Warning: Permanently added '10.128.0.242' (ECDSA) to the list of known hosts. 2020/09/27 03:09:02 fuzzer started 2020/09/27 03:09:03 dialing manager at 10.128.0.105:38519 2020/09/27 03:09:03 syscalls: 3234 2020/09/27 03:09:03 code coverage: enabled 2020/09/27 03:09:03 comparison tracing: enabled 2020/09/27 03:09:03 extra coverage: extra coverage is not supported by the kernel 2020/09/27 03:09:03 setuid sandbox: enabled 2020/09/27 03:09:03 namespace sandbox: enabled 2020/09/27 03:09:03 Android sandbox: enabled 2020/09/27 03:09:03 fault injection: enabled 2020/09/27 03:09:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/09/27 03:09:03 net packet injection: enabled 2020/09/27 03:09:03 net device setup: enabled 2020/09/27 03:09:03 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/09/27 03:09:03 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/09/27 03:09:03 USB emulation: /dev/raw-gadget does not exist 2020/09/27 03:09:03 hci packet injection: enabled 2020/09/27 03:09:03 wifi device emulation: enabled 03:10:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x141001) dup(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffff346, 0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60fe01, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 134.628471] audit: type=1400 audit(1601176239.425:8): avc: denied { execmem } for pid=6511 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 03:10:39 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000400)="230000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b0ebcd774a3c374a095dca5285707eadea8653a1cc7e63975c", 0x4c}], 0x1}, 0x0) 03:10:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000024c0)="2e00000021008102e00f80ecdb4cb902020000fffd000000810040fb12000c000006ca1b40d719a906000500000f", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) socket$kcm(0x10, 0x2, 0x0) 03:10:39 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f0000001440)=""/4084, 0xff4}], 0x1, 0x0, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='cgroup\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x37d, 0x0, 0x0) 03:10:40 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(r1, 0x40096100, &(0x7f0000000080)={{}, 0x4}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7d, &(0x7f0000000040), &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e24, 0x21, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}, [0x20, 0x0, 0x5, 0x80000001, 0x7fff, 0x0, 0x0, 0x4b, 0xe7a, 0x800, 0x8, 0x0, 0x0, 0x0, 0x100]}, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000000)) 03:10:40 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000240)={0x7}) [ 135.818828] IPVS: ftp: loaded support on port[0] = 21 [ 135.943265] chnl_net:caif_netlink_parms(): no params data found [ 135.999603] IPVS: ftp: loaded support on port[0] = 21 [ 136.103367] chnl_net:caif_netlink_parms(): no params data found [ 136.146783] IPVS: ftp: loaded support on port[0] = 21 [ 136.199060] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.207030] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.214093] device bridge_slave_0 entered promiscuous mode [ 136.225237] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.231627] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.232471] device bridge_slave_1 entered promiscuous mode [ 136.305779] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 136.330546] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 136.362398] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 136.370157] IPVS: ftp: loaded support on port[0] = 21 [ 136.371752] team0: Port device team_slave_0 added [ 136.388240] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 136.396757] team0: Port device team_slave_1 added [ 136.415138] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.421542] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.443305] device bridge_slave_0 entered promiscuous mode [ 136.453871] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.461766] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.475168] device bridge_slave_1 entered promiscuous mode [ 136.515561] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 136.562574] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 136.568928] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 136.595166] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 136.607781] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 136.633549] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 136.641184] team0: Port device team_slave_0 added [ 136.648437] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 136.655339] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 136.681358] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 136.693016] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 136.701563] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 136.706099] IPVS: ftp: loaded support on port[0] = 21 [ 136.725835] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 136.733556] team0: Port device team_slave_1 added [ 136.745364] IPVS: ftp: loaded support on port[0] = 21 [ 136.758379] device hsr_slave_0 entered promiscuous mode [ 136.765178] device hsr_slave_1 entered promiscuous mode [ 136.773544] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 136.829380] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 136.839610] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 136.846703] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 136.872641] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 136.902999] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 136.910388] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 136.937467] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 136.950658] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 136.961014] chnl_net:caif_netlink_parms(): no params data found [ 136.981037] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 137.081137] device hsr_slave_0 entered promiscuous mode [ 137.088532] device hsr_slave_1 entered promiscuous mode [ 137.120216] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 137.133341] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 137.172199] chnl_net:caif_netlink_parms(): no params data found [ 137.260163] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.266834] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.273822] device bridge_slave_0 entered promiscuous mode [ 137.337227] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.343606] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.351562] device bridge_slave_1 entered promiscuous mode [ 137.410946] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 137.423806] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 137.451963] chnl_net:caif_netlink_parms(): no params data found [ 137.508131] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 137.522201] team0: Port device team_slave_0 added [ 137.531033] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 137.539002] team0: Port device team_slave_1 added [ 137.557306] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 137.578497] chnl_net:caif_netlink_parms(): no params data found [ 137.602552] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 137.609693] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 137.635705] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 137.652242] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 137.658849] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 137.685024] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 137.697328] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 137.708749] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 137.720813] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.727403] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.734477] device bridge_slave_0 entered promiscuous mode [ 137.761022] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.773078] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.782080] device bridge_slave_1 entered promiscuous mode [ 137.822667] device hsr_slave_0 entered promiscuous mode [ 137.828879] device hsr_slave_1 entered promiscuous mode [ 137.835817] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 137.842422] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 137.855245] Bluetooth: hci0: command 0x0409 tx timeout [ 137.865966] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 137.880971] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 137.912332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.929526] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 137.959388] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.965964] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.972952] device bridge_slave_0 entered promiscuous mode [ 137.988208] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 137.999023] team0: Port device team_slave_0 added [ 138.005924] Bluetooth: hci1: command 0x0409 tx timeout [ 138.018644] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.028401] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.036859] device bridge_slave_1 entered promiscuous mode [ 138.043768] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 138.059802] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 138.067735] team0: Port device team_slave_1 added [ 138.102529] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.109417] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.117337] device bridge_slave_0 entered promiscuous mode [ 138.128988] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 138.136216] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 138.162342] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 138.172575] Bluetooth: hci2: command 0x0409 tx timeout [ 138.179839] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 138.200148] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.206649] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.213703] device bridge_slave_1 entered promiscuous mode [ 138.229216] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 138.235788] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 138.261264] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 138.271667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.279621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.288728] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 138.294907] 8021q: adding VLAN 0 to HW filter on device team0 [ 138.302247] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 138.323034] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 138.330896] Bluetooth: hci3: command 0x0409 tx timeout [ 138.338281] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 138.346085] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 138.365051] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 138.382955] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 138.398089] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 138.406836] team0: Port device team_slave_0 added [ 138.412220] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 138.425511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.436378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.444434] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.450920] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.459326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.476968] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 138.484377] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 138.491713] team0: Port device team_slave_1 added [ 138.496660] Bluetooth: hci4: command 0x0409 tx timeout [ 138.529569] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 138.537344] team0: Port device team_slave_0 added [ 138.543644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.551668] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.559728] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.566109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.573706] Bluetooth: hci5: command 0x0409 tx timeout [ 138.585171] device hsr_slave_0 entered promiscuous mode [ 138.591363] device hsr_slave_1 entered promiscuous mode [ 138.600300] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 138.609400] 8021q: adding VLAN 0 to HW filter on device bond0 [ 138.618103] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 138.626074] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 138.633510] team0: Port device team_slave_1 added [ 138.654439] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 138.660790] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 138.687054] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 138.700926] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 138.717400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 138.736723] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 138.743096] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 138.768700] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 138.779934] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 138.787470] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 138.793705] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 138.826036] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 138.838027] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 138.844366] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 