248.419741] __do_page_fault+0xb37/0xed0 [ 248.423828] ? mm_fault_error+0x380/0x380 [ 248.427988] ? trace_hardirqs_off+0xb8/0x310 00:00:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xfe80000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 248.432437] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.437833] ? trace_hardirqs_on+0x310/0x310 [ 248.442251] do_page_fault+0xf2/0x7e0 [ 248.446067] ? vmalloc_sync_all+0x30/0x30 [ 248.450225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 248.455767] ? error_entry+0x70/0xd0 [ 248.459487] ? trace_hardirqs_off_caller+0xbb/0x310 [ 248.464536] ? trace_hardirqs_on_caller+0xc0/0x310 [ 248.469475] ? syscall_return_slowpath+0x5e0/0x5e0 [ 248.474427] ? trace_hardirqs_off_thunk+0x1a/0x1c 00:00:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xe803, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 248.479282] ? trace_hardirqs_on_caller+0x310/0x310 [ 248.484306] ? trace_hardirqs_off+0x310/0x310 [ 248.488812] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 248.493863] ? prepare_exit_to_usermode+0x291/0x3b0 [ 248.498891] ? page_fault+0x8/0x30 [ 248.502452] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 248.507296] ? page_fault+0x8/0x30 [ 248.510848] page_fault+0x1e/0x30 [ 248.514306] RIP: 0033: (null) [ 248.518187] Code: Bad RIP value. [ 248.521552] RSP: 002b:00007fdf184eec80 EFLAGS: 00010286 [ 248.526930] RAX: ffffffffffffffff RBX: 00007fdf184eec90 RCX: 0000000000457579 [ 248.534206] RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000003 [ 248.541483] RBP: 000000000072bf00 R08: 000000000000021f R09: 0000000000000000 [ 248.548754] R10: 0000000020000540 R11: 0000000000000246 R12: 00007fdf184ef6d4 [ 248.556048] R13: 00000000004c3a2b R14: 00000000004d5a78 R15: 0000000000000004 [ 248.569917] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:07 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x700}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:07 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x21f) 00:00:07 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x2001000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x500, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 248.653434] kernel msg: ebtables bug: please report to author: Wrong len argument [ 248.666621] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:07 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:07 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6000000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xf7ffff7f00000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:07 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x1000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 248.760798] cgroup: fork rejected by pids controller in /syz5 [ 248.788849] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:07 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:07 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x5000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x100000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:07 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x400300}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:07 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:07 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x1000000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:07 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x500, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) [ 249.008316] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:07 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:07 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x40000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:07 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x2000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:08 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 249.211034] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:08 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x80000020, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:08 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x10000200, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:08 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:08 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x8bc700000000000b}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:08 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:08 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x6000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 249.508631] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:08 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:08 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x27, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:08 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xfe80}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:08 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 249.727382] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:08 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x554, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:08 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xf0ffffff00000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:08 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3f000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:08 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:08 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x2000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x1f4, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:08 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x700, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 249.982254] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 250.000304] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:08 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:08 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:08 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xb000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:08 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x20200, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:09 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x3, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:09 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x300000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 250.178164] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:09 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xfe800000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:09 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xffffff7f00000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x8dffffff00000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:09 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:09 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:09 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x2020000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 250.310975] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xeffdffff00000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:09 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x3f4}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:09 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 250.509228] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:09 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x700000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x900, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:09 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:09 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0xa0010000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:09 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x5, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:09 executing program 3 (fault-call:4 fault-nth:0): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:09 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x3f000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 250.728057] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x6, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:09 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x60, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:09 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x1517f, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 250.801127] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:09 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xfec0}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:09 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xf5ffffff00000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 250.856596] FAULT_INJECTION: forcing a failure. [ 250.856596] name failslab, interval 1, probability 0, space 0, times 0 [ 250.919617] CPU: 0 PID: 9813 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #44 [ 250.926841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.926847] Call Trace: [ 250.926873] dump_stack+0x1c4/0x2b4 [ 250.926896] ? dump_stack_print_info.cold.2+0x52/0x52 [ 250.947653] ? get_pid_task+0xd6/0x1a0 [ 250.951549] should_fail.cold.4+0xa/0x17 [ 250.951572] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 250.961415] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 250.966519] ? find_vpid+0xf0/0xf0 [ 250.966538] ? __f_unlock_pos+0x19/0x20 [ 250.966557] ? lock_downgrade+0x900/0x900 [ 250.978192] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 250.978211] ? proc_fail_nth_write+0x9e/0x210 [ 250.988274] ? proc_cwd_link+0x1d0/0x1d0 [ 250.992361] ? kasan_check_read+0x11/0x20 [ 250.996521] ? do_raw_spin_unlock+0xa7/0x2f0 [ 250.996543] ? fs_reclaim_acquire+0x20/0x20 [ 250.996562] ? lock_downgrade+0x900/0x900 [ 251.009418] ? ___might_sleep+0x1ed/0x300 [ 251.009436] ? check_preemption_disabled+0x48/0x200 [ 251.009455] ? arch_local_save_flags+0x40/0x40 [ 251.023182] ? fsnotify_first_mark+0x350/0x350 [ 251.027791] ? __fsnotify_parent+0xcc/0x420 [ 251.032131] ? fsnotify+0x12f0/0x12f0 [ 251.035951] __should_failslab+0x124/0x180 [ 251.040213] should_failslab+0x9/0x14 [ 251.044040] __kmalloc_track_caller+0x2d0/0x750 [ 251.048718] ? strncpy_from_user+0x510/0x510 [ 251.053135] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 251.058681] ? strndup_user+0x77/0xd0 [ 251.062535] memdup_user+0x2c/0xa0 [ 251.066096] strndup_user+0x77/0xd0 [ 251.069736] ksys_mount+0x3c/0x140 [ 251.073299] __x64_sys_mount+0xbe/0x150 [ 251.077286] do_syscall_64+0x1b9/0x820 [ 251.081188] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 251.086564] ? syscall_return_slowpath+0x5e0/0x5e0 [ 251.091508] ? trace_hardirqs_on_caller+0x310/0x310 [ 251.096548] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 251.101588] ? recalc_sigpending_tsk+0x180/0x180 [ 251.106375] ? kasan_check_write+0x14/0x20 [ 251.110638] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 251.115498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.120694] RIP: 0033:0x457579 [ 251.123902] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.142873] RSP: 002b:00007f4c1e272c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 251.150622] RAX: ffffffffffffffda RBX: 00007f4c1e272c90 RCX: 0000000000457579 [ 251.157909] RDX: 0000000020000080 RSI: 0000000020000500 RDI: 0000000020000040 00:00:10 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 251.165192] RBP: 000000000072bfa0 R08: 0000000020000000 R09: 0000000000000000 [ 251.172475] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c1e2736d4 [ 251.179783] R13: 00000000004c28af R14: 00000000004d3c78 R15: 0000000000000005 00:00:10 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x10, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 251.216396] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:10 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x5405000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:10 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:10 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xfec0000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x4000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 251.373212] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:10 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x4000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:10 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:10 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0xebffffff, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xffffffffa0010000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 251.512551] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:10 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xf00}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 251.637079] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:11 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x10}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:11 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sock.s\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xff01000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:11 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x500000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:11 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x3f00, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:11 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:11 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0xffffff8c, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:11 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 252.289811] IPVS: ftp: loaded support on port[0] = 21 00:00:11 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:11 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x1a0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:11 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x10000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 252.544323] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:11 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xf0ffffffffffff}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 252.795816] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 253.494410] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.500808] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.507710] device bridge_slave_0 entered promiscuous mode [ 253.589552] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.596014] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.603002] device bridge_slave_1 entered promiscuous mode [ 253.622151] device bridge_slave_1 left promiscuous mode [ 253.627682] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.682397] device bridge_slave_0 left promiscuous mode [ 253.687870] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.585419] team0 (unregistering): Port device team_slave_1 removed [ 254.593986] team0 (unregistering): Port device team_slave_0 removed [ 254.602641] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 254.674221] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 254.753297] bond0 (unregistering): Released all slaves [ 254.814911] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 254.838502] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 254.905423] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 254.930986] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 255.074243] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 255.081667] team0: Port device team_slave_0 added [ 255.116505] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 255.123885] team0: Port device team_slave_1 added [ 255.158952] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 255.198091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.236407] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 255.244025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.259468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.289217] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 255.297122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.312930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.572983] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.579389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.586078] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.592441] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.599729] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 255.832034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.338677] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.407149] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.473457] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.479570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.487070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.554295] 8021q: adding VLAN 0 to HW filter on device team0 00:00:15 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x400000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:15 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x2000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:15 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x3f00000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:15 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x100000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:15 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sock/s\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:15 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3f00000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x11, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 257.004078] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:15 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x900000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:15 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:15 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:15 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x800000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:16 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x2700, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:16 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3f00, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 257.151754] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:16 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x6000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x4000000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:16 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x20000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 257.278956] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:16 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:16 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xfec00000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:16 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0xfffffff6, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 257.379606] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:16 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:16 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x2000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:16 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x11, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:16 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x7000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:16 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x7f51010000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x8000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 257.641492] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:16 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x200000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:16 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x5000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xfe800000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:16 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2000000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:16 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x8000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 257.799381] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:16 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:16 executing program 0 (fault-call:5 fault-nth:0): open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xf7ffff7f, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:16 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xfffff000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:16 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x700000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:16 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0xfeffffff00000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:16 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x60000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 258.079401] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x20000080, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 258.129764] FAULT_INJECTION: forcing a failure. [ 258.129764] name failslab, interval 1, probability 0, space 0, times 0 [ 258.161882] CPU: 1 PID: 10392 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #44 [ 258.169191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.178596] Call Trace: [ 258.181206] dump_stack+0x1c4/0x2b4 [ 258.184864] ? dump_stack_print_info.cold.2+0x52/0x52 [ 258.190084] ? mark_held_locks+0x130/0x130 [ 258.194336] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 258.199364] should_fail.cold.4+0xa/0x17 [ 258.203438] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 258.208566] ? lock_downgrade+0x900/0x900 [ 258.212730] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 258.212745] ? kasan_check_read+0x11/0x20 [ 258.212765] ? rcu_bh_qs+0xc0/0xc0 [ 258.226232] ? unwind_dump+0x190/0x190 [ 258.230170] ? mark_held_locks+0x130/0x130 [ 258.234418] ? is_bpf_text_address+0xd3/0x170 [ 258.238947] ? fs_reclaim_acquire+0x20/0x20 [ 258.243281] ? lock_downgrade+0x900/0x900 [ 258.247444] ? ___might_sleep+0x1ed/0x300 [ 258.251611] ? arch_local_save_flags+0x40/0x40 [ 258.256198] ? copy_process+0x949/0x8780 [ 258.260300] __should_failslab+0x124/0x180 [ 258.264545] should_failslab+0x9/0x14 [ 258.268357] kmem_cache_alloc_node+0x26e/0x730 [ 258.272950] ? kasan_check_write+0x14/0x20 [ 258.277207] ? do_raw_spin_lock+0xc1/0x200 [ 258.281470] copy_process+0x1ff4/0x8780 [ 258.285459] ? __mutex_lock+0x85e/0x1700 [ 258.289533] ? __kernel_text_address+0xd/0x40 [ 258.294037] ? smack_d_instantiate+0x136/0xea0 [ 258.298629] ? unwind_get_return_address+0x61/0xa0 [ 258.303573] ? mark_held_locks+0x130/0x130 [ 258.307823] ? mark_held_locks+0x130/0x130 [ 258.312082] ? __cleanup_sighand+0x70/0x70 [ 258.316330] ? __wake_up_common_lock+0x1d0/0x330 [ 258.321094] ? lock_downgrade+0x900/0x900 [ 258.325251] ? proc_tid_base_lookup+0x29/0x30 [ 258.329767] ? trace_hardirqs_on+0xbd/0x310 [ 258.334098] ? ima_match_policy+0x848/0x1560 [ 258.338516] ? lock_downgrade+0x900/0x900 [ 258.342672] ? do_raw_spin_lock+0xc1/0x200 [ 258.346919] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 258.352726] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 258.357848] ? __wake_up_common_lock+0x1d0/0x330 [ 258.362653] ? __wake_up_common+0x7d0/0x7d0 [ 258.366983] ? __lockdep_init_map+0x105/0x590 [ 258.371496] ? mark_held_locks+0x130/0x130 [ 258.375761] ? arch_local_save_flags+0x40/0x40 [ 258.380356] ? mark_held_locks+0x130/0x130 [ 258.384613] ? mark_held_locks+0x130/0x130 [ 258.388868] ? up_write+0x7b/0x220 [ 258.392414] ? up_read+0x110/0x110 [ 258.395964] ? down_read+0x1d0/0x1d0 [ 258.399688] ? ima_get_action+0x7e/0xa0 [ 258.403671] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.409244] ? process_measurement+0x280/0x1bf0 [ 258.413951] ? smack_log+0x423/0x590 [ 258.417677] ? ima_add_template_entry.cold.4+0x3c/0x3c [ 258.422997] ? mark_held_locks+0x130/0x130 [ 258.427263] ? mark_held_locks+0x130/0x130 [ 258.431506] ? mark_held_locks+0x130/0x130 [ 258.435747] ? mark_held_locks+0x130/0x130 [ 258.439991] ? dput.part.26+0x241/0x790 [ 258.443972] ? lock_downgrade+0x900/0x900 [ 258.448132] ? mark_held_locks+0x130/0x130 [ 258.452381] ? mnt_get_count+0x150/0x150 [ 258.456455] ? dput.part.26+0x26d/0x790 [ 258.460453] ? shrink_dcache_sb+0x350/0x350 [ 258.464787] ? lock_acquire+0x1ed/0x520 [ 258.468770] ? __fdget_pos+0x1bb/0x200 [ 258.472683] ? lock_release+0x970/0x970 [ 258.476663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.482207] ? _parse_integer+0x134/0x180 [ 258.486363] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 258.491906] ? _kstrtoull+0x188/0x250 [ 258.495711] ? _parse_integer+0x180/0x180 [ 258.495727] ? lock_release+0x970/0x970 [ 258.495742] ? arch_local_save_flags+0x40/0x40 [ 258.495760] ? usercopy_warn+0x110/0x110 [ 258.503902] ? get_pid_task+0xd6/0x1a0 [ 258.503916] ? lock_downgrade+0x900/0x900 [ 258.503937] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 00:00:17 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xffffff7f}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:17 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xffffff7f, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x6000000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x600000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 258.526404] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 258.531950] ? pid_task+0x115/0x200 [ 258.535582] ? find_vpid+0xf0/0xf0 [ 258.539148] ? __f_unlock_pos+0x19/0x20 [ 258.543132] ? lock_downgrade+0x900/0x900 [ 258.547292] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 258.552843] ? proc_fail_nth_write+0x9e/0x210 [ 258.557340] ? proc_cwd_link+0x1d0/0x1d0 [ 258.561401] ? kasan_check_read+0x11/0x20 [ 258.565555] _do_fork+0x1cb/0x11d0 [ 258.569110] ? fork_idle+0x1d0/0x1d0 [ 258.572844] ? check_preemption_disabled+0x48/0x200 [ 258.577874] ? fsnotify_first_mark+0x350/0x350 [ 258.577888] ? __fsnotify_parent+0xcc/0x420 [ 258.577904] ? fsnotify+0x12f0/0x12f0 [ 258.577919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.577936] ? check_preemption_disabled+0x48/0x200 [ 258.577954] ? __sb_end_write+0xd9/0x110 [ 258.577971] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 258.577988] ? fput+0x130/0x1a0 [ 258.586884] ? ksys_write+0x1ae/0x260 [ 258.586901] ? trace_hardirqs_on+0xbd/0x310 [ 258.586919] ? __ia32_sys_read+0xb0/0xb0 [ 258.626338] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.631714] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 258.637177] __x64_sys_clone+0xbf/0x150 [ 258.641188] do_syscall_64+0x1b9/0x820 [ 258.645085] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 258.650460] ? syscall_return_slowpath+0x5e0/0x5e0 [ 258.655403] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.660255] ? trace_hardirqs_on_caller+0x310/0x310 [ 258.661176] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 258.665278] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 258.665295] ? prepare_exit_to_usermode+0x291/0x3b0 [ 258.665313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.665332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.665343] RIP: 0033:0x457579 [ 258.665364] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 258.713977] RSP: 002b:00007f5eb832ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 258.713993] RAX: ffffffffffffffda RBX: 00007f5eb832ec90 RCX: 0000000000457579 [ 258.714002] RDX: 0000000020000000 RSI: 0000000020000200 RDI: 0000000000000000 [ 258.714010] RBP: 000000000072bf00 R08: 0000000020000140 R09: 0000000000000000 [ 258.714024] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f5eb832f6d4 [ 258.743511] R13: 00000000004bd9fa R14: 00000000004cc448 R15: 0000000000000005 00:00:17 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x4000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:17 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x600, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:17 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xf000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:17 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x4000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:17 executing program 0 (fault-call:5 fault-nth:1): open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:17 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x88, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) [ 258.869113] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 258.897932] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xff01, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 258.930711] FAULT_INJECTION: forcing a failure. [ 258.930711] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 258.951913] CPU: 1 PID: 10454 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #44 [ 258.959209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.968581] Call Trace: [ 258.971189] dump_stack+0x1c4/0x2b4 [ 258.974844] ? dump_stack_print_info.cold.2+0x52/0x52 [ 258.980054] should_fail.cold.4+0xa/0x17 [ 258.984136] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 258.989255] ? kernel_text_address+0x79/0xf0 [ 258.993679] ? unwind_get_return_address+0x61/0xa0 [ 258.998629] ? __save_stack_trace+0x8d/0xf0 [ 259.002971] ? fs_reclaim_acquire+0x20/0x20 [ 259.007306] ? lock_downgrade+0x900/0x900 [ 259.011498] ? ___might_sleep+0x1ed/0x300 [ 259.015685] ? lock_release+0x970/0x970 [ 259.019688] ? arch_local_save_flags+0x40/0x40 [ 259.024282] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.029661] ? __might_sleep+0x95/0x190 [ 259.033649] __alloc_pages_nodemask+0x34b/0xde0 [ 259.038346] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 259.043377] ? percpu_ref_put_many+0x13e/0x260 [ 259.047970] ? trace_hardirqs_on+0xbd/0x310 [ 259.052301] ? mem_cgroup_charge_statistics+0x780/0x780 [ 259.057673] ? kasan_kmalloc+0xc7/0xe0 [ 259.061574] ? kasan_slab_alloc+0x12/0x20 [ 259.066274] ? kmem_cache_alloc_node+0x303/0x730 [ 259.071038] ? kasan_check_write+0x14/0x20 [ 259.075284] ? do_raw_spin_lock+0xc1/0x200 [ 259.079529] copy_process+0xa09/0x8780 [ 259.083444] ? __mutex_lock+0x85e/0x1700 [ 259.087533] ? __kernel_text_address+0xd/0x40 [ 259.092041] ? smack_d_instantiate+0x136/0xea0 [ 259.096642] ? unwind_get_return_address+0x61/0xa0 [ 259.101583] ? mark_held_locks+0x130/0x130 [ 259.105846] ? mark_held_locks+0x130/0x130 [ 259.110097] ? __cleanup_sighand+0x70/0x70 [ 259.114347] ? __wake_up_common_lock+0x1d0/0x330 [ 259.119115] ? lock_downgrade+0x900/0x900 [ 259.123273] ? proc_tid_base_lookup+0x29/0x30 [ 259.127779] ? trace_hardirqs_on+0xbd/0x310 [ 259.132111] ? ima_match_policy+0x848/0x1560 [ 259.136530] ? lock_downgrade+0x900/0x900 [ 259.140684] ? do_raw_spin_lock+0xc1/0x200 [ 259.144931] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 259.150765] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 259.155906] ? __wake_up_common_lock+0x1d0/0x330 [ 259.160675] ? __wake_up_common+0x7d0/0x7d0 [ 259.165000] ? __lockdep_init_map+0x105/0x590 [ 259.169520] ? mark_held_locks+0x130/0x130 [ 259.173782] ? arch_local_save_flags+0x40/0x40 [ 259.178378] ? mark_held_locks+0x130/0x130 [ 259.182638] ? mark_held_locks+0x130/0x130 [ 259.186883] ? up_write+0x7b/0x220 [ 259.190432] ? up_read+0x110/0x110 [ 259.193978] ? down_read+0x1d0/0x1d0 [ 259.197696] ? ima_get_action+0x7e/0xa0 [ 259.201682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.207228] ? process_measurement+0x280/0x1bf0 [ 259.211902] ? smack_log+0x423/0x590 [ 259.215641] ? ima_add_template_entry.cold.4+0x3c/0x3c [ 259.220932] ? mark_held_locks+0x130/0x130 [ 259.225198] ? mark_held_locks+0x130/0x130 [ 259.229445] ? mark_held_locks+0x130/0x130 [ 259.233690] ? mark_held_locks+0x130/0x130 [ 259.237932] ? dput.part.26+0x241/0x790 [ 259.241917] ? lock_downgrade+0x900/0x900 [ 259.246082] ? mark_held_locks+0x130/0x130 [ 259.250327] ? mnt_get_count+0x150/0x150 [ 259.254401] ? dput.part.26+0x26d/0x790 [ 259.258384] ? shrink_dcache_sb+0x350/0x350 [ 259.262716] ? lock_acquire+0x1ed/0x520 [ 259.266698] ? __fdget_pos+0x1bb/0x200 [ 259.270602] ? lock_release+0x970/0x970 [ 259.274587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.280135] ? _parse_integer+0x134/0x180 [ 259.284306] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 259.289857] ? _kstrtoull+0x188/0x250 [ 259.293667] ? _parse_integer+0x180/0x180 [ 259.297825] ? lock_release+0x970/0x970 [ 259.301916] ? arch_local_save_flags+0x40/0x40 [ 259.306529] ? usercopy_warn+0x110/0x110 [ 259.310622] ? get_pid_task+0xd6/0x1a0 [ 259.314514] ? lock_downgrade+0x900/0x900 [ 259.318671] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 259.324471] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 259.330015] ? pid_task+0x115/0x200 [ 259.333647] ? find_vpid+0xf0/0xf0 [ 259.337220] ? __f_unlock_pos+0x19/0x20 [ 259.341246] ? lock_downgrade+0x900/0x900 [ 259.345415] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 259.350977] ? proc_fail_nth_write+0x9e/0x210 [ 259.355484] ? proc_cwd_link+0x1d0/0x1d0 [ 259.359554] ? kasan_check_read+0x11/0x20 [ 259.363736] _do_fork+0x1cb/0x11d0 [ 259.367289] ? fork_idle+0x1d0/0x1d0 [ 259.371016] ? check_preemption_disabled+0x48/0x200 [ 259.376041] ? fsnotify_first_mark+0x350/0x350 [ 259.380633] ? __fsnotify_parent+0xcc/0x420 [ 259.384965] ? fsnotify+0x12f0/0x12f0 [ 259.388774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.394334] ? check_preemption_disabled+0x48/0x200 [ 259.399368] ? __sb_end_write+0xd9/0x110 [ 259.403444] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 259.408987] ? fput+0x130/0x1a0 [ 259.412279] ? ksys_write+0x1ae/0x260 [ 259.416088] ? trace_hardirqs_on+0xbd/0x310 [ 259.420418] ? __ia32_sys_read+0xb0/0xb0 [ 259.424490] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.429875] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 259.435336] __x64_sys_clone+0xbf/0x150 [ 259.435356] do_syscall_64+0x1b9/0x820 [ 259.435371] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 259.435390] ? syscall_return_slowpath+0x5e0/0x5e0 [ 259.448606] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.448623] ? trace_hardirqs_on_caller+0x310/0x310 [ 259.448644] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 259.458445] ? prepare_exit_to_usermode+0x291/0x3b0 [ 259.458464] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.458483] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.458513] RIP: 0033:0x457579 [ 259.486773] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.505673] RSP: 002b:00007f5eb832ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 259.513427] RAX: ffffffffffffffda RBX: 00007f5eb832ec90 RCX: 0000000000457579 [ 259.520694] RDX: 0000000020000000 RSI: 0000000020000200 RDI: 0000000000000000 00:00:18 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x400000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:18 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x4, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 259.527952] RBP: 000000000072bf00 R08: 0000000020000140 R09: 0000000000000000 [ 259.535225] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f5eb832f6d4 [ 259.542499] R13: 00000000004bd9fa R14: 00000000004cc448 R15: 0000000000000005 00:00:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x2000000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:18 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x100000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 259.623636] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:18 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:18 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x8}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:18 executing program 0 (fault-call:5 fault-nth:2): open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 259.665658] syz-executor3 (10464) used greatest stack depth: 8344 bytes left 00:00:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x11000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:18 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x8800000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:18 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x20000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:18 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x1a0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 259.810157] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 259.822323] FAULT_INJECTION: forcing a failure. [ 259.822323] name failslab, interval 1, probability 0, space 0, times 0 [ 259.851951] CPU: 0 PID: 10511 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #44 [ 259.859249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.859256] Call Trace: [ 259.859282] dump_stack+0x1c4/0x2b4 [ 259.859304] ? dump_stack_print_info.cold.2+0x52/0x52 [ 259.859324] ? mem_cgroup_count_precharge_pte_range+0x760/0x760 [ 259.859340] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 259.859366] should_fail.cold.4+0xa/0x17 [ 259.859386] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 259.859402] ? get_mem_cgroup_from_mm+0x1e9/0x440 [ 259.859421] ? percpu_ref_put_many+0x11c/0x260 [ 259.859438] ? lock_downgrade+0x900/0x900 [ 259.859453] ? unwind_get_return_address+0x61/0xa0 [ 259.859470] ? lock_release+0x970/0x970 [ 259.859491] ? get_mem_cgroup_from_mm+0x206/0x440 [ 259.859511] ? fs_reclaim_acquire+0x20/0x20 [ 259.859527] ? lock_downgrade+0x900/0x900 [ 259.859547] ? ___might_sleep+0x1ed/0x300 [ 259.859564] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 259.859580] ? arch_local_save_flags+0x40/0x40 [ 259.859601] ? creds_are_invalid+0x140/0x140 [ 259.859621] __should_failslab+0x124/0x180 [ 259.859636] should_failslab+0x9/0x14 [ 259.859653] kmem_cache_alloc+0x2be/0x730 [ 259.859668] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 259.859685] ? fpu__copy+0x2a9/0x870 [ 259.859701] ? fpu__restore+0x9f0/0x9f0 [ 259.859716] prepare_creds+0xab/0x4d0 [ 259.859731] ? mem_cgroup_charge_statistics+0x780/0x780 [ 259.859745] ? abort_creds+0x2a0/0x2a0 [ 259.859761] ? trace_hardirqs_on+0xbd/0x310 [ 259.859776] ? kasan_kmalloc+0xc7/0xe0 [ 259.859788] ? copy_process+0xd01/0x8780 [ 259.859805] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 259.859822] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 259.859852] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 259.859873] ? check_preemption_disabled+0x48/0x200 [ 259.859889] copy_creds+0x79/0x560 [ 259.859905] copy_process+0x1266/0x8780 [ 259.859924] ? __mutex_lock+0x85e/0x1700 [ 259.859939] ? __kernel_text_address+0xd/0x40 [ 259.859957] ? smack_d_instantiate+0x136/0xea0 00:00:18 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) [ 259.859971] ? unwind_get_return_address+0x61/0xa0 [ 259.859987] ? mark_held_locks+0x130/0x130 [ 259.860008] ? __cleanup_sighand+0x70/0x70 [ 259.860028] ? __wake_up_common_lock+0x1d0/0x330 [ 259.860048] ? lock_downgrade+0x900/0x900 [ 259.892588] ? proc_tid_base_lookup+0x29/0x30 [ 259.892606] ? trace_hardirqs_on+0xbd/0x310 [ 259.892623] ? ima_match_policy+0x848/0x1560 [ 259.892639] ? do_raw_spin_lock+0xc1/0x200 [ 259.892658] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 259.892676] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 259.906658] ? __wake_up_common_lock+0x1d0/0x330 [ 259.920541] ? __wake_up_common+0x7d0/0x7d0 [ 259.920560] ? __lockdep_init_map+0x105/0x590 [ 259.977892] ? mark_held_locks+0x130/0x130 [ 259.985646] ? arch_local_save_flags+0x40/0x40 [ 259.985670] ? mark_held_locks+0x130/0x130 [ 260.126572] ? mark_held_locks+0x130/0x130 [ 260.130819] ? up_write+0x7b/0x220 [ 260.134377] ? up_read+0x110/0x110 [ 260.137923] ? down_read+0x1d0/0x1d0 [ 260.141676] ? ima_get_action+0x7e/0xa0 [ 260.145683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.151258] ? process_measurement+0x280/0x1bf0 [ 260.155936] ? smack_log+0x423/0x590 [ 260.159667] ? ima_add_template_entry.cold.4+0x3c/0x3c [ 260.164962] ? mark_held_locks+0x130/0x130 [ 260.169213] ? mark_held_locks+0x130/0x130 [ 260.173463] ? mark_held_locks+0x130/0x130 [ 260.177725] ? mark_held_locks+0x130/0x130 [ 260.181976] ? dput.part.26+0x241/0x790 [ 260.185965] ? lock_downgrade+0x900/0x900 [ 260.190138] ? mark_held_locks+0x130/0x130 [ 260.194387] ? mnt_get_count+0x150/0x150 [ 260.198463] ? dput.part.26+0x26d/0x790 [ 260.202464] ? shrink_dcache_sb+0x350/0x350 [ 260.206840] ? lock_acquire+0x1ed/0x520 [ 260.210850] ? __fdget_pos+0x1bb/0x200 [ 260.214752] ? lock_release+0x970/0x970 [ 260.218738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.224329] ? _parse_integer+0x134/0x180 [ 260.228483] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 260.234045] ? _kstrtoull+0x188/0x250 [ 260.237869] ? _parse_integer+0x180/0x180 [ 260.242028] ? lock_release+0x970/0x970 [ 260.246006] ? arch_local_save_flags+0x40/0x40 [ 260.250592] ? usercopy_warn+0x110/0x110 [ 260.250615] ? get_pid_task+0xd6/0x1a0 [ 260.250634] ? lock_downgrade+0x900/0x900 [ 260.262716] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 260.268529] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 260.274084] ? pid_task+0x115/0x200 [ 260.277731] ? find_vpid+0xf0/0xf0 [ 260.281285] ? __f_unlock_pos+0x19/0x20 [ 260.285274] ? lock_downgrade+0x900/0x900 [ 260.289439] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 260.294991] ? proc_fail_nth_write+0x9e/0x210 [ 260.299500] ? proc_cwd_link+0x1d0/0x1d0 [ 260.303570] ? kasan_check_read+0x11/0x20 [ 260.307762] _do_fork+0x1cb/0x11d0 [ 260.311318] ? fork_idle+0x1d0/0x1d0 [ 260.315045] ? check_preemption_disabled+0x48/0x200 [ 260.320077] ? fsnotify_first_mark+0x350/0x350 [ 260.324675] ? __fsnotify_parent+0xcc/0x420 [ 260.329013] ? fsnotify+0x12f0/0x12f0 [ 260.332828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.338393] ? check_preemption_disabled+0x48/0x200 [ 260.343422] ? __sb_end_write+0xd9/0x110 [ 260.347500] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 260.353308] ? fput+0x130/0x1a0 [ 260.356632] ? ksys_write+0x1ae/0x260 [ 260.360442] ? trace_hardirqs_on+0xbd/0x310 [ 260.364774] ? __ia32_sys_read+0xb0/0xb0 [ 260.368855] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.374233] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 260.379712] __x64_sys_clone+0xbf/0x150 [ 260.383713] do_syscall_64+0x1b9/0x820 [ 260.387605] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 260.393009] ? syscall_return_slowpath+0x5e0/0x5e0 [ 260.397948] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.402802] ? trace_hardirqs_on_caller+0x310/0x310 [ 260.407865] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 260.412896] ? prepare_exit_to_usermode+0x291/0x3b0 [ 260.417926] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.422787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.428007] RIP: 0033:0x457579 [ 260.431210] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:00:19 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0xfffffffe, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:19 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x300, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:19 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x8a03000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x54050000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:19 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) [ 260.450134] RSP: 002b:00007f5eb832ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 260.450151] RAX: ffffffffffffffda RBX: 00007f5eb832ec90 RCX: 0000000000457579 [ 260.450159] RDX: 0000000020000000 RSI: 0000000020000200 RDI: 0000000000000000 [ 260.450173] RBP: 000000000072bf00 R08: 0000000020000140 R09: 0000000000000000 [ 260.465163] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f5eb832f6d4 [ 260.465172] R13: 00000000004bd9fa R14: 00000000004cc448 R15: 0000000000000005 [ 260.551690] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:19 executing program 0 (fault-call:5 fault-nth:3): open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x7ffffff7, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:19 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:19 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x80fe}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:19 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x40000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:19 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x600000000000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) [ 