138.869929] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 138.881456] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 138.889457] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 138.899524] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 138.912094] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 138.919989] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 138.928397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 138.939209] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 138.948223] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 138.956309] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 138.985601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 138.993702] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 139.001686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.008755] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.018007] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 139.035903] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 139.042099] 8021q: adding VLAN 0 to HW filter on device team0 [ 139.051244] device hsr_slave_0 entered promiscuous mode [ 139.057048] device hsr_slave_1 entered promiscuous mode [ 139.066586] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 139.073732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 139.082372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 139.094532] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 139.104970] device hsr_slave_0 entered promiscuous mode [ 139.111191] device hsr_slave_1 entered promiscuous mode [ 139.117570] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 139.127150] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 139.142466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 139.150210] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.160894] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 139.170767] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 139.189236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.197436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.205782] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.212140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.219885] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.228233] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 139.237447] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 139.246653] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 139.275881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.283771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.292678] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.299092] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.305955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.315279] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.341318] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 139.351494] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 139.359384] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 139.380706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 139.429673] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 139.446931] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 139.466082] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 139.480233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 139.490396] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 139.513690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 139.525894] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 139.533704] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 139.543898] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 139.566993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 139.573691] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 139.592964] 8021q: adding VLAN 0 to HW filter on device bond0 [ 139.605573] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 139.621377] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 139.631541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 139.641293] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 139.651669] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 139.665269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 139.676327] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 139.688484] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 139.700296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 139.708337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.715975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.723417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.731664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.738977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.753916] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 139.771475] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 139.778414] 8021q: adding VLAN 0 to HW filter on device team0 [ 139.793208] 8021q: adding VLAN 0 to HW filter on device bond0 [ 139.804416] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 139.810458] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 139.829412] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 139.837884] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 139.848736] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 139.859357] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 139.867221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.880980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.889314] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.895708] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.902632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.911136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.919048] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.925467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.932820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 139.934087] Bluetooth: hci0: command 0x041b tx timeout [ 139.941458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 139.954302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.961942] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 139.972597] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 139.980047] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 139.989362] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 139.999831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 140.009300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 140.018680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 140.031009] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 140.044662] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 140.053456] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 140.059811] 8021q: adding VLAN 0 to HW filter on device team0 [ 140.072950] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 140.081328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 140.089576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 140.094405] Bluetooth: hci1: command 0x041b tx timeout [ 140.097588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 140.117490] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 140.126443] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 140.136713] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 140.148030] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 140.155082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 140.162889] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 140.171446] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 140.179682] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 140.188367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 140.196286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.203827] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 140.211759] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 140.223656] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 140.239428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 140.249056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 140.256652] Bluetooth: hci2: command 0x041b tx timeout [ 140.258477] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.268361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.276180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 140.284015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.291597] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.297977] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.310321] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 140.323870] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 140.333726] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 140.342910] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 140.350552] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 140.357835] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 140.366034] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 140.376444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 140.384838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.392246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 140.402593] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 140.410799] Bluetooth: hci3: command 0x041b tx timeout [ 140.419398] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 140.434799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 140.446447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 140.455596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 140.462912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.472040] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.479906] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.487979] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 140.495001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 140.504489] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 140.522162] 8021q: adding VLAN 0 to HW filter on device bond0 [ 140.531488] device veth0_vlan entered promiscuous mode [ 140.538545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 140.568783] Bluetooth: hci4: command 0x041b tx timeout [ 140.570279] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 140.582785] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 140.598641] device veth1_vlan entered promiscuous mode [ 140.604960] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 140.616272] 8021q: adding VLAN 0 to HW filter on device bond0 [ 140.624920] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 140.639765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 140.648299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 140.653953] Bluetooth: hci5: command 0x041b tx timeout [ 140.656995] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 140.670366] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 140.681116] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 140.689976] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 140.701353] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 140.709695] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 140.718023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 140.727094] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 140.737912] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 140.747095] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 140.757627] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 140.764810] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 140.771359] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 140.781019] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 140.790144] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 140.798663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 140.808619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 140.816660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 140.824884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.832261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 140.839749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 140.848705] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 140.855693] 8021q: adding VLAN 0 to HW filter on device team0 [ 140.863800] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 140.869951] 8021q: adding VLAN 0 to HW filter on device team0 [ 140.885755] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 140.900245] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 140.908609] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 140.918944] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 140.925957] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 140.932739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 140.940747] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.948630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 140.956258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.964612] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.971563] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.979975] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 140.988869] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 140.997390] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 141.008880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 