260.664061] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xfffffdef, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:19 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x9101000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 260.759245] FAULT_INJECTION: forcing a failure. [ 260.759245] name failslab, interval 1, probability 0, space 0, times 0 [ 260.797357] CPU: 0 PID: 10583 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #44 00:00:19 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x40030000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 260.804728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.814109] Call Trace: [ 260.815582] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 260.816719] dump_stack+0x1c4/0x2b4 [ 260.816744] ? dump_stack_print_info.cold.2+0x52/0x52 [ 260.816766] should_fail.cold.4+0xa/0x17 [ 260.836131] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 260.841253] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 260.846284] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 260.851058] ? modules_open+0xa0/0xa0 [ 260.854880] ? is_bpf_text_address+0xac/0x170 [ 260.859389] ? lock_downgrade+0x900/0x900 [ 260.863550] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 260.869362] ? fs_reclaim_acquire+0x20/0x20 [ 260.873702] ? lock_downgrade+0x900/0x900 [ 260.877882] ? ___might_sleep+0x1ed/0x300 [ 260.882039] ? is_bpf_text_address+0xd3/0x170 [ 260.886545] ? arch_local_save_flags+0x40/0x40 [ 260.891143] ? kernel_text_address+0x79/0xf0 [ 260.895565] ? unwind_get_return_address+0x61/0xa0 [ 260.900513] __should_failslab+0x124/0x180 [ 260.904775] should_failslab+0x9/0x14 [ 260.908616] kmem_cache_alloc_trace+0x2d7/0x750 [ 260.913297] ? save_stack+0xa9/0xd0 [ 260.916939] new_task_smack+0xef/0x310 [ 260.920878] ? smack_sb_kern_mount+0x410/0x410 [ 260.925481] ? do_syscall_64+0x1b9/0x820 [ 260.929556] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.934965] ? percpu_ref_put_many+0x11c/0x260 [ 260.939576] ? lock_downgrade+0x900/0x900 [ 260.943740] smack_cred_prepare+0x109/0x910 [ 260.948075] ? mem_cgroup_handle_over_high+0x130/0x130 [ 260.953373] ? smack_cred_alloc_blank+0x70/0x70 [ 260.958061] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.963618] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 260.969084] ? refcount_add_not_zero_checked+0x330/0x330 [ 260.974568] ? kasan_kmalloc+0xc7/0xe0 [ 260.978500] security_prepare_creds+0x60/0xc0 [ 260.983127] prepare_creds+0x3b9/0x4d0 [ 260.987022] ? abort_creds+0x2a0/0x2a0 [ 260.990922] ? trace_hardirqs_on+0xbd/0x310 [ 260.995270] ? kasan_kmalloc+0xc7/0xe0 [ 260.999162] ? copy_process+0xd01/0x8780 [ 261.003233] ? __bpf_trace_preemptirq_template+0x30/0x30 00:00:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x8000002000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 261.008697] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 261.014244] ? check_preemption_disabled+0x48/0x200 [ 261.019275] copy_creds+0x79/0x560 [ 261.022825] copy_process+0x1266/0x8780 [ 261.022853] ? __mutex_lock+0x85e/0x1700 [ 261.022867] ? __kernel_text_address+0xd/0x40 [ 261.022888] ? smack_d_instantiate+0x136/0xea0 [ 261.030923] ? unwind_get_return_address+0x61/0xa0 [ 261.030943] ? mark_held_locks+0x130/0x130 [ 261.030964] ? __cleanup_sighand+0x70/0x70 [ 261.053406] ? __wake_up_common_lock+0x1d0/0x330 00:00:19 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x11000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 261.058178] ? lock_downgrade+0x900/0x900 [ 261.062342] ? proc_tid_base_lookup+0x29/0x30 [ 261.066861] ? trace_hardirqs_on+0xbd/0x310 [ 261.071190] ? ima_match_policy+0x848/0x1560 [ 261.075611] ? do_raw_spin_lock+0xc1/0x200 [ 261.079874] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 261.085679] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 261.090796] ? __wake_up_common_lock+0x1d0/0x330 [ 261.095573] ? __wake_up_common+0x7d0/0x7d0 [ 261.099908] ? __lockdep_init_map+0x105/0x590 [ 261.104423] ? mark_held_locks+0x130/0x130 [ 261.108672] ? arch_local_save_flags+0x40/0x40 [ 261.113280] ? mark_held_locks+0x130/0x130 [ 261.117540] ? mark_held_locks+0x130/0x130 [ 261.121800] ? up_write+0x7b/0x220 [ 261.125355] ? up_read+0x110/0x110 [ 261.128906] ? down_read+0x1d0/0x1d0 [ 261.132632] ? ima_get_action+0x7e/0xa0 [ 261.136654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.142278] ? process_measurement+0x280/0x1bf0 [ 261.146980] ? smack_log+0x423/0x590 [ 261.150717] ? ima_add_template_entry.cold.4+0x3c/0x3c [ 261.156007] ? mark_held_locks+0x130/0x130 [ 261.160257] ? mark_held_locks+0x130/0x130 [ 261.164506] ? mark_held_locks+0x130/0x130 [ 261.168757] ? mark_held_locks+0x130/0x130 [ 261.173000] ? dput.part.26+0x241/0x790 [ 261.176990] ? lock_downgrade+0x900/0x900 [ 261.181152] ? mark_held_locks+0x130/0x130 [ 261.185431] ? mnt_get_count+0x150/0x150 [ 261.189504] ? dput.part.26+0x26d/0x790 [ 261.193489] ? shrink_dcache_sb+0x350/0x350 [ 261.197826] ? lock_acquire+0x1ed/0x520 [ 261.201823] ? __fdget_pos+0x1bb/0x200 [ 261.205758] ? lock_release+0x970/0x970 [ 261.209745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.215298] ? _parse_integer+0x134/0x180 [ 261.219478] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 261.225025] ? _kstrtoull+0x188/0x250 [ 261.228859] ? _parse_integer+0x180/0x180 [ 261.233019] ? lock_release+0x970/0x970 [ 261.237007] ? arch_local_save_flags+0x40/0x40 [ 261.241600] ? usercopy_warn+0x110/0x110 [ 261.245672] ? get_pid_task+0xd6/0x1a0 [ 261.249594] ? lock_downgrade+0x900/0x900 [ 261.253773] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 261.259580] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 261.265134] ? pid_task+0x115/0x200 [ 261.268763] ? find_vpid+0xf0/0xf0 [ 261.272311] ? __f_unlock_pos+0x19/0x20 [ 261.276309] ? lock_downgrade+0x900/0x900 [ 261.280466] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 261.286017] ? proc_fail_nth_write+0x9e/0x210 [ 261.290513] ? proc_cwd_link+0x1d0/0x1d0 [ 261.294596] ? kasan_check_read+0x11/0x20 [ 261.298760] _do_fork+0x1cb/0x11d0 [ 261.302324] ? fork_idle+0x1d0/0x1d0 [ 261.306066] ? check_preemption_disabled+0x48/0x200 [ 261.311106] ? fsnotify_first_mark+0x350/0x350 [ 261.315691] ? __fsnotify_parent+0xcc/0x420 [ 261.320014] ? fsnotify+0x12f0/0x12f0 [ 261.323821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.329374] ? check_preemption_disabled+0x48/0x200 [ 261.334412] ? __sb_end_write+0xd9/0x110 [ 261.338492] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 261.344041] ? fput+0x130/0x1a0 [ 261.347327] ? ksys_write+0x1ae/0x260 [ 261.351137] ? trace_hardirqs_on+0xbd/0x310 [ 261.355516] ? __ia32_sys_read+0xb0/0xb0 [ 261.359610] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.365016] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 261.370478] __x64_sys_clone+0xbf/0x150 [ 261.374468] do_syscall_64+0x1b9/0x820 [ 261.378366] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 261.383742] ? syscall_return_slowpath+0x5e0/0x5e0 [ 261.388685] ? trace_hardirqs_on_caller+0x310/0x310 [ 261.393720] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 261.398749] ? recalc_sigpending_tsk+0x180/0x180 [ 261.403517] ? kasan_check_write+0x14/0x20 [ 261.407764] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.412629] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.417840] RIP: 0033:0x457579 [ 261.421047] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.439961] RSP: 002b:00007f5eb830dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 261.447687] RAX: ffffffffffffffda RBX: 00007f5eb830dc90 RCX: 0000000000457579 [ 261.454972] RDX: 0000000020000000 RSI: 0000000020000200 RDI: 0000000000000000 [ 261.462256] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 261.469539] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f5eb830e6d4 [ 261.476820] R13: 00000000004bd9fa R14: 00000000004cc448 R15: 0000000000000005 [ 261.488347] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:20 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:20 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x88000000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:20 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0xf6ffffff, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:20 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:20 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x1a0}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xf4010000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 261.768326] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:20 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6000, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x6000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:20 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xf403}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:20 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x8800, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:20 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x1100, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:20 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2020000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 261.924734] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:21 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b6673ff", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xfe80, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:21 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x28, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:21 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x8a03}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:21 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x2700000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:21 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x700000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:21 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0xa, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 262.205174] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:21 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x19, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x3e8, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:21 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x400000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:21 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x4000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:21 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:21 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2b, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) [ 262.376167] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xa0010000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:21 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xa000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:21 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x16, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x5000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 262.560186] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:21 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x8000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:21 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0xf, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:21 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x20000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x400000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:21 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x10000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:21 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x13, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 262.807661] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:21 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x700000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:21 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x25, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:21 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x500000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:21 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2a, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:21 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x8cffffff00000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 263.008158] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:21 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3e01000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x400300, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:21 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xa0010000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:22 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2d, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:22 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x10, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x1100, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 263.190212] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:22 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b66737f", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:22 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x80000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:22 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x60000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:22 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x29, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xffffff8d, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:22 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xf6ffffff00000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:22 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x4, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 263.696107] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x4, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:22 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x17, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:22 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x600}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:22 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x20000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:22 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b66738c", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:22 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x31, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 263.835039] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x900000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:22 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x2}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:22 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b667318", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x3000000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:22 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1f00, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:22 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x27000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 263.963366] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:22 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x3, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x60000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:22 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x40000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:23 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2f, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:23 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x600, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 264.143785] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x5405, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:23 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xff00}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:23 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) [ 264.327292] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:23 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b6673eb", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:23 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x2, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x10, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:23 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x21, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:23 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xf}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:23 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x11, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:23 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x32, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) [ 264.626265] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x34000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:23 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x18, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:23 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x7}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:23 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x200000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:23 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2c, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) [ 264.821993] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:23 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0xebffffff00000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:23 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x6, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:23 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x60}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x8, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 264.971722] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:23 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1596000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:23 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x22, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x1100000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:23 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xb0000000000c78b}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:23 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0xb, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 265.123379] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:24 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x7000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:24 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x3f00000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:24 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x14, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:24 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x8a030000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:24 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2001000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:24 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x23, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x700, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 265.344544] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:24 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x3000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:24 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0xc, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:24 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x1100000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x300, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 265.449915] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:24 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:24 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2e, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:24 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x500}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x2, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:24 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x200000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:24 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x100000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:24 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x8, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 266.117251] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x5, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:25 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x800000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:25 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x12, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:25 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x200000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xa, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 266.249911] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:25 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x15, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:25 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x600000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x60, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:25 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0xfeffffff, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:25 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:25 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x400000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:25 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x6000000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 266.544653] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:25 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x7, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x30, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:25 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0xffffffffa0010000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:25 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) [ 266.649739] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:25 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xfc00}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:25 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0xd, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x40030000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:25 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x24, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:25 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x500, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 266.760688] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:25 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x11, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:25 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x9effffff00000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:25 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x11, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x80fe, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:25 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:25 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1100, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:26 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x30, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:26 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x5, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 267.160319] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:26 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'fiuter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x2000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:26 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xba020000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xf401000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:26 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x800000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:26 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'fi\nter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) [ 267.324681] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:26 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'fi%ter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:26 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x3f00}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 267.451730] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:26 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b6673a0", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x100000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:26 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'fi.ter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:26 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x3f000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:26 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x900}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:26 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x8cffffff00000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:26 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'fiLter\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 267.768466] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x9000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:26 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x5}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:26 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b667303", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:26 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'fil\ner\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xeffdffff, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:26 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x9effffff}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 267.881677] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:26 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'fil%er\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xff010000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 268.023095] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:26 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x1000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:26 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filt%r\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) [ 268.067256] cgroup: fork rejected by pids controller in /syz3 [ 268.086480] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:27 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xf0ae86437f0000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x9, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:27 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xa00}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:27 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:27 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filt\nr\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:27 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x2000000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x1a0ffffffff, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:27 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xba02}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 268.323984] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:27 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filte%\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x500000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:27 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x10000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:27 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3e010000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 268.452060] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:27 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:27 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x191}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:27 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x3f00, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 268.633896] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:27 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xffffff9e}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:27 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x10001e, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:27 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x4000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xfffffff5, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 268.805823] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:28 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x8, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:28 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x4}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:28 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filte\n\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:28 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xe803000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x3000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 269.179150] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 269.410341] IPVS: ftp: loaded support on port[0] = 21 00:00:28 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b6673ff", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:28 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x11000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xa000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:28 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x8, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:28 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xba02000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xf5ffffff, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 269.775625] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:28 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xf0ffff}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 269.822666] device bridge_slave_1 left promiscuous mode [ 269.828159] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.898893] device bridge_slave_0 left promiscuous mode [ 269.905576] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.910272] IPVS: ftp: loaded support on port[0] = 21 [ 269.966163] team0 (unregistering): Port device team_slave_1 removed [ 269.976575] team0 (unregistering): Port device team_slave_0 removed [ 269.986721] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 270.024120] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 270.080653] bond0 (unregistering): Released all slaves [ 270.172146] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 270.859095] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.866130] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.873420] device bridge_slave_0 entered promiscuous mode [ 270.926324] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.932923] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.939681] device bridge_slave_1 entered promiscuous mode [ 270.972016] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 271.007795] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 271.022192] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.028826] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.036373] device bridge_slave_0 entered promiscuous mode [ 271.155466] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.162808] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.171505] device bridge_slave_1 entered promiscuous mode [ 271.259494] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 271.286232] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 271.366162] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 271.376557] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 271.485149] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 271.493350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 271.523598] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 271.619025] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 271.819003] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 271.826719] team0: Port device team_slave_0 added [ 271.920816] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 271.928308] team0: Port device team_slave_1 added [ 271.951165] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 271.958733] team0: Port device team_slave_0 added [ 272.027333] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 272.037067] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 272.045013] team0: Port device team_slave_1 added [ 272.062523] device bridge_slave_1 left promiscuous mode [ 272.068094] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.112413] device bridge_slave_0 left promiscuous mode [ 272.117871] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.011710] team0 (unregistering): Port device team_slave_1 removed [ 273.023253] team0 (unregistering): Port device team_slave_0 removed [ 273.034017] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 273.074257] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 273.127454] bond0 (unregistering): Released all slaves [ 273.177187] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 273.188917] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 273.196244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 273.204448] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 273.221625] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 273.229895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 273.237876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 273.247806] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 273.263635] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.279335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 273.304755] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 273.312341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.321702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 273.340892] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 273.363002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 273.372934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 273.405760] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 273.418120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 273.428966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 273.944055] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.950502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.957195] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.963565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.971119] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 273.979432] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.985839] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.992524] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.998897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.007150] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 274.202211] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 274.209359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 275.293496] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.330416] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.429641] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 275.450806] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 275.546349] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 275.553138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.563569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.594021] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 275.600195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.614571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.688257] 8021q: adding VLAN 0 to HW filter on device team0 [ 275.726302] 8021q: adding VLAN 0 to HW filter on device team0 00:00:35 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000600", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:35 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0xffffffff00000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:35 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x40000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:35 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xf0ffffff}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x8dffffff, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:35 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:35 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00`\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x3f000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 276.523724] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:35 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\a\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:35 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x2ba}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 276.574231] IPVS: ftp: loaded support on port[0] = 21 00:00:35 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x1a0ffffffff, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x600, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:35 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572008800", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 276.651714] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 276.689626] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:35 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xffffffffa0010000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 276.800253] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:35 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x700, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x7, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:35 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465720600", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:35 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xfc}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:35 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x8cffffff, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x300000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:35 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:35 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465720000000300", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:35 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x13e, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xa00000000000000, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:35 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 277.086188] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:36 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x8000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:36 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000007fffffff00", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:36 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465720000000200", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:36 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xb}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xa00, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:36 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465720000000600", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 277.342695] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0xf401, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:36 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b6673f6", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:36 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter`\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:36 executing program 2: r0 = open(&(0x7f0000000280)='./bus\x00', 0x1141042, 0x20) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000000)) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000040)=""/173) 00:00:36 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xfc00000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x80fe, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:36 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 277.924023] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:36 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465720400", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:36 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0xf403000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x60, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:36 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) [ 278.076909] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:37 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1f00000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x10, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:37 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x5c2e1439b13796f4, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000001380)=ANY=[@ANYBLOB="f0c2f232dc9272e6cea5e0a7b45d9549f0facace6be9e500001b3bd564be1db5e3d4d013295df4000008000000000000f4c98c92c7894d58722a45dcab9495d78cfc52c398d256d8b8be31ca367325a765453fb90541976428763e534ccadf3aa45b1313e53f2e98207d00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYPTR64, @ANYRES32=0x0, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYPTR64, @ANYPTR, @ANYRESOCT=r1, @ANYRES16=r1, @ANYPTR64], @ANYRESDEC]], &(0x7f0000000080)=0x6) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x3, 0x30, 0x80000001}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000001440)={r2, 0xfcc9, 0xe1, "dc7462b2945c39b27ff68c0592194e2813a18500bc176679f1e7b61dd1cee7a5eda6cb7cb9f131e22011e03578bfec4770371a748a209950b5cf89e3bf17fe791475fca9995e71c30f6136fce0edb95c90efdbcc105e25ac4c8798d4e73f4ae3010f3dc8f0be4a0b342d7e4207b196453a34d1f6aed9df682b2a4c2289e48e8c2f21e6502fce7eabb73d15f5e08153a152f5bc09e43977da9c149554fe79a51f3bd2095dee6598830a5a247d7f8de40c6a5bfbb88387aee10097f3479e31961c73b5bb468c850577a3474996d4b2d85742d988b0ea975ebb972ca0e1c0b1ec666c"}, 0xe9) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:37 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x200000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:37 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\a\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 278.229887] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x300000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:37 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00 \x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:37 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x2}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xe8030000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x700, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:37 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000000000000200", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:37 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:37 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xf0ffffff00000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:37 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465720000000100", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xf401, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:37 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x400000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:37 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) syz_open_procfs(r1, &(0x7f0000000200)='oom_score\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:37 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000300", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x8, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 278.736637] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:37 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x700000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:37 