141.017161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.025262] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.031635] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.038620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 141.047237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 141.055419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 141.063143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.071038] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.077433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.087670] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 141.097406] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 141.103492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 141.111830] device veth0_vlan entered promiscuous mode [ 141.120117] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 141.129249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 141.136998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 141.144269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 141.151966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.160011] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.166420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.173789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 141.181963] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.189741] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.196151] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.205006] device veth0_macvtap entered promiscuous mode [ 141.212629] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 141.226102] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 141.238049] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 141.246340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 141.255974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 141.267755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 141.279401] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 141.290212] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 141.298521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 141.306600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 141.316735] device veth1_vlan entered promiscuous mode [ 141.328103] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 141.340255] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 141.348421] device veth1_macvtap entered promiscuous mode [ 141.358026] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 141.376924] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 141.383759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 141.392409] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 141.401980] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 141.408976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 141.415941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 141.423786] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 141.431457] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 141.438955] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 141.448619] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 141.463687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 141.478580] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 141.493721] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 141.501632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 141.510495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 141.518636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 141.526912] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 141.536886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 141.545998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 141.554889] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 141.564972] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 141.576957] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 141.589198] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 141.600612] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 141.617202] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 141.630771] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 141.639930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 141.649072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 141.657446] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 141.665932] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.673336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 141.681914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 141.691373] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 141.700823] device veth0_macvtap entered promiscuous mode [ 141.708045] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 141.717586] device veth1_macvtap entered promiscuous mode [ 141.724640] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 141.735157] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 141.742086] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 141.749468] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 141.760569] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 141.768482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 141.776250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.783918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 141.791840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 141.803593] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 141.812747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 141.822856] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 141.832912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 141.841222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.849396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 141.857292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.867655] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 141.873690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 141.884804] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 141.890825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 141.922016] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 141.931583] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 141.949676] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 141.958029] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 141.965810] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 141.973117] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 142.013712] Bluetooth: hci0: command 0x040f tx timeout [ 142.017384] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 142.027857] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 142.038818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.052217] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 142.059904] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 142.072436] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 142.080339] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 142.087824] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 142.095619] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 142.103394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 142.112132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 142.120533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 142.133339] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 142.142284] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 142.151260] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 142.161876] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.172016] Bluetooth: hci1: command 0x040f tx timeout [ 142.178580] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 142.185597] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 142.200175] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 142.210531] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 142.218940] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 142.233331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 142.247414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 142.255124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.267113] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 142.276506] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 142.285820] device veth0_vlan entered promiscuous mode [ 142.297630] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.314471] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.321439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 142.331070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 142.334275] Bluetooth: hci2: command 0x040f tx timeout [ 142.339434] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 142.356006] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 142.368176] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 142.381977] device veth1_vlan entered promiscuous mode [ 142.388875] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 142.400341] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 142.410622] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 142.418439] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 142.441099] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 142.458821] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 142.467876] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 142.482925] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 142.484238] Bluetooth: hci3: command 0x040f tx timeout [ 142.498459] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 142.506768] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 142.520392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 142.529048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 142.538852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 142.546661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.556423] device veth0_vlan entered promiscuous mode [ 142.565338] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 142.572420] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 142.579633] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 142.587648] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 142.596908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.610265] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.621276] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 142.641469] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 142.651452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 142.663641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.671963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 142.679850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 142.687761] Bluetooth: hci4: command 0x040f tx timeout [ 142.689444] device veth1_vlan entered promiscuous mode [ 142.700873] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 142.719792] device veth0_vlan entered promiscuous mode [ 142.725629] Bluetooth: hci5: command 0x040f tx timeout [ 142.731550] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 142.746556] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.759645] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.771823] device veth0_macvtap entered promiscuous mode [ 142.779909] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 142.789215] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 142.803420] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 142.819211] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 142.828411] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 142.845445] device veth1_macvtap entered promiscuous mode [ 142.851619] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 142.879933] device veth1_vlan entered promiscuous mode [ 142.888546] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 142.900850] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 142.919899] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 142.931642] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 142.942611] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 142.952551] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 142.965079] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 142.972491] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 142.982051] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 142.990155] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 142.997909] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 143.005441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 143.012840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.020650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 143.028744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.039246] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 143.048167] device veth0_vlan entered promiscuous mode [ 143.061708] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 143.070207] device veth0_macvtap entered promiscuous mode [ 143.077394] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 143.091471] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 143.096999] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 143.105036] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.112128] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.119721] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 143.127429] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 143.136435] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 