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465728800", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x5, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:37 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000000000008800", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) [ 278.864178] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:38 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:38 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xb00}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:38 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000000000000100", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x3, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:38 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:38 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000040)={0x10005, 0x3, 0x5000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000080)={0x8, 0x1, 0x0, 0x7dd}) 00:00:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xf7ffff7f, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:38 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00 \x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:38 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x60}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:38 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000080)=0x16, 0x4) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 00:00:38 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x900}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xe803, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:38 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:38 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x400000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:38 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xf4ffffff, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:38 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x195, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000040)=[@in={0x2, 0x4e24}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e22, 0x0, @local, 0x6}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e20, 0x8, @empty, 0x5}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e23, 0xe222, @loopback, 0x1}, @in={0x2, 0x4e21}, @in={0x2, 0x4e23, @local}], 0xb4) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 279.699721] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:38 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x9effffff00000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:38 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465720300", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:38 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) accept$packet(r0, &(0x7f0000000040), &(0x7f0000000080)=0x14) 00:00:38 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3f000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x4000000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 279.843350] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:38 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x1000000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 279.986271] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 280.047742] IPVS: ftp: loaded support on port[0] = 21 [ 280.162594] device bridge_slave_1 left promiscuous mode [ 280.168236] bridge0: port 2(bridge_slave_1) entered disabled state 00:00:39 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b667302", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xf5ffffff00000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:39 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000040)={0x1, 0xffffffffffffff5b, 0x3, 0x7c9, 0x8, 0x3ed}) 00:00:39 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xf0ffffffffffff}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:39 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x605901, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 280.222492] device bridge_slave_0 left promiscuous mode [ 280.227994] bridge0: port 1(bridge_slave_0) entered disabled state 00:00:39 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xfcffffff, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 280.331034] team0 (unregistering): Port device team_slave_1 removed [ 280.366676] team0 (unregistering): Port device team_slave_0 removed 00:00:39 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b6673ff", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) [ 280.390081] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 280.434568] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 280.496263] bond0 (unregistering): Released all slaves [ 280.942034] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.948476] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.956278] device bridge_slave_0 entered promiscuous mode [ 280.988572] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.995015] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.002702] device bridge_slave_1 entered promiscuous mode [ 281.037227] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 281.070712] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 281.152885] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 281.177364] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 281.286205] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 281.293500] team0: Port device team_slave_0 added [ 281.314536] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 281.321709] team0: Port device team_slave_1 added [ 281.343055] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 281.366298] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 281.388999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 281.412663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 281.605547] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.612088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.618663] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.625040] bridge0: port 1(bridge_slave_0) entered forwarding state [ 282.325289] 8021q: adding VLAN 0 to HW filter on device bond0 [ 282.394279] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 282.462840] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 282.469180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 282.476990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 282.545715] 8021q: adding VLAN 0 to HW filter on device team0 00:00:41 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000000000000300", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:41 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000001bc0)='/dev/amidi#\x00', 0x4, 0x200) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001c00)={0x0, 0x1000, "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"}, &(0x7f0000002c40)=0x1008) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000002c80)={r1, @in6={{0xa, 0x4e24, 0x2, @ipv4={[], [], @rand_addr=0x5}, 0x3f}}, [0x8, 0x3, 0x0, 0x8482, 0xcb96, 0x10000, 0x4, 0x1, 0x7ff, 0x9, 0x777b, 0x8001, 0x53fe, 0x9, 0x9]}, &(0x7f0000002d80)=0x100) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:41 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b667304", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:41 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1e001000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x5405000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:41 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xf0ffff}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x8000002000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:41 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xff000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:41 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b6673ff", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xeffdffff, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:41 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE(r0, &(0x7f0000000300)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000200)=""/241, 0xf1, 0x6, 0x318, 0x3, 0x5, 0x7fffffff}, 0x120) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs(r1, &(0x7f0000000040)='net/anycast6\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:41 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00?\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x1000000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:42 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xf000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:42 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000000000000400", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:42 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x10000200, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:42 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b6673ff", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2000000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:42 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xa}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:42 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465720000000400", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x200000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:42 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x80fe}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:42 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000380)={'filter\x00'}, &(0x7f0000000400)=0x54) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x4, 0x70, 0x7, 0x1f, 0x80000001, 0x2, 0x0, 0x100000001, 0x20000000040, 0x2, 0x7fff, 0x2, 0x2, 0x8, 0x7fffffff, 0x0, 0x8, 0x1, 0xc5e9, 0x7, 0x7, 0x3ff, 0x101, 0x3, 0xe78f, 0x7ff, 0x3, 0xb0a4, 0x40, 0xfffffffffffffff7, 0xa0ac000000, 0x0, 0x3, 0x9, 0xcd3, 0x80, 0x3ff, 0x5fe9, 0x0, 0xffff, 0xffffffffffffffff, @perf_bp={&(0x7f0000000200), 0xc}, 0x4, 0x0, 0xffffffff, 0x7, 0x2, 0x9, 0x69}) write$P9_RMKDIR(r0, &(0x7f0000000100)={0x14, 0x49, 0x1, {0x4, 0x4, 0x7}}, 0x14) perf_event_open(&(0x7f0000000280)={0x6, 0x70, 0x0, 0xa5a, 0x0, 0x0, 0x0, 0x0, 0x8004, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xbda6ebfba062f0d4}, 0x0, 0x0, 0xffffffffffffffff, 0x2) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) epoll_wait(r0, &(0x7f0000000240)=[{}, {}, {}], 0x3, 0x4) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000440), &(0x7f0000000480)=0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000000c0)={@loopback, @empty, @local}, &(0x7f0000000140)=0xc) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) connect$llc(r0, &(0x7f00000004c0)={0x1a, 0x32f, 0x100000001, 0xf1b1, 0xf92, 0xffffffffffff0001, @remote}, 0x10) 00:00:42 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:42 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xffffff8c, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:42 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00\a\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xfe800000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:42 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x2000000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:42 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465720000001100", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:42 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x9000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 283.566458] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x4000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:42 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00?\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:42 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x700}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xff01000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:42 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x7b, 0x8, 0x2, 0x5, 0x6, [{0x4, 0xba, 0x1, 0x0, 0x0, 0x1008}, {0x80000001, 0x551d, 0x7fffffff, 0x0, 0x0, 0x200}, {0x1ff, 0x5, 0x8, 0x0, 0x0, 0x3600}, {0x9, 0xffffffff, 0x9, 0x0, 0x0, 0x80}, {0xfffffffffffffe01, 0x1, 0xfffffffffffff801, 0x0, 0x0, 0xa84}, {0x0, 0x1, 0x7, 0x0, 0x0, 0x403}]}) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:42 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x1100000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:42 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xffffff9e}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:42 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1ff000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:42 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465721100", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:42 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x100000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:42 executing program 2: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) r1 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(r1, &(0x7f0000000040)='net/udp6\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x10000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:42 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465720500", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:42 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x10000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:43 executing program 2: open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x64) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) 00:00:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x400300, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 284.121654] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:43 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b6673c0", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:43 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000000000001100", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:43 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xb000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xfffffdef, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:43 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x3) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_ENABLE(r3, 0x40086432, &(0x7f0000000040)=0x3) r4 = syz_open_dev$binder(&(0x7f0000001240)='/dev/binder#\x00', 0x0, 0x800) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000080)) poll(&(0x7f0000001280)=[{r3, 0xa000}, {r4, 0x8088}, {r2, 0x4a}, {r2, 0x100}, {r3, 0x6200}, {r1, 0x8}], 0x6, 0x6) 00:00:43 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000500", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:43 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xffffff7f00000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x20000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:43 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b667386", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:43 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:43 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000000000000600", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 284.547438] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xf4010000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:43 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x6000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:43 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x8a030000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x3f00, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:43 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:43 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./bus\x00', 0x9, 0x4, &(0x7f0000001300)=[{&(0x7f00000000c0)="283efa3860d6030fb3f2bc865e", 0xd, 0x800}, {&(0x7f0000000200)="4d5ac2a8e01c8bce17a3ded7f54c990abf900fd43e45d6fd10d3bb6da87bfccace6dd9774e163d7e55c11dcef2806332d94fc60447ca2d149cdbe663a8921c3e8d85e3ede5e825a5f2fcd545e4f1d6", 0x4f, 0x7}, {&(0x7f0000000280)="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", 0x1000, 0xfffffffffffffff8}, {&(0x7f0000001280)="44cacc5de024bcf4d3192255beacf28f72d195b9e0240b010344fb116a5b3d570346f6d9c8d73a7cdc57b20ca295d635ca260385936d74022b81374e5cce0fda4f1c9e1dc216171c25a0a83de0c8b9b16918", 0x52, 0xf33e}], 0x0, &(0x7f0000001380)={[{@fault_injection={'fault_injection', 0x3d, 0x7}}, {@user_xattr='user_xattr'}, {@acl='acl'}, {@fault_injection={'fault_injection'}}, {@user_xattr='user_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x7}}]}) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:43 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00`\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xf401000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:43 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x6000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x20000080, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:43 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xfe80000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:43 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xebffffff, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 284.916780] erofs: read_super, device -> /dev/loop2 [ 284.922693] erofs: options -> fault_injection=0x0000000000000007,user_xattr,acl,fault_injection=0x0000000000000000,user_xattr,fsmagic=0x0000000000000007, [ 284.988572] erofs: cannot find valid erofs superblock [ 284.992542] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:43 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xf00000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x400000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:43 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000000000000500", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 285.089990] erofs: read_super, device -> /dev/loop2 [ 285.107504] erofs: options -> fault_injection=0x0000000000000007,user_xattr,acl,fault_injection=0x0000000000000000,user_xattr,fsmagic=0x0000000000000007, [ 285.133892] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x8000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 285.173046] erofs: cannot find valid erofs superblock 00:00:44 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:44 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000040)) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:44 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3e01, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:44 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x8a03000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:44 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00?\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x60000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:44 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:44 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465720000008800", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 285.599902] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:44 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xfc00000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x7000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:44 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') write$FUSE_INIT(r0, &(0x7f0000000040)={0xfffffe07, 0xfffffffffffffffe, 0x8, {0x7, 0x1b, 0x83, 0x1, 0x1ff, 0x3c, 0x2c, 0x20000003}}, 0xffffffffffffff12) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:44 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465727fffffff00", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) [ 285.732457] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:44 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xa000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:44 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20010, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xff010000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:44 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xc0fe}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:44 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465720200", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x600, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:45 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b6673f9", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:45 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\a\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:45 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x3000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:45 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f00000000c0)={0x0, 0x6, 0x400}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000140)={'ip6_vti0\x00', 0x100000000}) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000040)=""/99) 00:00:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x30, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:45 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x400000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:45 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00`\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:45 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x9101}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:45 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:45 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) 00:00:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x6000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:45 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xff00}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:45 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572001100", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x500, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:45 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xffffffeb, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:45 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x9effffff}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:45 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000040)="7bce4d3a988aa0a7bf258bb05ca3a61f2303f20bec4d9d5313c782bc793cec3a4aa9aaf78b3e97f6a7c564629966419ebce113345654c9d8559aa2029eaa94aa776691f17d529a140da3447888ffdebe987467c5906a4ad775800f1f57a9c1ebe089bc2bfd022b0a781c9c816e216aefb264cdbbb75d6a52c1d2c77227596f38a5172847d44587600a9ba8", 0x8b) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:45 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465720000000500", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x7ffffff7, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x9, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:45 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00 \x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:45 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:45 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xffffff7f}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:45 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xebffffff00000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x900000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:45 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) syz_open_procfs(r1, &(0x7f0000000140)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:45 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000008800", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xa000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:45 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x40000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x6000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:46 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x8}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:46 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sync_file_range(r0, 0xfffffffffffff20a, 0x0, 0x4) dup3(r0, r0, 0x80000) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rpc\x00') ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0x0, 0x3ff]) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x5) 00:00:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x3e8, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:46 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:46 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x5000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:46 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x300000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xa00000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:46 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x800, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='bpf\x00', 0x200e, &(0x7f0000000380)={[{@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x30d6aa6a}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0xe89}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x6}}], [{@smackfshat={'smackfshat', 0x3d, 'self'}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}, {@uid_lt={'uid<', r2}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@fowner_gt={'fowner>', r3}}]}) syz_open_procfs(r1, &(0x7f0000000140)='net/sctp\x00') sysinfo(&(0x7f0000000500)=""/52) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:46 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000000600", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) [ 287.790460] syz-executor3 (13493) used greatest stack depth: 8328 bytes left 00:00:46 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x2ba}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x500000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:46 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') write$P9_RXATTRCREATE(r0, &(0x7f0000000040)={0x7, 0x21, 0x2}, 0x7) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:46 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xb0000000000c78b}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x1a0ffffffff, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 287.974336] device bridge_slave_1 left promiscuous mode [ 287.980044] bridge0: port 2(bridge_slave_1) entered disabled state 00:00:46 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xf01f0000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 288.032491] device bridge_slave_0 left promiscuous mode [ 288.038090] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.096937] IPVS: ftp: loaded support on port[0] = 21 [ 288.153521] team0 (unregistering): Port device team_slave_1 removed [ 288.179088] team0 (unregistering): Port device team_slave_0 removed [ 288.193032] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 288.239722] bond0 (unregistering): Releasing backup interface bond_slave_0 00:00:47 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:47 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() gettid() r0 = gettid() syz_open_procfs(r0, &(0x7f0000000000)='Ngroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 288.321688] bond0 (unregistering): Released all slaves 00:00:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x30000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:47 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x8000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:47 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x800000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 289.266111] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.272652] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.279893] device bridge_slave_0 entered promiscuous mode [ 289.304224] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.310657] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.318043] device bridge_slave_1 entered promiscuous mode [ 289.353156] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 289.377304] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 289.443613] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 289.468797] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 289.494544] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 289.501401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 289.525691] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 289.533004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 289.597888] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 289.605102] team0: Port device team_slave_0 added [ 289.626883] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 289.634166] team0: Port device team_slave_1 added [ 289.657033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 289.681364] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 289.705753] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 289.713528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.721393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 289.745152] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 289.752391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 289.760237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 289.967056] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.973602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.980192] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.986610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.993996] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 290.532046] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.703147] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.774405] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 290.842996] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 290.849166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.856612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.924703] 8021q: adding VLAN 0 to HW filter on device team0 00:00:50 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c74657200000600", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x11000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x34000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:50 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x8000, 0x3, [0x4, 0x100000001, 0x8354]}, &(0x7f0000000140)=0xe) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={r1, 0x1000, 0x5}, &(0x7f0000000240)=0x8) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) write$P9_RLCREATE(r0, &(0x7f0000000280)={0x18, 0xf, 0x2, {{0x2, 0x0, 0x1}, 0x1}}, 0x18) connect(r0, &(0x7f0000000040)=@in6={0xa, 0x4e23, 0x8000, @ipv4={[], [], @rand_addr}, 0x40}, 0x80) 00:00:50 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x820f1b000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:50 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b667303", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xfe80, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x8bc700000000000b}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:50 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000200", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:50 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00`\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:50 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xff00000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40030000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) ioctl$TIOCNOTTY(r0, 0x5422) 00:00:50 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00`\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x554, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:50 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 291.589311] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xfc000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:50 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c74657200000000000000000400", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:50 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000000300", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x600}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x700000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:50 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b6673fe", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:50 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000000200", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:50 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xfc}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x10000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, 0x8, {0x7, 0x1b, 0x6, 0x100800, 0x400, 0x4, 0x400, 0x80}}, 0x50) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000140)) 00:00:50 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xfffffff4, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:51 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572001100", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:51 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xa0010000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xf5ffffff, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:51 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c74657200000000000000000200", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:51 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xf4ffffff00000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:51 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\n', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:51 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c74657200000000000000000600", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:51 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xfffffffffffff000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x1f4, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:51 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) getpgrp(r1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) capget(&(0x7f00000000c0)={0x20080522, r2}, &(0x7f0000000140)={0x8, 0x7, 0x7ff, 0x84a1, 0x8, 0x7f}) r3 = getpgrp(0xffffffffffffffff) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x5, 0x0, 0x100, 0x7, 0x1, 0x0, 0x1ff}, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:51 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:51 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:51 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x900000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x600000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:51 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00\x00`\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 292.484706] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:51 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xffffff7f00000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x3f00000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:51 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\a\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:51 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x3f000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:51 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8a6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:51 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572008800", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xeffdffff00000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:51 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x10000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:51 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x8dffffff00000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:51 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xba020000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:51 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00\x00?\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:51 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x300, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000080)={0xe, 0x10000004, 0x1}) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000140)={[], 0x5, 0x0, 0x344, 0x0, 0x12c, 0x1000, 0xf000}) 00:00:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x100000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:51 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x9}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:52 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000000500", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:52 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgid(0xffffffffffffffff) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='net/igmp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x4000000) ioprio_set$pid(0x0, 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f00000002c0)) write$cgroup_pid(r0, &(0x7f0000000240)=r1, 0x12) syz_open_procfs(r1, &(0x7f0000000140)='net/protocols\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L-', 0xffffffffffffff81}, 0x28, 0x2) 00:00:52 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x9101000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:52 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xffffffff00000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 293.282402] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:52 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x1a0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:52 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00\x00 \x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:00:52 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x6000000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:52 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x11000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:52 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c74657200000500", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 293.634187] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x4000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:52 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00 \x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:52 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x2000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:52 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141041, 0x22cd0707be8a092a) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040)=0x2, 0x4) clone(0x2, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) setxattr$security_ima(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000200)=@v2={0x7, 0x1, 0x5, 0x100000000, 0xf8, "5414eb4108746bca4d8d319a802eb5f27c124fd01edfdc70b74ff8173e0f6319018a75d7bc656cb75184f755bc8cb9eb38e3f431f8e775d5c89daea8d65ee3bcb2b38468a422b78f0685f1f21cc46c34974e82e5fe858538c2d7a6065852b2471bce4f0495f36512fb7005c95b190bd56a9e7dde3657b196a6c9f2ec841a6dbffb5a347584d5761cf655039cd3089c8590940e83f8459b3c30fdb41c286a1d44cf7fd34900b2a228cf5e6c5e2ff65e2a22ca0ceb395bd86d1cf87567abff804b8e7d2870b70ae45143a458bc7ec96e58d375e30e9277fa42840eb789af25b7837b8c19c79247089d8c9bb49bbf23959b3e63f4d96f5b2964"}, 0x102, 0x0) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000340)={0x5, 0x0, [{0x6, 0x6, 0x7, 0x8, 0x5, 0x75, 0x8}, {0xc000000b, 0xfff, 0x7, 0xce, 0x1f, 0x5, 0x7}, {0xc0000001, 0x1000, 0x1, 0x3, 0x5, 0x10001}, {0x4, 0x800, 0x4, 0x7, 0x6, 0xfffffffffffff800, 0x7}, {0x1, 0x80000001, 0x1, 0x101, 0x9c, 0xf4, 0x3}]}) socket$pptp(0x18, 0x1, 0x2) 00:00:52 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c74657200001100", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x11, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:52 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:52 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xfc00}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xffffff8d, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:52 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xf6ffffff, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:52 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000500", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:52 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xf00}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x6, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:52 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000140)='./bus\x00', &(0x7f0000000380)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x158, 0x6, 0xf, 0x0, 0x70bd27, 0x25dfdbfd, {0x7, 0x0, 0x4}, [@generic="9e7facf25c6d9f3060923a916e4268770722de540fd3c1da565d938fc8aba0cb50002b25e86ad9a9f484bfc2cdb81f74af9152c7052b95f0aa55673be61551f67c152e3a234f69d250710728470cbb8fc7221ffa88e73087f69538684ef0a5a434b14b455d370cdba1c9016fe260e6dcac4b8560520e3b0d1d44b0e73c048ae0229b6dcb4d8e0accd323f7c5c965a81223b6f3e05ea5ecad55ffcea11d5c44860e6928eb64cd8b37dc9bf34ee4310dba18130fd32b7479f8cd6d65", @generic="3f29a9521a00cc2edadd86df21bd67b4fd34a78e2250d8c2b31497df83511f52c46f609c2af15e1658304d515d3ac6296e747bece8a0be32d2ee6e11f4ab15b0fe2ce4e88347ec", @generic="de9429b727ecd6d328ba78225a086c1f7cef0f6201254c4cc84bc736108d9c303229d3779e5b229b0ed40fe2af988f912c7011d98a600027113c2d0762c44e2a8be9"]}, 0x158}, 0x1, 0x0, 0x0, 0x40800}, 0x20000800) 00:00:52 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c74657200000000000000000500", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x3000000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:52 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xa00}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:53 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x500000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:53 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b6673ff", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:53 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c74657200000000000000000300", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 294.211714] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:00:53 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1f000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:53 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xf}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x1100, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:53 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xffffffffa0010000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:53 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r0, 0x11, 0x3}, 0x14) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:53 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)="736f636b667385", 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:53 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x20000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x300, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:53 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xfe800000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xfffffff5, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:53 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x40, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x4, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:53 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:53 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x191}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:53 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000000400", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:53 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='p\x00\x00\x00\x00\x00\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:54 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x800000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 295.251382] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 295.319710] IPVS: ftp: loaded support on port[0] = 21 00:00:54 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:54 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x60590100000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x6000000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:54 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000080)=0x7f) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x10001, @loopback, 0xdb6}, 0x1c) 00:00:54 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x91010000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xfe80000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 295.519678] EXT4-fs (sda1): resizing filesystem from 524032 to 127 blocks [ 295.529348] device bridge_slave_1 left promiscuous mode [ 295.535578] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.540572] EXT4-fs warning (device sda1): ext4_resize_fs:1930: can't shrink FS - resize aborted [ 