143.146471] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.155764] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 143.165549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.175673] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 143.182591] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 143.215595] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 143.223533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 143.247017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 143.264273] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.273399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 143.283520] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.295263] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 143.302223] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 143.309372] device veth1_vlan entered promiscuous mode [ 143.319573] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 143.327845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.337531] device veth1_macvtap entered promiscuous mode [ 143.346740] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 143.356660] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 143.386273] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 143.394648] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 143.401781] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 143.416541] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 143.430820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 143.454772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.462597] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 143.479644] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 143.506682] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 143.533333] device veth0_macvtap entered promiscuous mode [ 143.542129] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 143.550317] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 143.577298] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 143.590388] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 143.602330] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.613097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 143.629169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.638689] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 143.649162] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.659549] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 143.666729] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 143.674922] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 143.682205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 143.692576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.700440] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 143.709029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 143.729110] device veth0_macvtap entered promiscuous mode [ 143.736437] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 143.745628] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 143.755925] device veth1_macvtap entered promiscuous mode [ 143.758048] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 143.762262] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 143.779587] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 143.787290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 03:10:48 executing program 0: 03:10:48 executing program 0: [ 143.821694] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.831636] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 143.858259] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 03:10:48 executing program 0: [ 143.878315] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 143.896118] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.922912] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 143.936060] batman_adv: batadv0: Interface activated: batadv_slave_1 03:10:48 executing program 0: 03:10:48 executing program 0: [ 143.973224] device veth1_macvtap entered promiscuous mode [ 143.981543] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 144.009381] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 144.022754] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 144.044527] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 144.052094] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 144.064331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 03:10:48 executing program 0: 03:10:48 executing program 0: [ 144.080966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 144.099879] Bluetooth: hci0: command 0x0419 tx timeout [ 144.109506] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 144.148119] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 144.198411] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 144.214950] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 144.224489] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 144.227437] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 144.231819] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 144.258826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.268838] Bluetooth: hci1: command 0x0419 tx timeout [ 144.273383] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 144.284136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.293284] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 144.303064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.312405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 144.322549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.335092] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 144.342145] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 144.364053] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.378954] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.388265] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.398150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.407995] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.413900] Bluetooth: hci2: command 0x0419 tx timeout [ 144.417952] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.432254] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.442573] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.453304] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 144.461345] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 144.469444] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 144.478872] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 144.487585] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 144.496281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 144.505403] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 144.513183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 144.534833] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 144.560428] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.571863] Bluetooth: hci3: command 0x0419 tx timeout [ 144.582077] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 144.599078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.608731] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 144.619861] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.629893] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 144.640282] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.650506] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 03:10:49 executing program 1: [ 144.660349] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.670652] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 144.678147] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 144.695560] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 144.704227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 144.722465] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.744124] Bluetooth: hci4: command 0x0419 tx timeout [ 144.748562] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.776397] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.786536] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.795755] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.806023] Bluetooth: hci5: command 0x0419 tx timeout [ 144.811568] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.821034] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.830813] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.840513] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 144.851098] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.861989] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 144.869333] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 144.878179] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 144.888109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 144.971639] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 144.980946] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 144.991919] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 145.020609] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 145.040061] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 145.048237] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 145.056936] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 145.072513] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 145.147782] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 145.157055] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 145.176301] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 145.184419] netlink: 'syz-executor.2': attribute type 12 has an invalid length. [ 145.195591] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 145.221075] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 145.234801] netlink: 'syz-executor.2': attribute type 12 has an invalid length. [ 145.247329] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 03:10:50 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000024c0)="2e00000021008102e00f80ecdb4cb902020000fffd000000810040fb12000c000006ca1b40d719a906000500000f", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) socket$kcm(0x10, 0x2, 0x0) [ 145.274035] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 145.311178] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 145.333403] netlink: 'syz-executor.2': attribute type 12 has an invalid length. [ 145.431650] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 145.468406] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 145.479886] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 03:10:50 executing program 3: [ 145.520199] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 145.550946] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 145.604918] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 145.611866] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 145.628279] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 145.639627] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 145.647570] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 145.672955] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 145.680857] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 145.692908] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 145.701022] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 145.709280] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 145.717023] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 03:10:50 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(r1, 0x40096100, &(0x7f0000000080)={{}, 0x4}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7d, &(0x7f0000000040), &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e24, 0x21, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}, [0x20, 0x0, 0x5, 0x80000001, 0x7fff, 0x0, 0x0, 0x4b, 0xe7a, 0x800, 0x8, 0x0, 0x0, 0x0, 0x100]}, 0x0) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000000)) 03:10:50 executing program 0: 03:10:50 executing program 1: 03:10:50 executing program 3: 03:10:50 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000024c0)="2e00000021008102e00f80ecdb4cb902020000fffd000000810040fb12000c000006ca1b40d719a906000500000f", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) socket$kcm(0x10, 0x2, 0x0) 03:10:50 executing program 5: 03:10:50 executing program 3: 03:10:50 executing program 5: [ 145.952337] hrtimer: interrupt took 44082 ns 03:10:50 executing program 1: 03:10:50 executing program 0: [ 145.994913] netlink: 'syz-executor.2': attribute type 12 has an invalid length. 03:10:50 executing program 3: 03:10:50 executing program 2: 03:10:51 executing program 4: 03:10:51 executing program 1: 03:10:51 executing program 5: 03:10:51 executing program 0: 03:10:51 executing program 2: 03:10:51 executing program 3: 03:10:51 executing program 5: 03:10:51 executing program 3: 03:10:51 executing program 2: 03:10:51 executing program 0: 03:10:51 executing program 1: 03:10:51 executing program 4: 03:10:51 executing program 5: 03:10:51 executing program 0: 03:10:51 executing program 2: 03:10:51 executing program 4: 03:10:51 executing program 3: 03:10:51 executing program 1: 03:10:51 executing program 5: 03:10:51 executing program 4: 03:10:51 executing program 0: 03:10:51 executing program 2: 03:10:51 executing program 3: 03:10:51 executing program 5: 03:10:51 executing program 1: 03:10:51 executing program 2: 03:10:51 executing program 0: 03:10:51 executing program 4: 03:10:51 executing program 1: 03:10:51 executing program 5: 03:10:51 executing program 3: 03:10:51 executing program 5: 03:10:51 executing program 2: 03:10:51 executing program 0: 03:10:51 executing program 4: 03:10:51 executing program 1: 03:10:51 executing program 3: 03:10:51 executing program 5: 03:10:51 executing program 2: 03:10:51 executing program 4: 03:10:51 executing program 0: 03:10:51 executing program 1: 03:10:51 executing program 4: 03:10:51 executing program 3: 03:10:51 executing program 0: 03:10:51 executing program 5: 03:10:51 executing program 2: 03:10:51 executing program 1: 03:10:51 executing program 4: 03:10:51 executing program 3: 03:10:51 executing program 0: 03:10:52 executing program 5: 03:10:52 executing program 4: 03:10:52 executing program 3: 03:10:52 executing program 1: 03:10:52 executing program 2: 03:10:52 executing program 0: 03:10:52 executing program 5: 03:10:52 executing program 4: 03:10:52 executing program 1: 03:10:52 executing program 2: 03:10:52 executing program 3: 03:10:52 executing program 4: 03:10:52 executing program 1: 03:10:52 executing program 5: 03:10:52 executing program 0: 03:10:52 executing program 2: 03:10:52 executing program 1: 03:10:52 executing program 4: 03:10:52 executing program 3: 03:10:52 executing program 5: 03:10:52 executing program 1: 03:10:52 executing program 0: 03:10:52 executing program 2: 03:10:52 executing program 4: 03:10:52 executing program 3: 03:10:52 executing program 1: 03:10:52 executing program 2: 03:10:52 executing program 5: 03:10:52 executing program 4: 03:10:52 executing program 0: 03:10:52 executing program 1: 03:10:52 executing program 3: 03:10:52 executing program 0: 03:10:52 executing program 2: 03:10:52 executing program 4: 03:10:52 executing program 5: 03:10:52 executing program 1: 03:10:52 executing program 5: 03:10:52 executing program 0: 03:10:52 executing program 3: 03:10:52 executing program 2: 03:10:52 executing program 4: 03:10:52 executing program 1: 03:10:52 executing program 5: 03:10:52 executing program 0: 03:10:52 executing program 2: 03:10:52 executing program 3: 03:10:52 executing program 1: 03:10:52 executing program 4: 03:10:52 executing program 5: 03:10:52 executing program 4: 03:10:52 executing program 0: 03:10:52 executing program 3: 03:10:52 executing program 1: 03:10:52 executing program 2: 03:10:52 executing program 5: 03:10:53 executing program 3: 03:10:53 executing program 4: 03:10:53 executing program 1: 03:10:53 executing program 0: 03:10:53 executing program 2: 03:10:53 executing program 4: 03:10:53 executing program 5: 03:10:53 executing program 0: 03:10:53 executing program 1: 03:10:53 executing program 2: 03:10:53 executing program 3: 03:10:53 executing program 4: 03:10:53 executing program 0: 03:10:53 executing program 1: 03:10:53 executing program 5: 03:10:53 executing program 2: 03:10:53 executing program 3: 03:10:53 executing program 0: 03:10:53 executing program 4: 03:10:53 executing program 2: 03:10:53 executing program 5: 03:10:53 executing program 1: 03:10:53 executing program 3: 03:10:53 executing program 0: 03:10:53 executing program 2: 03:10:53 executing program 4: 03:10:53 executing program 5: 03:10:53 executing program 1: 03:10:53 executing program 3: 03:10:53 executing program 2: 03:10:53 executing program 4: 03:10:53 executing program 5: 03:10:53 executing program 0: 03:10:53 executing program 1: 03:10:53 executing program 3: 03:10:53 executing program 4: 03:10:53 executing program 2: 03:10:53 executing program 5: 03:10:53 executing program 0: 03:10:53 executing program 1: 03:10:53 executing program 3: 03:10:53 executing program 4: 03:10:53 executing program 2: 03:10:53 executing program 5: 03:10:53 executing program 0: 03:10:53 executing program 1: 03:10:53 executing program 3: 03:10:53 executing program 4: 03:10:53 executing program 5: 03:10:53 executing program 2: 03:10:53 executing program 1: 03:10:53 executing program 0: 03:10:53 executing program 3: 03:10:53 executing program 4: 03:10:53 executing program 1: 03:10:53 executing program 5: 03:10:53 executing program 2: 03:10:53 executing program 0: 03:10:53 executing program 4: 03:10:53 executing program 3: 03:10:53 executing program 1: 03:10:53 executing program 0: 03:10:54 executing program 2: 03:10:54 executing program 5: 03:10:54 executing program 4: 03:10:54 executing program 1: 03:10:54 executing program 3: 03:10:54 executing program 2: 03:10:54 executing program 4: 03:10:54 executing program 5: 03:10:54 executing program 0: 03:10:54 executing program 3: 03:10:54 executing program 1: 03:10:54 executing program 2: 03:10:54 executing program 5: 03:10:54 executing program 4: 03:10:54 executing program 1: 03:10:54 executing program 3: 03:10:54 executing program 0: 03:10:54 executing program 3: 03:10:54 executing program 2: 03:10:54 executing program 1: 03:10:54 executing program 5: 03:10:54 executing program 4: 03:10:54 executing program 0: 03:10:54 executing program 3: 03:10:54 executing program 5: 03:10:54 executing program 1: 03:10:54 executing program 2: 03:10:54 executing program 4: 03:10:54 executing program 3: 03:10:54 executing program 5: 03:10:54 executing program 0: 03:10:54 executing program 1: 03:10:54 executing program 3: 03:10:54 executing program 4: 03:10:54 executing program 2: 03:10:54 executing program 0: 03:10:54 executing program 5: 03:10:54 executing program 1: 03:10:54 executing program 3: 03:10:54 executing program 2: 03:10:54 executing program 4: 03:10:54 executing program 1: 03:10:54 executing program 5: 03:10:54 executing program 3: 03:10:54 executing program 0: 03:10:54 executing program 2: 03:10:54 executing program 4: 03:10:54 executing program 5: 03:10:54 executing program 3: 03:10:54 executing program 1: 03:10:54 executing program 0: 03:10:54 executing program 2: 03:10:54 executing program 5: 03:10:54 executing program 4: 03:10:54 executing program 3: 03:10:54 executing program 2: 03:10:54 executing program 4: 03:10:54 executing program 1: 03:10:54 executing program 5: 03:10:54 executing program 0: 03:10:55 executing program 3: 03:10:55 executing program 2: 03:10:55 executing program 4: 03:10:55 executing program 5: 03:10:55 executing program 3: 03:10:55 executing program 0: 03:10:55 executing program 1: 03:10:55 executing program 5: 03:10:55 executing program 2: 03:10:55 executing program 4: 03:10:55 executing program 3: 03:10:55 executing program 5: 03:10:55 executing program 1: 03:10:55 executing program 3: 03:10:55 executing program 4: 03:10:55 executing program 0: 03:10:55 executing program 2: 03:10:55 executing program 1: 03:10:55 executing program 4: 03:10:55 executing program 5: 03:10:55 executing program 0: 03:10:55 executing program 2: 03:10:55 executing program 3: 03:10:55 executing program 5: 03:10:55 executing program 4: 03:10:55 executing program 3: 03:10:55 executing program 1: 03:10:55 executing program 0: 03:10:55 executing program 3: 03:10:55 executing program 2: 03:10:55 executing program 0: 03:10:55 executing program 2: 03:10:55 executing program 4: 03:10:55 executing program 1: 03:10:55 executing program 3: 03:10:55 executing program 5: 03:10:55 executing program 2: 03:10:55 executing program 0: 03:10:55 executing program 4: 03:10:55 executing program 1: 03:10:55 executing program 5: 03:10:55 executing program 3: 03:10:55 executing program 4: 03:10:55 executing program 1: 03:10:55 executing program 2: 03:10:55 executing program 0: 03:10:55 executing program 5: 03:10:55 executing program 3: 03:10:55 executing program 1: 03:10:55 executing program 4: 03:10:55 executing program 5: 03:10:55 executing program 0: 03:10:55 executing program 2: 03:10:55 executing program 3: 03:10:55 executing program 1: 03:10:55 executing program 4: 03:10:55 executing program 5: 03:10:56 executing program 0: 03:10:56 executing program 3: 03:10:56 executing program 2: 03:10:56 executing program 1: 03:10:56 executing program 4: 03:10:56 executing program 5: 03:10:56 executing program 2: 03:10:56 executing program 4: 03:10:56 executing program 3: 03:10:56 executing program 0: 03:10:56 executing program 1: 03:10:56 executing program 5: 03:10:56 executing program 2: 03:10:56 executing program 4: 03:10:56 executing program 3: 03:10:56 executing program 0: 03:10:56 executing program 1: 03:10:56 executing program 2: 03:10:56 executing program 5: 03:10:56 executing program 4: 03:10:56 executing program 0: 03:10:56 executing program 1: 03:10:56 executing program 3: 03:10:56 executing program 2: 03:10:56 executing program 1: 03:10:56 executing program 5: 03:10:56 executing program 4: 03:10:56 executing program 2: 03:10:56 executing program 3: 03:10:56 executing program 0: 03:10:56 executing program 1: 03:10:56 executing program 3: 03:10:56 executing program 4: 03:10:56 executing program 5: 03:10:56 executing program 2: 03:10:56 executing program 0: 03:10:56 executing program 1: 03:10:56 executing program 3: 03:10:56 executing program 4: 03:10:56 executing program 5: 03:10:56 executing program 2: 03:10:56 executing program 3: 03:10:56 executing program 5: 03:10:56 executing program 1: 03:10:56 executing program 0: 03:10:56 executing program 4: 03:10:56 executing program 2: 03:10:56 executing program 5: 03:10:56 executing program 1: 03:10:56 executing program 0: 03:10:56 executing program 3: 03:10:56 executing program 4: 03:10:56 executing program 5: 03:10:56 executing program 2: 03:10:56 executing program 3: 03:10:56 executing program 1: 03:10:56 executing program 0: 03:10:56 executing program 4: 03:10:56 executing program 2: 03:10:56 executing program 5: 03:10:57 executing program 4: 03:10:57 executing program 3: 03:10:57 executing program 5: 03:10:57 executing program 0: 03:10:57 executing program 1: 03:10:57 executing program 2: 03:10:57 executing program 4: 03:10:57 executing program 3: 03:10:57 executing program 5: 03:10:57 executing program 0: 03:10:57 executing program 1: 03:10:57 executing program 2: 03:10:57 executing program 4: 03:10:57 executing program 0: 03:10:57 executing program 5: 03:10:57 executing program 1: 03:10:57 executing program 3: 03:10:57 executing program 2: 03:10:57 executing program 4: 03:10:57 executing program 3: 03:10:57 executing program 0: 03:10:57 executing program 1: 03:10:57 executing program 5: 03:10:57 executing program 3: 03:10:57 executing program 2: 03:10:57 executing program 4: 03:10:57 executing program 0: 03:10:57 executing program 5: 03:10:57 executing program 1: 03:10:57 executing program 4: 03:10:57 executing program 2: 03:10:57 executing program 3: 03:10:57 executing program 5: 03:10:57 executing program 0: 03:10:57 executing program 2: 03:10:57 executing program 1: 03:10:57 executing program 4: 03:10:57 executing program 5: 03:10:57 executing program 3: 03:10:57 executing program 0: 03:10:57 executing program 4: 03:10:57 executing program 2: 03:10:57 executing program 5: 03:10:57 executing program 1: 03:10:57 executing program 0: 03:10:57 executing program 3: 03:10:57 executing program 4: 03:10:57 executing program 1: 03:10:57 executing program 2: 03:10:57 executing program 5: 03:10:57 executing program 3: 03:10:57 executing program 5: 03:10:57 executing program 0: 03:10:57 executing program 4: 03:10:57 executing program 3: 03:10:57 executing program 2: 03:10:57 executing program 5: 03:10:57 executing program 0: 03:10:57 executing program 1: 03:10:57 executing program 4: 03:10:57 executing program 0: 03:10:57 executing program 2: 03:10:58 executing program 3: 03:10:58 executing program 5: 03:10:58 executing program 4: 03:10:58 executing program 1: 03:10:58 executing program 3: 03:10:58 executing program 5: 03:10:58 executing program 4: 03:10:58 executing program 2: 03:10:58 executing program 0: 03:10:58 executing program 1: 03:10:58 executing program 4: 03:10:58 executing program 3: 03:10:58 executing program 5: 03:10:58 executing program 0: 03:10:58 executing program 2: 03:10:58 executing program 4: 03:10:58 executing program 1: 03:10:58 executing program 3: 03:10:58 executing program 5: 03:10:58 executing program 2: 03:10:58 executing program 0: 03:10:58 executing program 4: 03:10:58 executing program 3: 03:10:58 executing program 5: 03:10:58 executing program 1: 03:10:58 executing program 2: 03:10:58 executing program 4: 03:10:58 executing program 0: 03:10:58 executing program 2: 03:10:58 executing program 5: 03:10:58 executing program 3: 03:10:58 executing program 1: 03:10:58 executing program 0: 03:10:58 executing program 4: 03:10:58 executing program 2: 03:10:58 executing program 5: 03:10:58 executing program 3: 03:10:58 executing program 1: 03:10:58 executing program 0: 03:10:58 executing program 3: 03:10:58 executing program 4: 03:10:58 executing program 2: 03:10:58 executing program 5: 03:10:58 executing program 1: 03:10:58 executing program 0: 03:10:58 executing program 3: 03:10:58 executing program 2: 03:10:58 executing program 4: 03:10:58 executing program 5: 03:10:58 executing program 1: 03:10:58 executing program 3: 03:10:58 executing program 0: 03:10:58 executing program 2: 03:10:58 executing program 4: 03:10:58 executing program 5: 03:10:58 executing program 1: 03:10:58 executing program 3: 03:10:58 executing program 0: 03:10:58 executing program 2: 03:10:58 executing program 4: 03:10:58 executing program 1: 03:10:58 executing program 3: 03:10:59 executing program 5: 03:10:59 executing program 0: 03:10:59 executing program 2: 03:10:59 executing program 4: 03:10:59 executing program 3: 03:10:59 executing program 5: 03:10:59 executing program 4: 03:10:59 executing program 1: 03:10:59 