295.592673] device bridge_slave_0 left promiscuous mode [ 295.598282] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.664075] EXT4-fs (sda1): resizing filesystem from 524032 to 127 blocks [ 295.680000] EXT4-fs warning (device sda1): ext4_resize_fs:1930: can't shrink FS - resize aborted [ 295.713314] team0 (unregistering): Port device team_slave_1 removed [ 295.742471] team0 (unregistering): Port device team_slave_0 removed [ 295.751986] bond0 (unregistering): Releasing backup interface bond_slave_1 00:00:54 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 295.767007] IPVS: ftp: loaded support on port[0] = 21 [ 295.780339] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 295.833061] bond0 (unregistering): Released all slaves [ 296.668818] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.680218] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.687688] device bridge_slave_0 entered promiscuous mode [ 296.724012] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.730527] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.737630] device bridge_slave_1 entered promiscuous mode [ 296.770343] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 296.792423] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.798898] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.806016] device bridge_slave_0 entered promiscuous mode [ 296.825465] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 296.839031] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.845547] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.853087] device bridge_slave_1 entered promiscuous mode [ 296.893309] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 296.934796] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 296.947812] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 296.988402] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 297.050615] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 297.061682] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 297.069378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 297.094947] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 297.135279] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 297.142857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 297.175838] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 297.183036] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 297.194444] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 297.201714] team0: Port device team_slave_0 added [ 297.207980] device bridge_slave_1 left promiscuous mode [ 297.214332] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.252416] device bridge_slave_0 left promiscuous mode [ 297.257870] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.325298] team0 (unregistering): Port device team_slave_1 removed [ 297.333910] team0 (unregistering): Port device team_slave_0 removed [ 297.342307] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 297.375073] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 297.431695] bond0 (unregistering): Released all slaves [ 297.496847] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 297.505318] team0: Port device team_slave_1 added [ 297.542237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 297.582766] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 297.596845] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 297.604318] team0: Port device team_slave_0 added [ 297.617600] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 297.625182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.638655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 297.662071] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 297.669392] team0: Port device team_slave_1 added [ 297.677180] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 297.686748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.696545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 297.752902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 297.810768] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 297.853231] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 297.860372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.876502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 297.915909] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 297.923772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.939655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 298.321046] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.327457] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.334148] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.340502] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.352476] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 298.426540] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.432967] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.439592] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.445992] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.453964] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 299.081902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 299.089338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 299.707794] 8021q: adding VLAN 0 to HW filter on device bond0 [ 299.748433] 8021q: adding VLAN 0 to HW filter on device bond0 [ 299.832289] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 299.868217] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 299.970672] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 299.977366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 299.984768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 299.994913] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 300.001030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 300.015453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.111508] 8021q: adding VLAN 0 to HW filter on device team0 [ 300.129465] 8021q: adding VLAN 0 to HW filter on device team0 00:00:59 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c74657200008800", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:00:59 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xa0010000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:59 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xf0ffffff}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:59 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000040)='./bus\x00', 0x80000004) inotify_rm_watch(r0, r1) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:00:59 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x0, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:00:59 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xfec00000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:00:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x5000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:00:59 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00\x00\a\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:00 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6e1d}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) ioctl$NBD_SET_SIZE(r2, 0xab02, 0x1) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)=r0) 00:01:00 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x400300}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x100000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:00 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000001100", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:00 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7f4386aef000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:01:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x54050000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:00 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x3f4}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:00 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c74657200000000007fffffff00", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xa, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:00 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000000000100", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:00 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xfffff000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:00 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0xa, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:01:00 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e21, 0x40, @ipv4={[], [], @remote}, 0xbf}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000700)={0x0, 0x51, "c70e34d55f5357efc6ee103d3b15f66be87fbf684865553d0b12c03915ee6c998401faa127c3af860d95b4b08f300d0f4dfff653a795191b325e1e21dc4ad76286ecda5c0f7590057df6a781ff78d7e48c"}, &(0x7f0000000140)=0x59) accept4$packet(r0, &(0x7f0000000880)={0x11, 0x0, 0x0}, &(0x7f00000008c0)=0x14, 0x80800) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000900)={@dev={0xfe, 0x80, [], 0x20}, r4}, 0x14) sendmmsg$inet_sctp(r1, &(0x7f0000000840)=[{&(0x7f0000000040)=@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000080)="0b8054", 0x3}, {&(0x7f0000000200)="b1866d161199c2093a5aa777fafb5990688917d6661da1286c90953cc019ec75e0a0ee3be39601cf280eb2b037d4237f49987b89abeae7e81c40f4261626a17eba", 0x41}, {&(0x7f0000000280)="4fb000fd54b297b875df913b4673a844629af9c86834c1ceb620d2ba7b3e7741fd8692ec1dd1ee3502f1a8f1e0b785e29cc862e7dc845c5bdfa44c4fd67d786f147830cdebb830166acb8d4ca76c20dfd5a3b05698332d0eeb15cc6d9b354b1d6f30e3fab0507123410003cf34b71e2d8a5656b3ed4c57ade439c9722952b96e7739ed8513e4a4a91916c381bec013c4e63700b713b16f8756545d0f04eb569e576e643f232ad9f295f7d7742b6107e957bb43e098bb48616a7f11f739b9f8d7427875a44f36da7c16fe", 0xca}, {&(0x7f0000000380)="a5b0ed9c1a1d0ec354d5df77f2112e345521177ff1fb4c61bb0281f2925028e578e09e0cb7000da9c53c423dad9a6b6b3dc74dacd794a4e7e10670c838dd9e04a02b38f620820cb427095e60ba02bd1a10fe251d8897a7fdbe192e6fa6a1209a7b14f0fe1cc6659a4228a0be146ff3de5f969ca68d20da765a885f46697e9040b420d370442bc5085fa7013e7e269c276096df3daa", 0x95}, {&(0x7f0000000440)="5a2e35cd96bdde70623b0442f54ed2a1a629ba7918dfee263c7660b05075735b4af6546c11c06f28e5539abfc1d3866365df0f9b3bccd18b45656822df966dbbb3280967db4fd4294f6c18705e73a000493ef40ce1e4a2024aa87faae0f2694b6fcb5970648609a83b10b6d5b9295824ac0229f4d0854ec1bd5bb5c47fb73122290f1b6777144cec431b630bad3c9bc55329e81d3ab64f6b80a411f833f3a6009ab5604de0539bd6a59cc870400b67a7f2615bb28c798e2471b73cd1b82abc675c9e0459b94a6a4631e66442beb1043793fbda485b1c82c089b6f78600ebee734df25f74e194", 0xe6}, {&(0x7f0000000540)="e942868e763d1a6b819f85e7e83931d67e6f8370418078a0171ce1cfb96d10d0a5f87a36732635a828e5569f51391de8a3398ad5e16ba48fdc2cab2109bfa6ab1e1329133851f7b8a6d5f9b86096eda0546712ef8ebe3f937b", 0x59}], 0x6, &(0x7f0000000780)=[@sndinfo={0x20, 0x84, 0x2, {0x10001, 0x2, 0x0, 0x1, r2}}, @dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0xd}}, @dstaddrv6={0x20, 0x84, 0x8, @loopback}, @sndrcv={0x30, 0x84, 0x1, {0x3, 0x9, 0x20f, 0x6, 0x63, 0x1000, 0x0, 0x9, r3}}], 0x88, 0x4000000}], 0x1, 0x8080) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:01:00 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00`\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xa00, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:00 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x60000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:00 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x8a03}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:00 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c74657200000300", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x900, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:00 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:01:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000080)={'broute\x00', 0x0, 0x4, 0xf8, [], 0x9, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)=""/248}, &(0x7f0000000140)=0x78) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 00:01:00 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000600", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:01:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x3f000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:01 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000300", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:01 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x40030000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x800000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:01 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2400) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000080)={{0x3, 0x1, 0x9a4f, 0x3, 0x5}, 0x8d15, 0x6, 0x7fffffff}) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x32, 0xffffffffffff8001}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000240)={r2, 0x5}, 0x8) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000280), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:01:01 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x318, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:01:01 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x8cffffff, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:01:01 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c74657200000000000000008800", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xffffffff00000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 302.175037] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:01:01 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572007fffffff00", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:01 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x300000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x8dffffff, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:01 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) [ 302.321114] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:01:01 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x600000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:01 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:01:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x5405, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:01 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x10d003, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x20000002, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 302.440944] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:01:01 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x2000000000000000, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:01:01 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\a\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) 00:01:01 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xa00000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xe803000000000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:01 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./bus\x00', 0x6, 0x2) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000280)) 00:01:01 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xffffff7f, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:01:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xf7ffff7f00000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:01 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xba02000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) [ 302.769835] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:01:01 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x4000000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x1000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 302.832985] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:01:01 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00?\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:01 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x8000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) [ 302.940727] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:01:02 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x2000000, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:01:02 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c746572000400", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:02 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x4}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:02 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) signalfd4(r0, &(0x7f0000000080)={0xbd0c00000000}, 0x8, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0xd) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f00000000c0)={0x1d, @broadcast, 0x4e20, 0x4, 'sed\x00', 0x3d, 0x1, 0x3a}, 0x2c) 00:01:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x80000020, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:02 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3f00, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:01:02 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xff01, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:02 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x4000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:02 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c74657200000000000000001100", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:02 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:01:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x3000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:02 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x1fffff, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:01:02 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x1000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:02 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x10001, 0x80) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000002c0), 0x2) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x400000, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)=0x0) syz_open_procfs(r2, &(0x7f0000000140)='cgroup\x00') openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400000, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:01:02 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c74657200000000000000000100", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x34000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:02 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x600000000000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:01:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x7, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:02 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xba02}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:02 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465720000000000000000008800", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:03 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xf403000000000000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:03 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c7465720000000000000000000100", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff00000000000000000000000000000000000000000000000000dfff0000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001500000000000000000073797a5f74756e00000000000000000079616d30000000000000000000000000626f6e645f736c6176655f310000000073697430000000000000000000000000aaaaaaaaaa000000000000000180c20000000000000000000000e8000000e8000000180100006c696d6974000000000000000000000000000000000000000000000000000000200000000000000000001000010400000000000000000000000000000000000000000000000000003830325f4c0000000000000000000000000000000000000000000000000000000800000000000000000000000000000041554449540000b827d85034bb5ec6a300000000000000000000000000000000000000000000000000166d6681000000"]}, 0x220) [ 304.201370] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 00:01:03 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0xffffffffa0010000, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:01:03 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x1a0ffffffff}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x3000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:03 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xf01f00, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:01:03 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={"66696c74657200000000000500", 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:03 executing program 2: r0 = open(&(0x7f0000001300)='./bus\x00', 0x27ff, 0x1000000080) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)='./bus\x00', 0x400, 0x3, &(0x7f00000014c0)=[{&(0x7f0000000300)="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", 0x1000, 0xffffffff7fffffff}, {&(0x7f0000001540)="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", 0xfb, 0x7}, {&(0x7f0000001400)="15c738234772114129c67d08007cb03822e9047ce079a58363413a98ee098e3bf091d469cc7effd226ce8dc7b0e55d8997e188ef23589a0832bec5f602f504b0748016b3184fc239b3e0ce311d0d8c911aaa49289e46f49d33e00b6c75565518464fc945a9ec60cadfc8defa423abdb7e707a05317defe2cf85f7b906b25782c34ceaab8617bc0", 0x87, 0x4}], 0x308858, &(0x7f0000000140)='!md5sum)!