executing program 0: 03:10:59 executing program 2: 03:10:59 executing program 3: 03:10:59 executing program 5: 03:10:59 executing program 4: 03:10:59 executing program 1: 03:10:59 executing program 2: 03:10:59 executing program 0: 03:10:59 executing program 3: 03:10:59 executing program 5: 03:10:59 executing program 1: 03:10:59 executing program 2: 03:10:59 executing program 0: 03:10:59 executing program 3: 03:10:59 executing program 4: 03:10:59 executing program 5: 03:10:59 executing program 2: 03:10:59 executing program 1: 03:10:59 executing program 3: 03:10:59 executing program 0: 03:10:59 executing program 5: 03:10:59 executing program 4: 03:10:59 executing program 2: 03:10:59 executing program 1: 03:10:59 executing program 5: 03:10:59 executing program 0: 03:10:59 executing program 4: 03:10:59 executing program 3: 03:10:59 executing program 2: 03:10:59 executing program 5: 03:10:59 executing program 0: 03:10:59 executing program 3: 03:10:59 executing program 4: 03:10:59 executing program 1: 03:10:59 executing program 2: 03:10:59 executing program 4: 03:10:59 executing program 5: 03:10:59 executing program 1: 03:10:59 executing program 3: 03:10:59 executing program 0: 03:10:59 executing program 4: 03:10:59 executing program 2: 03:10:59 executing program 5: 03:10:59 executing program 3: 03:10:59 executing program 1: 03:10:59 executing program 0: 03:10:59 executing program 4: 03:10:59 executing program 2: 03:10:59 executing program 0: 03:10:59 executing program 5: 03:10:59 executing program 1: 03:10:59 executing program 4: 03:10:59 executing program 3: 03:11:00 executing program 0: 03:11:00 executing program 5: 03:11:00 executing program 1: 03:11:00 executing program 2: 03:11:00 executing program 4: 03:11:00 executing program 5: 03:11:00 executing program 3: 03:11:00 executing program 1: 03:11:00 executing program 4: 03:11:00 executing program 0: 03:11:00 executing program 5: 03:11:00 executing program 3: 03:11:00 executing program 2: 03:11:00 executing program 1: 03:11:00 executing program 0: 03:11:00 executing program 4: 03:11:00 executing program 2: 03:11:00 executing program 5: 03:11:00 executing program 1: 03:11:00 executing program 3: 03:11:00 executing program 4: 03:11:00 executing program 0: 03:11:00 executing program 2: 03:11:00 executing program 3: 03:11:00 executing program 5: 03:11:00 executing program 1: 03:11:00 executing program 4: 03:11:00 executing program 0: 03:11:00 executing program 1: 03:11:00 executing program 2: 03:11:00 executing program 3: 03:11:00 executing program 5: 03:11:00 executing program 4: 03:11:00 executing program 1: 03:11:00 executing program 3: 03:11:00 executing program 0: 03:11:00 executing program 2: 03:11:00 executing program 1: 03:11:00 executing program 5: 03:11:00 executing program 4: 03:11:00 executing program 3: 03:11:00 executing program 0: 03:11:00 executing program 2: 03:11:00 executing program 1: 03:11:00 executing program 5: 03:11:00 executing program 4: 03:11:00 executing program 3: 03:11:00 executing program 0: 03:11:00 executing program 2: 03:11:00 executing program 1: 03:11:00 executing program 4: 03:11:00 executing program 5: 03:11:00 executing program 3: 03:11:00 executing program 5: 03:11:00 executing program 0: 03:11:00 executing program 2: 03:11:00 executing program 1: 03:11:00 executing program 3: 03:11:00 executing program 4: 03:11:00 executing program 2: 03:11:01 executing program 5: 03:11:01 executing program 0: 03:11:01 executing program 1: 03:11:01 executing program 3: 03:11:01 executing program 2: 03:11:01 executing program 4: 03:11:01 executing program 5: 03:11:01 executing program 0: 03:11:01 executing program 1: 03:11:01 executing program 2: 03:11:01 executing program 3: 03:11:01 executing program 4: 03:11:01 executing program 2: 03:11:01 executing program 5: 03:11:01 executing program 0: 03:11:01 executing program 1: 03:11:01 executing program 3: 03:11:01 executing program 4: 03:11:01 executing program 2: 03:11:01 executing program 5: 03:11:01 executing program 1: 03:11:01 executing program 0: 03:11:01 executing program 3: 03:11:01 executing program 4: 03:11:01 executing program 5: 03:11:01 executing program 2: 03:11:01 executing program 1: 03:11:01 executing program 0: 03:11:01 executing program 3: 03:11:01 executing program 4: 03:11:01 executing program 5: 03:11:01 executing program 2: 03:11:01 executing program 1: 03:11:01 executing program 0: 03:11:01 executing program 3: 03:11:01 executing program 2: 03:11:01 executing program 1: 03:11:01 executing program 3: 03:11:01 executing program 5: 03:11:01 executing program 0: 03:11:01 executing program 2: 03:11:01 executing program 4: 03:11:01 executing program 3: 03:11:01 executing program 1: 03:11:01 executing program 5: 03:11:01 executing program 0: 03:11:01 executing program 3: 03:11:01 executing program 5: 03:11:01 executing program 2: 03:11:01 executing program 1: 03:11:01 executing program 4: 03:11:02 executing program 3: 03:11:02 executing program 4: 03:11:02 executing program 0: 03:11:02 executing program 1: 03:11:02 executing program 2: 03:11:02 executing program 5: 03:11:02 executing program 0: 03:11:02 executing program 4: 03:11:02 executing program 3: 03:11:02 executing program 1: 03:11:02 executing program 2: 03:11:02 executing program 5: 03:11:02 executing program 4: 03:11:02 executing program 0: 03:11:02 executing program 3: 03:11:02 executing program 2: 03:11:02 executing program 1: 03:11:02 executing program 4: 03:11:02 executing program 0: 03:11:02 executing program 5: 03:11:02 executing program 3: 03:11:02 executing program 0: 03:11:02 executing program 5: 03:11:02 executing program 2: 03:11:02 executing program 1: 03:11:02 executing program 4: 03:11:02 executing program 4: 03:11:02 executing program 3: 03:11:02 executing program 1: 03:11:02 executing program 5: 03:11:02 executing program 0: 03:11:02 executing program 2: 03:11:02 executing program 3: 03:11:02 executing program 5: 03:11:02 executing program 1: 03:11:02 executing program 4: 03:11:02 executing program 3: 03:11:02 executing program 5: 03:11:02 executing program 0: 03:11:02 executing program 2: 03:11:02 executing program 4: 03:11:02 executing program 1: 03:11:02 executing program 3: 03:11:02 executing program 5: 03:11:02 executing program 3: 03:11:02 executing program 0: 03:11:02 executing program 2: 03:11:02 executing program 5: 03:11:02 executing program 4: 03:11:02 executing program 1: 03:11:02 executing program 5: 03:11:02 executing program 2: 03:11:02 executing program 3: 03:11:02 executing program 1: 03:11:02 executing program 0: 03:11:02 executing program 4: 03:11:03 executing program 1: 03:11:03 executing program 0: 03:11:03 executing program 5: 03:11:03 executing program 2: 03:11:03 executing program 3: 03:11:03 executing program 4: 03:11:03 executing program 1: 03:11:03 executing program 5: 03:11:03 executing program 0: 03:11:03 executing program 2: 03:11:03 executing program 3: 03:11:03 executing program 4: 03:11:03 executing program 5: 03:11:03 executing program 1: 03:11:03 executing program 0: 03:11:03 executing program 2: 03:11:03 executing program 3: 03:11:03 executing program 5: 03:11:03 executing program 4: 03:11:03 executing program 1: 03:11:03 executing program 0: 03:11:03 executing program 2: 03:11:03 executing program 3: 03:11:03 executing program 5: 03:11:03 executing program 1: 03:11:03 executing program 0: 03:11:03 executing program 4: 03:11:03 executing program 2: 03:11:03 executing program 3: 03:11:03 executing program 1: 03:11:03 executing program 5: 03:11:03 executing program 0: 03:11:03 executing program 4: 03:11:03 executing program 2: 03:11:03 executing program 3: 03:11:03 executing program 5: 03:11:03 executing program 1: 03:11:03 executing program 0: 03:11:03 executing program 4: 03:11:03 executing program 3: 03:11:03 executing program 1: 03:11:03 executing program 5: 03:11:03 executing program 4: 03:11:03 executing program 2: 03:11:03 executing program 3: 03:11:03 executing program 0: 03:11:03 executing program 5: 03:11:03 executing program 1: 03:11:03 executing program 4: 03:11:03 executing program 2: 03:11:03 executing program 0: 03:11:03 executing program 3: 03:11:03 executing program 5: 03:11:03 executing program 4: 03:11:03 executing program 1: 03:11:03 executing program 2: 03:11:03 executing program 0: 03:11:04 executing program 3: 03:11:04 executing program 5: 03:11:04 executing program 2: 03:11:04 executing program 0: 03:11:04 executing program 4: 03:11:04 executing program 5: 03:11:04 executing program 3: 03:11:04 executing program 1: 03:11:04 executing program 0: 03:11:04 executing program 4: 03:11:04 executing program 2: 03:11:04 executing program 1: 03:11:04 executing program 5: 03:11:04 executing program 3: 03:11:04 executing program 0: 03:11:04 executing program 4: 03:11:04 executing program 3: 03:11:04 executing program 2: 03:11:04 executing program 1: 03:11:04 executing program 5: 03:11:04 executing program 2: 03:11:04 executing program 3: 03:11:04 executing program 0: 03:11:04 executing program 1: 03:11:04 executing program 4: 03:11:04 executing program 5: 03:11:04 executing program 1: 03:11:04 executing program 2: 03:11:04 executing program 3: 03:11:04 executing program 5: 03:11:04 executing program 4: 03:11:04 executing program 0: 03:11:04 executing program 2: 03:11:04 executing program 3: 03:11:04 executing program 1: 03:11:04 executing program 0: 03:11:04 executing program 5: 03:11:04 executing program 4: 03:11:04 executing program 2: 03:11:04 executing program 3: 03:11:04 executing program 4: 03:11:04 executing program 0: 03:11:04 executing program 1: 03:11:04 executing program 5: 03:11:04 executing program 2: 03:11:04 executing program 4: 03:11:04 executing program 3: 03:11:04 executing program 0: 03:11:04 executing program 5: 03:11:04 executing program 1: 03:11:04 executing program 2: 03:11:04 executing program 4: 03:11:04 executing program 3: 03:11:04 executing program 0: 03:11:04 executing program 5: 03:11:04 executing program 2: 03:11:04 executing program 1: 03:11:04 executing program 3: 03:11:04 executing program 5: 03:11:04 executing program 0: 03:11:05 executing program 4: 03:11:05 executing program 2: 03:11:05 executing program 1: 03:11:05 executing program 3: 03:11:05 executing program 5: 03:11:05 executing program 0: 03:11:05 executing program 4: 03:11:05 executing program 2: 03:11:05 executing program 3: 03:11:05 executing program 1: 03:11:05 executing program 5: 03:11:05 executing program 2: 03:11:05 executing program 4: 03:11:05 executing program 0: 03:11:05 executing program 1: 03:11:05 executing program 5: 03:11:05 executing program 0: 03:11:05 executing program 2: 03:11:05 executing program 3: 03:11:05 executing program 4: 03:11:05 executing program 3: 03:11:05 executing program 5: 03:11:05 executing program 2: 03:11:05 executing program 1: 03:11:05 executing program 0: 03:11:05 executing program 4: 03:11:05 executing program 3: 03:11:05 executing program 5: 03:11:05 executing program 3: 03:11:05 executing program 2: 03:11:05 executing program 4: 03:11:05 executing program 0: 03:11:05 executing program 1: 03:11:05 executing program 3: 03:11:05 executing program 4: 03:11:05 executing program 0: 03:11:05 executing program 2: 03:11:05 executing program 5: 03:11:05 executing program 3: 03:11:05 executing program 1: 03:11:05 executing program 4: 03:11:05 executing program 5: 03:11:05 executing program 1: 03:11:05 executing program 2: 03:11:05 executing program 3: 03:11:05 executing program 0: 03:11:05 executing program 5: 03:11:05 executing program 3: 03:11:05 executing program 1: 03:11:05 executing program 0: 03:11:05 executing program 2: 03:11:05 executing program 4: 03:11:05 executing program 5: 03:11:05 executing program 3: 03:11:05 executing program 0: 03:11:05 executing program 4: 03:11:05 executing program 1: 03:11:05 executing program 2: 03:11:06 executing program 5: 03:11:06 executing program 4: 03:11:06 executing program 3: 03:11:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000000)=[{{&(0x7f00000001c0)={0xa, 0x2, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@hoplimit={{0x14, 0x29, 0x3e}}], 0x18}}], 0x1, 0x9094) 03:11:06 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="252f09214a5549c3792b3a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, 0x0) 03:11:06 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$sock(r0, &(0x7f0000002880)=[{{&(0x7f0000000240)=@in6={0xa, 0x0, 0x0, @private1}, 0x80, &(0x7f0000000500)=[{&(0x7f00000002c0)="1c", 0x1}], 0x1}}, {{&(0x7f0000000680)=@tipc, 0x80, &(0x7f0000000880)=[{&(0x7f0000000700)='+', 0xffffffc0}], 0x1}}], 0x2, 0x20000840) 03:11:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1a, 0x4, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], {0x95, 0x0, 0x0, 0x7f010000}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:11:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x1ffbffe) fallocate(r0, 0x10, 0x1, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r1}) 03:11:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') unshare(0x2000400) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r2 = openat(r1, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) preadv(r2, 0x0, 0x0, 0x0, 0x0) 03:11:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="fc"], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0xc, 0x0, &(0x7f0000000000)) 03:11:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MULTICAST_ROUTER={0x5, 0x19, 0x2}]}}}]}, 0x44}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = epoll_create1(0x0) fcntl$dupfd(r3, 0x0, r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_MULTICAST_ROUTER={0x5}]}}}]}, 0x44}}, 0x0) 03:11:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x34, r1, 0x1, 0x0, 0x0, {}, [@GTPA_LINK={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @private}, @GTPA_PEER_ADDRESS={0x8, 0x4, @private}, @GTPA_VERSION={0x8, 0x2, 0x2}]}, 0x34}}, 0x0) 03:11:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x6, 0x9, 0x0, &(0x7f0000000080)) 03:11:06 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000340)='X', 0x1, 0xfffffffffffffffb) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) keyctl$read(0xb, r0, 0x0, 0x0) 03:11:06 executing program 1: syz_emit_ethernet(0x1b9, &(0x7f0000000b00)={@link_local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0300", 0x183, 0x2c, 0x0, @private0, @mcast2, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @remote, [{0x0, 0x1f, "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"}, {0x0, 0xd, "91700a1a98d57deebfe4392445df44c47ab15660c40b2d6507d047fe2e14c718b2c54b697e3d3b283da28a820ad2e46e7accd2442c4353bd50e89ba638b07abf9063a7cd1f5c68bb8d5d877ecf2012bc8f392134d9e53cac3a5ff317d444fa903302c826a05fb573514e212b32"}]}}}}}}, 0x0) 03:11:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x6, 0x9, 0x0, &(0x7f0000000080)) 03:11:06 executing program 0: r0 = socket$phonet(0x23, 0x2, 0x1) sendto$phonet(r0, &(0x7f00000002c0)="97", 0x200002c1, 0x0, &(0x7f00000000c0), 0x10) 03:11:06 executing program 4: r0 = shmget(0x3, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) 03:11:06 executing program 3: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) write(r3, &(0x7f0000000100), 0xfffffe5d) write(r1, &(0x7f0000000100), 0xfffffe5d) execve(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 03:11:06 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x1, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, r0, 0x0, 0xfffffffe}, 0x40) 03:11:06 executing program 5: 03:11:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x6, 0x9, 0x0, &(0x7f0000000080)) 03:11:06 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) splice(r2, 0x0, r0, 0x0, 0x8, 0x0) 03:11:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x80000000004) write(r0, &(0x7f0000000140)="290000001400031c00000000000000eb0100100006a40e071d6c00007f25ffffff0100002a00f3ff09", 0x29) 03:11:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000380)='ethtool\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000380)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x20, r1, 0xa23f19f29c7d7dfd, 0x0, 0x0, {0x8}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x20}}, 0x0) 03:11:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a0265ef0b007c05e87c55a1bc000900b8000699030000000500150006008178a8001600400003400200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:11:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x6, 0x9, 0x0, &(0x7f0000000080)) 03:11:06 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x1000001c}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r1, &(0x7f0000000080)=[{}], 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:11:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, 0x0, 0x0) [ 161.885276] IPv6: NLM_F_CREATE should be specified when creating new route [ 161.926255] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.1'. 03:11:06 executing program 2: getsockopt$inet6_opts(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000080)) [ 161.982388] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 03:11:06 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@mpol={'mpol', 0x3d, {'interleave'}}, 0x30}], [], 0x9}) 03:11:06 executing program 5: r0 = socket(0x15, 0x5, 0x0) getsockopt(r0, 0x200000000114, 0x271c, 0x0, &(0x7f0000000000)) 03:11:06 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0xb605}}], 0xc6, 0x0) 03:11:06 executing program 2: getsockopt$inet6_opts(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000080)) 03:11:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x12, 0xc, 0x4, 0x7fffffff}, 0x40) 03:11:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a0265ef0b007c05e87c55a1bc000900b8000699030000000500150006008178a8001600400003400200000003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 03:11:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_IPPROTO={0x5}]}, 0x1c}}, 0x0) [ 162.208233] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.1'. 03:11:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in=@local, @in6=@mcast2}, {@in6=@empty, 0x0, 0x32}, @in=@empty, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @extra_flags={0x8}]}, 0x140}}, 0x0) 03:11:07 executing program 2: getsockopt$inet6_opts(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000080)) [ 162.257252] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 03:11:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x41) r1 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x00\x00\x00\x00\xb6\x81Q\xe7\x14\xfb\x15\xf7zoJ3\xe908\xb5\x98;\x86\xaeR\xf4\x92\xd0t~\xf97f4I\xec\xc9t\x05\xd4\xfb\xe8$\x8f\xe1\xc9\xc1JZ{8\xffO\xa2&\xa4\x90gU\xae{_Cc0\xa0\xee\'\xf7\xe4\x19\xa2\x01\x19&\xd2\'Wg\x93\xdc\x00\xa07\xcf\xd4\x8a\xa3\xf5\x9e\x00\x00\x00\x00\x00\x00\x00\x00\xa2\x9f\xf6S\xe6t\xc7_PB', 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000000280)="9f", 0x1}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x2000005) 03:11:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000240), 0x4) 03:11:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, 0x2, 0x1, 0xff0b, 0x0, 0x0, {0x2, 0x2}}, 0x14}}, 0x0) 03:11:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/193, 0xc1}], 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x76, &(0x7f0000000300)={r2}, &(0x7f0000000340)=0x10) 03:11:07 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000080)) 03:11:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000000c0)) 03:11:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000440)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x54, r1, 0x1, 0x0, 0x0, {0x2a}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc}, {0xc, 0x8f}}]}, 0x54}}, 0x0) 03:11:07 executing program 0: msgrcv(0x0, 0x0, 0x20000136, 0x0, 0x4800) 03:11:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 03:11:07 executing program 5: setitimer(0x0, &(0x7f0000000000)={{}, {0x7000000000000000}}, 0x0) 03:11:07 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:07 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000080)) 03:11:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) preadv2(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:11:07 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000100)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}) 03:11:07 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000080)={'security\x00', 0x4, [{0x29c}, {}, {}, {}]}, 0x68) 03:11:07 executing program 3: r0 = memfd_create(&(0x7f0000000240)='-B\xd5NI\xc5j\f\xba:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\xa2\xcf\xaa` >T\xec\xaent\xdc\x92\x8bCc\xad\x89\x9ck\xde\xc5\xe96\bU\xa9=\xcdJp\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xbb$4\xd6\xfe7\x0f\x00\x02\x00\x00\x00\x00\x00\x00\xc9\xbd\xd3g@\xe1\'s3\xccP\f\x90\xf2\xcdr\xb8(\xdf\x02\xc8\xaf\x97{\x18p[\xe8\xf05 ;&\xa8\xf4\xdc\xacaH\x1f\x99\xeb\xc8\xb2\x17\xfbmq{}!\xa0\x9b\f\xb9\xf1\xa4\x1e\xd0\x81\xb7\x06\xd5_\r\x7fT~\xd8\xde4v\xf5\xef\x16\x85#\r\x1dK^1)u\x83\xde\xd2bGX\xc3\x90\x02k!\xe1\x1ce0\xf1\xbd\x80\x01\x00\x00\x00\x00\x00\x00\x00\xa4%\x8e?;\x98B\xa5\xb4O\xad\x18\xdb/\x83MR\xc4\xb8\x1fe\xd2#\x1f\x1c\x80\xbd\x10B\xe7\xeeN\xfa\xc2K\xf8\x14\xb4\x03\xa9\x1dmn\xe1\x1d\xda\xad\xbf$G4\xfbl\xa5\x04\xd0\xda9\xed6{\xac\rLP\x9f?\xdd\x18\x01W\x91\xe1\x06\xc0\xb8A\xe3\n\x81Al\x1b\x16\xbb\x89_\x10\x94\x7f\xb7\x06{\xe8^\xd8\xfdZ$\t\xdbh(K\v\xae[\x9f^+\xaf\x03\xe6U\xf7\xad\b\xfd\x9c\\\x8c`\xad#\x12x\xab\xc0\xab\xfc\xec6\x9f\xe1o\x97A*(\x9f#\xf2\xc66\xdc\xf5(<\xad\xe9\xae\x94\xe2\x1c8\x02\xa7\xba\xa3\x93\xf6\xd3^\x18D\xd7\x16.J\xe4\xfaS\xa1?', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) utime(0x0, &(0x7f0000000100)) 03:11:07 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000080)) 03:11:07 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:07 executing program 0: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="cefaad1b000e0000ff7f", 0xa}, {&(0x7f0000010100)="0200000007000000080000001f0e000002", 0x11, 0x200}], 0x0, &(0x7f0000000180)=ANY=[]) 03:11:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) getsockname(r2, &(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000026c0)=@bridge_newvlan={0x28, 0x70, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}, [@BRIDGE_VLANDB_ENTRY={0x10, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_TUNNEL_INFO={0xc, 0x4, 0x0, 0x1, @BRIDGE_VLANDB_TINFO_ID={0x8}}}]}, 0x28}}, 0x0) 03:11:07 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x6, 0x0, 0x0, &(0x7f0000000080)) [ 162.850494] BFS-fs: bfs_fill_super(): loop0 is unclean, continuing 03:11:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x20}) pwritev(r0, &(0x7f0000000500)=[{&(0x7f0000001340)='+', 0x1}], 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0}) 03:11:07 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x2, 0x200000003, 0x21) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) write$P9_RUNLINKAT(r1, &(0x7f0000000080)={0x7}, 0x7) connect$inet(r2, &(0x7f0000001280)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19401, 0x0) 03:11:07 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) r1 = socket(0x22, 0x2, 0x4) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000300)=0x2020, 0x4) recvmsg$can_bcm(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x12101) setsockopt$inet_tcp_int(r1, 0x6, 0x12, &(0x7f0000000000)=0x3, 0x4) socket$unix(0x1, 0x5, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000640)="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", 0x1e5, 0x40007bd, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000100)=0x80000008, 0x4) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x0, 0x0, 0xfffffffffffffd25) [ 162.938863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=112 sclass=netlink_route_socket pid=9304 comm=syz-executor.5 03:11:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x6, 0x0, 0x0, &(0x7f0000000080)) 03:11:07 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) [ 163.008616] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=112 sclass=netlink_route_socket pid=9318 comm=syz-executor.5 03:11:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x20}) pwritev(r0, &(0x7f0000000500)=[{&(0x7f0000001340)='+', 0x1}], 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0}) 03:11:07 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:11:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0xc, &(0x7f0000000040)=0x7f, 0x4) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000100)={0x24, 0x1a, 0x201, 0x0, 0x0, "", [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, [0x2]}}]}, 0x24}], 0x1}, 0x0) 03:11:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x6, 0x0, 0x0, &(0x7f0000000080)) 03:11:07 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:08 executing program 3: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @local}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000040)={@multicast2, @local, @local}, 0xc) 03:11:08 executing program 5: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, 0x0, 0x37cb1133) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 03:11:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x6, 0x9, 0x0, 0x0) 03:11:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x3, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x55) 03:11:08 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:08 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') 03:11:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x6, 0x9, 0x0, 0x0) 03:11:08 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:08 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x169a01) ioctl$LOOP_SET_STATUS64(r0, 0x127f, &(0x7f00000001c0)={0xa00, 0x60000, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "b470058200f4b8010000804d000060554f9f5bb53500000000000000001f00000000000000002000", "d31e99c600575a02b8ad7e545b0000000b870100f5ff0008c19881dabb1d650504400000006f00008f699682431483812a4f9665080000008fe1abd1a74719a4", "000d97000000000000000006028000000000002c0000001700"}) 03:11:08 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000340)={'wg1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'ip6tnl0\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}) 03:11:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x6, 0x9, 0x0, 0x0) 03:11:08 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:08 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1b, 0x5}, 0x40) 03:11:08 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:08 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{0xfffffffc}}}}]}, 0x78}}, 0x0) 03:11:08 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x24002, 0x0) fcntl$setlease(r0, 0x400, 0x0) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='./bus\x00') 03:11:08 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) keyctl$get_persistent(0x3, 0x0, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:08 executing program 0: r0 = socket(0x23, 0x2, 0x0) sendto$l2tp6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x23, 0x11, 0x0, @remote}, 0x20) 03:11:08 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:09 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454ca, 0x400000) ioctl$KDSETLED(r0, 0x4b32, 0x0) [ 164.159526] audit: type=1804 audit(1601176268.957:9): pid=9407 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir351316350/syzkaller.CrlSsE/164/file0" dev="sda1" ino=15871 res=1 03:11:09 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$inet(0x2b, 0x801, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) 03:11:09 executing program 3: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080)='mptcp_pm\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x14, r0, 0x1}, 0x14}}, 0x0) 03:11:09 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) keyctl$get_persistent(0x3, 0x0, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f00000007c0)={[{@iocharset={'iocharset', 0x3d, 'utf8'}}]}) 03:11:09 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 164.279968] audit: type=1804 audit(1601176268.997:10): pid=9407 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir351316350/syzkaller.CrlSsE/164/file0" dev="sda1" ino=15826 res=1 03:11:09 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) link(&(0x7f0000000000)='./file0\x00', 0x0) 03:11:09 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) keyctl$get_persistent(0x3, 0x0, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) [ 164.354548] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! 