\\ppp0em1\x00') clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="7365637572697479000000f7fe000000000000000000000000000000000000000000b000000097b94087f41d8ab3e2cb3999f62a6b49ecbfbcc06b8bc136a615b0c24d0d6ea06ecbd82fb3e08d579b141295114b723aa4f7d0cb985e44f5e99f84513ccb25321cf98a1b5c612831c256cc0f148a60c807fca29d89525bad73dedc37395d7a4a97aa4f12f9a475ae259af2f3fb1dfc591118e1c88801c58d9474f521e2d5ed9ba202fe47c4be8a31f154ff753f036a2abcf8990c56a468b76478740bc63cc488c0092340b480272bb50be2ba00f1"], &(0x7f0000000040)=0xd4) 00:01:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x9000000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:03 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:01:03 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xf0}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:03 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00\x00\x00\x00 \x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:03 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x3}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0xffffffffa0010000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:04 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='sockfs\x00', 0x86, &(0x7f0000000000)='\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) 00:01:04 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x7}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:04 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000080)={'nat\x00', 0x0, 0x4, 0x1000, [], 0x3, &(0x7f0000000040)=[{}, {}, {}], &(0x7f0000000200)=""/4096}, &(0x7f0000000140)=0x78) 00:01:04 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x5000000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:01:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0x9, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:04 executing program 5: r0 = socket(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00\x00`\x00', 0xe, 0x1, 0x1a8, [0x0, 0x20000180, 0x200001b0, 0x200001e0], 0x0, &(0x7f00000000c0), &(0x7f0000000180)=ANY=[@ANYBLOB="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"]}, 0x220) 00:01:04 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234418dc25d766070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0xf4030000}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)="5500000018007f7000fe01b2a4a280930a60050000a84302910000003900090023000c000b0000001b0005000b0000000000c78b80082314e9030b9d566885b16732009b1400b1df136ef75afb0000000000000000", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 00:01:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0x3, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 305.401919] ================================================================== [ 305.409514] BUG: KASAN: use-after-free in _free_event+0x49a/0x1610 [ 305.415840] Write of size 4 at addr ffff88018922c420 by task syz-executor0/15496 [ 305.423374] [ 305.423391] CPU: 0 PID: 15496 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #44 [ 305.423398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.423401] Call Trace: [ 305.423427] dump_stack+0x1c4/0x2b4 [ 305.423444] ? dump_stack_print_info.cold.2+0x52/0x52 [ 305.423461] ? printk+0xa7/0xcf [ 305.432367] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 305.432388] print_address_description.cold.8+0x9/0x1ff [ 305.432404] kasan_report.cold.9+0x242/0x309 [ 305.456433] ? _free_event+0x49a/0x1610 [ 305.466552] check_memory_region+0x13e/0x1b0 [ 305.474916] kasan_check_write+0x14/0x20 [ 305.474930] _free_event+0x49a/0x1610 [ 305.474942] ? kasan_check_read+0x11/0x20 [ 305.474960] ? ring_buffer_attach+0x840/0x840 [ 305.491355] ? __perf_remove_from_context+0x1ec/0x470 [ 305.501035] ? do_raw_spin_lock+0xc1/0x200 [ 305.501051] ? kasan_check_write+0x14/0x20 [ 305.501071] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 305.509529] ? event_function_call+0x343/0x600 [ 305.509552] ? wait_for_completion+0x8a0/0x8a0 [ 305.523632] ? event_sched_out.isra.98+0xdf0/0xdf0 [ 305.528577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.528591] ? get_ctx+0x218/0x300 [ 305.528608] free_event+0xb4/0x180 [ 305.541247] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 305.546714] ? _free_event+0x1610/0x1610 [ 305.550794] perf_event_release_kernel+0x7d8/0xfa0 [ 305.555738] ? put_event+0x60/0x60 [ 305.559290] ? mark_held_locks+0x130/0x130 [ 305.563528] ? kasan_check_read+0x11/0x20 [ 305.567684] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 305.572969] ? rcu_bh_qs+0xc0/0xc0 [ 305.576519] ? unwind_dump+0x190/0x190 [ 305.580420] ? kernel_text_address+0x79/0xf0 [ 305.580439] ? unwind_get_return_address+0x61/0xa0 [ 305.589781] ? __save_stack_trace+0x8d/0xf0 [ 305.589803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.589821] ? fsnotify+0xaae/0x12f0 [ 305.603390] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 305.608940] ? locks_remove_file+0x3c6/0x5c0 [ 305.613370] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 305.618922] ? ima_file_free+0x132/0x650 [ 305.622994] ? kmem_cache_free+0x83/0x290 [ 305.627165] ? fsnotify_first_mark+0x350/0x350 [ 305.631756] ? ima_file_check+0x130/0x130 [ 305.635915] ? fsnotify+0x12f0/0x12f0 [ 305.639723] ? trace_hardirqs_off+0xb8/0x310 [ 305.644158] ? perf_event_release_kernel+0xfa0/0xfa0 [ 305.645147] IPVS: ftp: loaded support on port[0] = 21 [ 305.649270] perf_release+0x37/0x50 [ 305.649284] __fput+0x385/0xa30 [ 305.649299] ? get_max_files+0x20/0x20 [ 305.649318] ? trace_hardirqs_on+0xbd/0x310 [ 305.669593] ? kasan_check_read+0x11/0x20 [ 305.673750] ? task_work_run+0x1af/0x2a0 [ 305.677826] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 305.683289] ? kasan_check_write+0x14/0x20 [ 305.687540] ? do_raw_spin_lock+0xc1/0x200 [ 305.691783] ____fput+0x15/0x20 [ 305.695070] task_work_run+0x1e8/0x2a0 [ 305.698967] ? task_work_cancel+0x240/0x240 [ 305.703304] ? switch_task_namespaces+0xb8/0xd0 [ 305.707987] do_exit+0x1ad7/0x2610 [ 305.711535] ? __put_cred+0x28c/0x360 [ 305.715350] ? mm_update_next_owner+0x990/0x990 [ 305.720028] ? prepare_creds+0x4d0/0x4d0 [ 305.724099] ? kasan_check_write+0x14/0x20 [ 305.728361] ? do_raw_spin_lock+0xc1/0x200 [ 305.732605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.738160] ? do_coredump+0x477/0x4001 [ 305.742244] ? unwind_get_return_address+0x61/0xa0 [ 305.747192] ? __save_stack_trace+0x8d/0xf0 [ 305.751534] ? dump_align+0xa0/0xa0 [ 305.755172] ? save_stack+0xa9/0xd0 [ 305.758808] ? save_stack+0x43/0xd0 [ 305.762486] ? __kasan_slab_free+0x102/0x150 [ 305.766940] ? kasan_slab_free+0xe/0x10 [ 305.770937] ? kmem_cache_free+0x83/0x290 [ 305.775100] ? __sigqueue_free.part.27+0x7d/0xa0 [ 305.779897] ? __dequeue_signal+0x530/0x7d0 [ 305.784226] ? dequeue_signal+0xbd/0x630 [ 305.788297] ? get_signal+0x3ec/0x1980 [ 305.792188] ? do_signal+0x9c/0x21e0 [ 305.795914] ? exit_to_usermode_loop+0x2e5/0x380 [ 305.800682] ? prepare_exit_to_usermode+0x342/0x3b0 [ 305.805726] ? trace_hardirqs_off+0xb8/0x310 [ 305.810150] ? kasan_check_read+0x11/0x20 [ 305.814309] ? do_raw_spin_unlock+0xa7/0x2f0 [ 305.818741] ? trace_hardirqs_on+0x310/0x310 [ 305.823162] ? kasan_check_write+0x14/0x20 [ 305.827431] ? check_preemption_disabled+0x48/0x200 [ 305.832464] ? trace_hardirqs_off+0xb8/0x310 [ 305.836911] ? __kasan_slab_free+0x119/0x150 [ 305.841336] ? __sigqueue_free.part.27+0x7d/0xa0 [ 305.846103] ? kmem_cache_free+0x21a/0x290 00:01:04 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002240)={{{@in6=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000002340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000007700)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009140)={@mcast2}, &(0x7f0000009180)=0x14) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1b0f820000, &(0x7f0000000200), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)) 00:01:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0x7, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) 00:01:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0x6, 0x4e20, 0x0, @mcast1, 0x7}, 0x1c) [ 305.850375] ? __sigqueue_free.part.27+0x7d/0xa0 [ 305.855143] ? __dequeue_signal+0xf9/0x7d0 [ 305.859395] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 305.864952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.870504] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.876064] ? proc_coredump_connector+0x4f8/0x630 [ 305.880981] ? lock_downgrade+0x900/0x900 [ 305.885116] ? proc_comm_connector+0x520/0x520 [ 305.889703] do_group_exit+0x177/0x440 [ 305.893594] ? __ia32_sys_exit+0x50/0x50 [ 305.897639] ? kasan_check_write+0x14/0x20 [ 305.901860] ? do_raw_spin_lock+0xc1/0x200 [ 305.906093] get_signal+0x8b0/0x1980 [ 305.910220] ? ptrace_notify+0x130/0x130 [ 305.914270] ? force_sig_info+0x281/0x310 [ 305.918416] ? force_sigsegv+0x3d/0x110 [ 305.922377] ? signal_setup_done+0xc1/0x2f0 [ 305.926691] ? set_current_blocked+0x40/0x40 [ 305.931105] do_signal+0x9c/0x21e0 [ 305.934656] ? setup_sigcontext+0x7d0/0x7d0 [ 305.938969] ? __bad_area_nosemaphore+0x311/0x3f0 [ 305.943811] ? bad_area+0x69/0x80 [ 305.947262] exit_to_usermode_loop+0x2e5/0x380 [ 305.951832] ? syscall_slow_exit_work+0x520/0x520 [ 305.956659] ? trace_hardirqs_off_caller+0xbb/0x310 [ 305.961658] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.966483] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.971315] prepare_exit_to_usermode+0x342/0x3b0 [ 305.976172] ? trace_event_raw_event_sys_enter+0x700/0x700 [ 305.981799] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.986644] ? page_fault+0x8/0x30 [ 305.990186] retint_user+0x8/0x18 [ 305.993635] RIP: 0033: (null) [ 305.997536] Code: Bad RIP value. [ 306.000887] RSP: 002b:0000000020000208 EFLAGS: 00010217 [ 306.006248] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000457579 [ 306.013505] RDX: 0000000020000000 RSI: 0000000020000200 RDI: 0000000005000000 [ 306.020765] RBP: 000000000072bf00 R08: 0000000020000140 R09: 0000000000000000 [ 306.028039] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f5eb832f6d4 [ 306.035303] R13: 00000000004bd9fa R14: 00000000004cc448 R15: 00000000ffffffff [ 306.042899] [ 306.044511] Allocated by task 15489: [ 306.048211] save_stack+0x43/0xd0 [ 306.051650] kasan_kmalloc+0xc7/0xe0 [ 306.055364] kasan_slab_alloc+0x12/0x20 [ 306.059338] kmem_cache_alloc_node+0x144/0x730 [ 306.063928] copy_process+0x1ff4/0x8780 [ 306.067909] _do_fork+0x1cb/0x11d0 [ 306.071466] __x64_sys_clone+0xbf/0x150 [ 306.075448] do_syscall_64+0x1b9/0x820 [ 306.079345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.084532] [ 306.086145] Freed by task 15489: [ 306.089510] save_stack+0x43/0xd0 [ 306.092945] __kasan_slab_free+0x102/0x150 [ 306.097175] kasan_slab_free+0xe/0x10 [ 306.100959] kmem_cache_free+0x83/0x290 [ 306.104924] free_task+0x16e/0x1f0 [ 306.108458] copy_process+0x1d9a/0x8780 [ 306.112416] _do_fork+0x1cb/0x11d0 [ 306.115947] __x64_sys_clone+0xbf/0x150 [ 306.119905] do_syscall_64+0x1b9/0x820 [ 306.123778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.128942] [ 306.130554] The buggy address belongs to the object at ffff88018922c400 [ 306.130554] which belongs to the cache task_struct(17:syz0) of size 6080 [ 306.144085] The buggy address is located 32 bytes inside of [ 306.144085] 6080-byte region [ffff88018922c400, ffff88018922dbc0) [ 306.155980] The buggy address belongs to the page: [ 306.160911] page:ffffea0006248b00 count:1 mapcount:0 mapping:ffff8801d54d3b40 index:0x0 compound_mapcount: 0 [ 306.170900] flags: 0x2fffc0000008100(slab|head) [ 306.175580] raw: 02fffc0000008100 ffffea0007605808 ffffea000624bd88 ffff8801d54d3b40 [ 306.183446] raw: 0000000000000000 ffff88018922c400 0000000100000001 ffff8801878e8200 [ 306.191306] page dumped because: kasan: bad access detected [ 306.196997] page->mem_cgroup:ffff8801878e8200 [ 306.201485] [ 306.203091] Memory state around the buggy address: [ 306.208001] ffff88018922c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 306.215343] ffff88018922c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 306.222700] >ffff88018922c400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 306.230035] ^ [ 306.234422] ffff88018922c480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 306.241791] ffff88018922c500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 306.249151] ================================================================== [ 306.293472] Kernel panic - not syncing: panic_on_warn set ... [ 306.293472] [ 306.295628] kobject: 'erspan0' (00000000d22eb34d): kobject_add_internal: parent: 'net', set: 'devices' [ 306.300906] CPU: 1 PID: 15496 Comm: syz-executor0 Tainted: G B 4.19.0-rc6+ #44 [ 306.300913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.300923] Call Trace: [ 306.311439] kobject: 'erspan0' (00000000d22eb34d): kobject_uevent_env [ 306.319041] dump_stack+0x1c4/0x2b4 [ 306.319060] ? dump_stack_print_info.cold.2+0x52/0x52 [ 306.319077] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 306.319094] panic+0x238/0x4e7 [ 306.339360] kobject: 'erspan0' (00000000d22eb34d): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 306.342217] ? add_taint.cold.5+0x16/0x16 [ 306.342234] ? preempt_schedule+0x4d/0x60 [ 306.342249] ? ___preempt_schedule+0x16/0x18 [ 306.342267] ? trace_hardirqs_on+0xb4/0x310 [ 306.347556] kobject: 'queues' (000000003baf95b6): kobject_add_internal: parent: 'erspan0', set: '' [ 306.352199] kasan_end_report+0x47/0x4f [ 306.352213] kasan_report.cold.9+0x76/0x309 [ 306.352232] ? _free_event+0x49a/0x1610 [ 306.355441] kobject: 'queues' (000000003baf95b6): kobject_uevent_env [ 306.365026] check_memory_region+0x13e/0x1b0 [ 306.365039] kasan_check_write+0x14/0x20 [ 306.365052] _free_event+0x49a/0x1610 [ 306.365063] ? kasan_check_read+0x11/0x20 [ 306.365081] ? ring_buffer_attach+0x840/0x840 [ 306.381830] kobject: 'queues' (000000003baf95b6): kobject_uevent_env: filter function caused the event to drop! [ 306.382097] ? __perf_remove_from_context+0x1ec/0x470 [ 306.391717] kobject: 'rx-0' (000000005c2c7d38): kobject_add_internal: parent: 'queues', set: 'queues' [ 306.395669] ? do_raw_spin_lock+0xc1/0x200 [ 306.395684] ? kasan_check_write+0x14/0x20 [ 306.395697] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 306.395707] ? event_function_call+0x343/0x600 [ 306.395721] ? wait_for_completion+0x8a0/0x8a0 [ 306.395735] ? event_sched_out.isra.98+0xdf0/0xdf0 [ 306.395757] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.408420] kobject: 'rx-0' (000000005c2c7d38): kobject_uevent_env [ 306.410517] ? get_ctx+0x218/0x300 [ 306.418382] kobject: 'rx-0' (000000005c2c7d38): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 306.418971] free_event+0xb4/0x180 [ 306.426300] kobject: 'tx-0' (00000000648a5804): kobject_add_internal: parent: 'queues', set: 'queues' [ 306.426916] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 306.431549] kobject: 'tx-0' (00000000648a5804): kobject_uevent_env [ 306.441601] ? _free_event+0x1610/0x1610 [ 306.441622] perf_event_release_kernel+0x7d8/0xfa0 [ 306.441647] ? put_event+0x60/0x60 [ 306.459067] kobject: 'tx-0' (00000000648a5804): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 306.460411] ? mark_held_locks+0x130/0x130 [ 306.480314] kobject: 'ip_vti0' (0000000099c4d4c9): kobject_add_internal: parent: 'net', set: 'devices' [ 306.483622] ? kasan_check_read+0x11/0x20 [ 306.483647] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 306.483665] ? rcu_bh_qs+0xc0/0xc0 [ 306.493415] kobject: 'ip_vti0' (0000000099c4d4c9): kobject_uevent_env [ 306.495505] ? unwind_dump+0x190/0x190 [ 306.499038] kobject: 'ip_vti0' (0000000099c4d4c9): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 306.509412] ? kernel_text_address+0x79/0xf0 [ 306.509427] ? unwind_get_return_address+0x61/0xa0 [ 306.509444] ? __save_stack_trace+0x8d/0xf0 [ 306.509464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.526457] kobject: 'queues' (00000000e5edbe8c): kobject_add_internal: parent: 'ip_vti0', set: '' [ 306.527812] ? fsnotify+0xaae/0x12f0 [ 306.538677] kobject: 'queues' (00000000e5edbe8c): kobject_uevent_env [ 306.543092] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 306.543107] ? locks_remove_file+0x3c6/0x5c0 [ 306.543122] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 306.543155] ? ima_file_free+0x132/0x650 [ 306.550122] kobject: 'queues' (00000000e5edbe8c): kobject_uevent_env: filter function caused the event to drop! [ 306.557093] ? kmem_cache_free+0x83/0x290 [ 306.557109] ? fsnotify_first_mark+0x350/0x350 [ 306.557123] ? ima_file_check+0x130/0x130 [ 306.557148] ? fsnotify+0x12f0/0x12f0 [ 306.565966] kobject: 'rx-0' (000000000a1cfcfd): kobject_add_internal: parent: 'queues', set: 'queues' [ 306.570848] ? trace_hardirqs_off+0xb8/0x310 [ 306.578105] kobject: 'rx-0' (000000000a1cfcfd): kobject_uevent_env [ 306.580251] ? perf_event_release_kernel+0xfa0/0xfa0 [ 306.580269] perf_release+0x37/0x50 [ 306.584009] kobject: 'rx-0' (000000000a1cfcfd): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 306.590376] __fput+0x385/0xa30 [ 306.590398] ? get_max_files+0x20/0x20 [ 306.594523] kobject: 'tx-0' (00000000a6b6849c): kobject_add_internal: parent: 'queues', set: 'queues' [ 306.603886] ? trace_hardirqs_on+0xbd/0x310 [ 306.603899] ? kasan_check_read+0x11/0x20 [ 306.603912] ? task_work_run+0x1af/0x2a0 [ 306.603927] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 306.603942] ? kasan_check_write+0x14/0x20 [ 306.608659] kobject: 'tx-0' (00000000a6b6849c): kobject_uevent_env [ 306.613285] ? do_raw_spin_lock+0xc1/0x200 [ 306.613314] ____fput+0x15/0x20 [ 306.613327] task_work_run+0x1e8/0x2a0 [ 306.613342] ? task_work_cancel+0x240/0x240 [ 306.613361] ? switch_task_namespaces+0xb8/0xd0 [ 306.617818] kobject: 'tx-0' (00000000a6b6849c): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 306.623195] do_exit+0x1ad7/0x2610 [ 306.623207] ? __put_cred+0x28c/0x360 [ 306.623224] ? mm_update_next_owner+0x990/0x990 [ 306.623239] ? prepare_creds+0x4d0/0x4d0 [ 306.633777] kobject: 'ip6_vti0' (000000006eeb0a52): kobject_add_internal: parent: 'net', set: 'devices' [ 306.636567] ? kasan_check_write+0x14/0x20 [ 306.636583] ? do_raw_spin_lock+0xc1/0x200 [ 306.636602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.644087] kobject: 'ip6_vti0' (000000006eeb0a52): kobject_uevent_env [ 306.648611] ? do_coredump+0x477/0x4001 [ 306.648636] ? unwind_get_return_address+0x61/0xa0 [ 306.653210] kobject: 'ip6_vti0' (000000006eeb0a52): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 306.658553] ? __save_stack_trace+0x8d/0xf0 [ 306.658574] ? dump_align+0xa0/0xa0 [ 306.662817] kobject: 'queues' (000000007445384a): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 306.672833] ? save_stack+0xa9/0xd0 [ 306.672845] ? save_stack+0x43/0xd0 [ 306.672856] ? __kasan_slab_free+0x102/0x150 [ 306.672866] ? kasan_slab_free+0xe/0x10 [ 306.672889] ? kmem_cache_free+0x83/0x290 [ 306.672908] ? __sigqueue_free.part.27+0x7d/0xa0 [ 306.677244] kobject: 'queues' (000000007445384a): kobject_uevent_env [ 306.681625] ? __dequeue_signal+0x530/0x7d0 [ 306.681644] ? dequeue_signal+0xbd/0x630 [ 306.681661] ? get_signal+0x3ec/0x1980 [ 306.685954] kobject: 'queues' (000000007445384a): kobject_uevent_env: filter function caused the event to drop! [ 306.689580] ? do_signal+0x9c/0x21e0 [ 306.689595] ? exit_to_usermode_loop+0x2e5/0x380 [ 306.689612] ? prepare_exit_to_usermode+0x342/0x3b0 [ 306.699158] kobject: 'rx-0' (000000000de61053): kobject_add_internal: parent: 'queues', set: 'queues' [ 306.703353] ? trace_hardirqs_off+0xb8/0x310 [ 306.703365] ? kasan_check_read+0x11/0x20 [ 306.703381] ? do_raw_spin_unlock+0xa7/0x2f0 [ 306.703398] ? trace_hardirqs_on+0x310/0x310 [ 306.709897] kobject: 'rx-0' (000000000de61053): kobject_uevent_env [ 306.714812] ? kasan_check_write+0x14/0x20 [ 306.714836] ? check_preemption_disabled+0x48/0x200 [ 306.714851] ? trace_hardirqs_off+0xb8/0x310 [ 306.714867] ? __kasan_slab_free+0x119/0x150 [ 306.718626] kobject: 'rx-0' (000000000de61053): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 306.728911] ? __sigqueue_free.part.27+0x7d/0xa0 [ 306.728927] ? kmem_cache_free+0x21a/0x290 [ 306.728940] ? __sigqueue_free.part.27+0x7d/0xa0 [ 306.728952] ? __dequeue_signal+0xf9/0x7d0 [ 306.728970] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 306.732491] kobject: 'tx-0' (000000005b4175ce): kobject_add_internal: parent: 'queues', set: 'queues' [ 306.736114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.736133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.745820] kobject: 'tx-0' (000000005b4175ce): kobject_uevent_env [ 306.749835] ? proc_coredump_connector+0x4f8/0x630 [ 306.749849] ? lock_downgrade+0x900/0x900 [ 306.749865] ? proc_comm_connector+0x520/0x520 [ 306.754205] kobject: 'tx-0' (000000005b4175ce): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 306.758060] do_group_exit+0x177/0x440 [ 306.758078] ? __ia32_sys_exit+0x50/0x50 [ 306.764579] kobject: 'sit0' (000000003663b30b): kobject_add_internal: parent: 'net', set: 'devices' [ 306.767748] ? kasan_check_write+0x14/0x20 [ 306.767763] ? do_raw_spin_lock+0xc1/0x200 [ 306.767780] get_signal+0x8b0/0x1980 [ 306.775065] kobject: 'sit0' (000000003663b30b): kobject_uevent_env [ 306.778316] ? ptrace_notify+0x130/0x130 [ 306.778333] ? force_sig_info+0x281/0x310 [ 306.781650] kobject: 'sit0' (000000003663b30b): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 306.785477] ? force_sigsegv+0x3d/0x110 [ 306.785494] ? signal_setup_done+0xc1/0x2f0 [ 306.785509] ? set_current_blocked+0x40/0x40 [ 306.785527] do_signal+0x9c/0x21e0 [ 306.790062] kobject: 'queues' (00000000317d25c9): kobject_add_internal: parent: 'sit0', set: '' [ 306.794492] ? setup_sigcontext+0x7d0/0x7d0 [ 306.794508] ? __bad_area_nosemaphore+0x311/0x3f0 [ 306.794526] ? bad_area+0x69/0x80 [ 306.794558] exit_to_usermode_loop+0x2e5/0x380 [ 306.805128] kobject: 'queues' (00000000317d25c9): kobject_uevent_env [ 306.808468] ? syscall_slow_exit_work+0x520/0x520 [ 306.808488] ? trace_hardirqs_off_caller+0xbb/0x310 [ 306.812393] kobject: 'queues' (00000000317d25c9): kobject_uevent_env: filter function caused the event to drop! [ 306.816929] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.816943] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.816960] prepare_exit_to_usermode+0x342/0x3b0 [ 306.821047] kobject: 'rx-0' (00000000e801eaa3): kobject_add_internal: parent: 'queues', set: 'queues' [ 306.830522] ? trace_event_raw_event_sys_enter+0x700/0x700 [ 306.830538] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.830554] ? page_fault+0x8/0x30 [ 306.830571] retint_user+0x8/0x18 [ 306.835071] kobject: 'rx-0' (00000000e801eaa3): kobject_uevent_env [ 306.839021] RIP: 0033: (null) [ 306.839026] Code: Bad RIP value. [ 306.839033] RSP: 002b:0000000020000208 EFLAGS: 00010217 [ 306.844738] kobject: 'rx-0' (00000000e801eaa3): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 306.851213] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000457579 [ 306.851221] RDX: 0000000020000000 RSI: 0000000020000200 RDI: 0000000005000000 [ 306.851229] RBP: 000000000072bf00 R08: 0000000020000140 R09: 0000000000000000 [ 306.851242] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f5eb832f6d4 [ 306.855471] kobject: 'tx-0' (00000000eb3a7d43): kobject_add_internal: parent: 'queues', set: 'queues' [ 306.860115] R13: 00000000004bd9fa R14: 00000000004cc448 R15: 00000000ffffffff [ 306.870943] Kernel Offset: disabled [ 307.331546] Rebooting in 86400 seconds..