03:11:09 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:09 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x41, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/sem\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20000000005) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r1, 0xfffffffffffffffe) r2 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x10d082) memfd_create(&(0x7f0000000640)='\xbb\x02\xb1\xed\x96\xdb\xb1,\x11@\xa1\x00\xff\xff\xad\x01\xc3@\x00\x00\x00\x00\x00\x00\t\xd8\xc3bh8\x9e\xbf/\xe3\xb9B\x93J\x00\x00\x00\x00\xfd\x00\xa9\x89tG1\xb3\xd5;(\xdd\xeep\x9a\xe6\xe1\xb5\x15\xd9\x13\xc9\xd3\xf6\x06jt\xea\xf9l\x13\x00\x00Z\x9a{\xf4\xe1.9\nIw\xe21\f\xbf\x1c\x00\x00\xdb\x91\xbf\xb1E\xe3\r\t\x9a\xa2?\xfd\xf6\xbc++\x13\xdc]\xe4\x15F\xf9^{\x9c-\b\xfc\xf2\xa7\xec\xd5f(\xffd\'\x94\xb0 \xe8\x94\xf7\x8e\xb77\xb6-\xf6E\xe5\x92\xa26\xd4c\xca\xabZF\x90\x8a\xf9\xbd\xea\xeaY\xe43\xec\xca\ft\x06\x8c~\xd5]\x05\x92\xb7\xcaw\xd0\x17-O\xd4\xf8-f\xe7\xb0\x96Wl>>\xe9\xbfO\xcc:+\f\x86\xfd\xc8i\x022\x93\xc6\x02\x00\x00\x00\x00\x00\x00\x00X\x83\xcd\x0f\xee|\xcb$\"\xef\xbf3\xf4\xed\x92\x92\xf6\xe0\x8e\xf4\xe7\xf23F\x83\xb1\xebc(S\xfc\x15\xe4\x9f\x1b\x97\xc9u\xd2\x9bQI\xc0\xb9n\xc3\xa1\xcd\xb7;\xc7\x967S\x87\xd1\xd7\x1a,\xd5\xd2\x92\xa7\xfdz\xba\xeex\x18\x8d\xc7\xb8\x93&\xf1\x90;3Oc0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) [ 164.469055] FAT-fs (loop2): Can't find a valid FAT filesystem 03:11:09 executing program 3: r0 = memfd_create(&(0x7f0000000240)='t\bnu\x8c\xc4', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000380)="d5", 0x1}], 0x1, 0x881806, 0x0) read(r0, 0x0, 0x0) 03:11:09 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 164.550377] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 164.587487] FAT-fs (loop2): bogus number of reserved sectors 03:11:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x404c000) 03:11:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf0, 0xf0, 0x2, [@const, @ptr, @union={0x0, 0x9, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @ptr]}}, 0x0, 0x10a}, 0xe1) [ 164.618815] FAT-fs (loop2): Can't find a valid FAT filesystem 03:11:09 executing program 2: 03:11:09 executing program 0: msgrcv(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) 03:11:09 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:09 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:09 executing program 3: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, 0x0, 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x200000040, 0x0) 03:11:09 executing program 5: ioprio_set$uid(0x3, 0x0, 0x6400) 03:11:09 executing program 0: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) 03:11:09 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:09 executing program 5: r0 = socket(0x2, 0x3, 0x200000000000ff) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bridge_slave_1\x00', &(0x7f0000000000)=@ethtool_gstrings={0x1b, 0x4}}) 03:11:09 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:09 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000000)={@link_local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0300", 0x10, 0x3a, 0x0, @private0, @mcast2, {[], @ni={0x8c}}}}}}, 0x0) 03:11:09 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:09 executing program 2: r0 = semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000000)=""/149) 03:11:09 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:09 executing program 0: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)) 03:11:09 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@local, @in=@private, 0x0, 0x0, 0x4e23, 0xfffe, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x3c}, 0x0, @in6=@loopback}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:11:10 executing program 3: syz_emit_ethernet(0x56, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa88a8"], 0x0) 03:11:10 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:10 executing program 2: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) 03:11:10 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:10 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00000dd000/0x2000)=nil, 0x2) 03:11:10 executing program 5: r0 = socket(0x15, 0x5, 0x0) setsockopt$inet_int(r0, 0x114, 0x0, 0x0, 0x0) 03:11:10 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:10 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000340)=""/40, 0x0}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) 03:11:10 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x455b, 0x4, 0x3}) 03:11:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1}]}}, &(0x7f0000000340)=""/4096, 0x2a, 0x1000, 0x200}, 0x20) 03:11:10 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:10 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)={0x100000000000}) 03:11:10 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:10 executing program 3: syz_mount_image$qnx6(&(0x7f0000000080)='qnx6\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000004c0)={[{}]}) 03:11:10 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x455b, 0x4, 0x3}) 03:11:10 executing program 0: syz_emit_ethernet(0x46, &(0x7f00000000c0)={@local, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010101, @local}, @parameter_prob={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89, 0x0, @loopback, @broadcast}, "1e461881f13aebc6"}}}}}, 0x0) 03:11:10 executing program 2: setitimer(0x0, &(0x7f0000000140)={{0xffffffffffffffff, 0x10000}, {0x0, 0x80000001}}, 0x0) 03:11:10 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:10 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:10 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000010c0)=ANY=[], 0x180}}, 0x0) 03:11:10 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x455b, 0x4, 0x3}) 03:11:10 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000047c0)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000002540)={0xa, 0x4ea3, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="300000000000000029000000360000002b02000000000000c910ff010000000000000000000000000001000000000000f81000000000000029000000360000003b1b000000000000c910fe8000000000000000000000000000bb40aa7100b139774b7bcb601b33c065d791bd8e3bd595135003b540e19ec66431a680b1d11540ae9503ebbcc178c17d34456a593275a282f1c93ed3ad5e1be73480f56e76f1a27aba5035c420909e7ddede8bbe72221909df69d9f7e653abdd68779b9a6eacbcb026b09e3c540efbc7f060286bf4c45df526106647a94f122eeef40572f2702da70f5e4a8bd66b5f4f59f2fc9fda5941d7f5888cc079330b4228a9eedb5366ce49ff66e1e45b7900a658ce53dc1eeab28267b180e3470aa565d4d26e142604b37a73f05a0a8eef3aa14e42a099bbc01adb5daf3cbe8d7052f7980636e6d305584b32096d6acaadba19d00d59baf876afc0030ed070402bdf53d91227dc1af93049a2d4b44e80d4a205c3de60de041d5fa9147b51478693af86dd3f78329d402efb261296d190bd1639f49bb5b6e6a522c4e0c57777ac2ce27a3926b493e281885946ef817845e3826fbe238ddd1cc7145bdfb7055f80676b50cb1e80eb549ccb655b2c354e07299939d4e5b332b6a15723773dfdc5ddd2eca653af5da708ceedad51e7d1a28267cad90c18a3f6b351fd9fd3cca539250d19b5b96a5358aa96a1a4160eb1a3c0198f0170fa4f90ab2643e9eea388a07cb91bd3d6211b570e57ea55b5a6b8389c23be0dc1b1cf1895802e4bb4f9cec49744b119d9c7671ff3ed910ec37815a29663da6bd42baddea9de0a94ee8288b1beeb291e34b35bc31719fb1d816ddd7af15c0257cc01a4b7e9a8905d615f4c006e03f4fae1f046c8ff4580f4b5598219426806aa7934337c016e6855ec4f2a2a8f2e7cf42f9957d2f9510050f597763725cb5e5e7a1ac5c4aa1aec2d03b7ef33b1bd2efd3b1e3ec09e829fa5186df3dbf493b76e050c001fb1b8cd72e60dfd4b8eb6be9c2491a72bf334d69d8dd17072685fc3b5e5275cbcc2f0036da2c05dc344fd211b0fd03833943030db2a923ec7532fec828eb051a60488ff1840b07d5e6070403f9fad4f5d8c7216a31259984dfe71e02b391dca6b693c46df5b2799286544331d584c873b77e5d9214853d428066e393aa599419b2b35153bfc9fcb7b71df62414db987de93de5ed140c1947ff72a9281ec88907aadc99b62cf0150248496c1d7293b16cbbb9d22034dbb69dbefa9a5433d828a02891921dda3f1180f8a955f9eb1af1a07815ab99b5f59baf4d849474d0288545049a811045fc607b663051e3870a1f7e0bdda638f01b806700754c3f2db9cfd42defd2bb4216ab5796fa41a95ad7d3e9d5fe0b3f3847cde8e09a5efb238da478dd116f9b66205491c9e4ad9fddc99ba3e3e4a49495d2439a3a6c66de03e9cae55fba98b0f9230f1bf2fbe7fb7a10f9ca542cfed5b4476ff8487f9a9142552df06ffe3968ee10f1f751feb1834db97c4d33956ea98c62cca1c90301d3f35fb433b8d7485adeeed8df9351f24f3a4f8f2ec32ccda2b4aae428b9500e0d33c9c493204d6c84c75c862103913fe68a207df9ed1981f5009873aed4842a48388f953ab4beae9d6fc1c80011fa1c37e0ba5a17def1b28e456b894ae73650033ca5e8dc4e68ceea71de70b78e001687c005e4c6b6a44c692713d40f812655ceb3a1559e1884d37c5ef4eb97574fc4fa4e32264fc875ff1e10ea484f7e2754e93c9e1f9400cc835a042afa76ebc869a1e4b90ad40ded267ef4dd83d6ee8fda95418a25d65592a784d014c57eb60d5c4a9fe7d5d4cd89b4fa47d860ce652e62c84c3a12e4d5e0f42d36842c28e3b4695cea5cc7ed33ad581245f518188d5e3a1fe5b375487c33dc48d5923f00e1ab14b2d106d2ed76bbd50b03f2db5e02822a1b2a3f69ff67431e51adcc70da2fcd54080818cfad6a51b7adaa60d156082193e38856d7349db18787a78a2b0a0317b5ffdd01035ca91250c312ad045876f59db69184c40ccb2055624832134058ed6a74dec523d21a3445d2e69b16703a37283550591d8fa3506a79594c262c48fd43c862650e0157eab5185815929a91e1a408c276d24ee16a83d95d326b40e8d4114ff43e4e87a9ac56395fafca480b804d39ca79fe1f6e9f0d6c6b5558fa073063619f60f821b3fbcba7a0607bd5f3f24c8a045fcc03c4a034f710f32ff7b8a6d7cda01023f8e2e1203c65047d0cb332af8cea9ec5a4fe9338ce329a86e20d3afe17d97167692d10d8621b192c796d5879189c9bec32a81f7cde3e031ece49ea8da42c1409be1c6628c2a90db4c959ba5ea66d36092f9b93ba95ce9c682354b9b4d1acf4a41aca0c5b03ea743be40d04fbb95f8134bc23f16d2fa1eb7ca7ba6944c80620a3972998c31a0d3c6adca066ea9e4e9368442f86b91d2f7cbc1a016a1db265de42faa925556b11cceafaa073457c57f79fc2cff67814ea2025a494ae2984b31c9eb14093e8d934d67d527748d75df5ed0a9ce07886d807c057584822081d4faf30b4b3baf834804f54da206d0f2702f4ff00a697782a9c9bf7d325c8ec9acc3aaf9479b3be45d159329e1f1d80045bbfb424b5664b24576f8b58d52cd49445e562d38215122d9bc6717561d7c03f91ff57bcfbd4a5b886e097d276c9a309006270b9bc5d09c4a69ec173fcbca2c9ee4ef8efaf00836f56c526987db317490335133cdcf3b5f09ad6b4e5818ec99a85124d104ea645309629751d8f21b7dcb0227ebb78090c71227d498f39d4846f0760100ada47fa60e67e068aaa046ef2a70e40c295e724538e00c2b44b955d96093d02e0bc20acfcf53cc04e126673127d5b4448e510c99ac1ee789caa3264bb09872959d1a5f6311b5826c63fd1bdb61319cf14c1364b7d632e30919f705768765d3ed4051e244180a66badd76435618c10f656fb5bafd0302f3689b4c9c1bf019e7980ff0d9d0b784caa1b62306d8432aa376dc11baf9ad421a796e92256af0e43f4c1629f818d82e4b088b5d5496fa08a210bb8c78c562902b69bd4c353a758dc663559f1442ab7c6868a2ac47a42ea1237dbc0cf3cf873c3d1e9db1d3ff1d7c8da11d005b1e88b21c8b2107fa6a31bec8b6a3127085059b292e266084a54689c6516cae4d73a74413b8369b788b083012e2c71031a937eab37503508aacc28b02ddc66407cf2efe634277df076fa9abd47dced172497712120c3f31e1fc2a3a217783a52406b864e963305eefa7adbbd1e52f2a4c0037d7634d73d2a7ffc598b6deeab7a437aea1f48320bbd22bd36b957d7f96a89461e7ba10c211cd08d591be3b65d63708a0055d3db37ee5e84cb905fca24e7e6c1e1f59f2164498e53714d3717d657e3b75b2b89ffb8e14f965e3ef8b87c5ac411ccd7ced0e5b4fc5c54af9ac79320f218e210d5ec54c15e1fd1f860eff918372583ea64a597bad8c5f29e36ed421bf394580f2cb706bfb185e73a9c5c36f2335dbf0c973a99e0bf38a263a9874ee6ef8f30e19519bc19114ac6e9461173d4b98dc945c528300c7166ff7be0cd3d04626168a543a5034c41adf14bfcfad01c3117c994dbb5b6479afc1cd7dd96732247bac0f64eaff5baeacff5225d8f7146c372d8cfcdc0078a4e01daebb7e89afd15a6717400dedb9c1d270a9a4e03c5dfddd18bbcd383d759433bfa39aa03f8a6578e72e569b372a43f5de8ad54c8d7170e327888f27e0dac99580bf4fa21701b29021a18cbcef311ffa17d3061f85e21d556d59bcd19700049b5f38d030dc6a0ac54b8288596451b16786d4af686234301224828aa9aa626705fbe5b896ffd8613bf622e05d6e6054f1b7039fc07f8e1a6c7c60f9605d96d5ebfc9ec0bfefbc87fb6426f854d0fd3405fc2c36f525ecb3d0881f77d79dd0fb07a173d1e9012b7ff61545fdfeffcaa5f5b793757b19c79fcd6354a8f1ec2434e1976db5ddd008204cc399256fc255ceaa6e8a8420ecd8b82917d53e8b4b8300f536c5a492874587147c414432777904ac103090838eba5808451b8d435d7866845d72866b44442c2bdc7bfd441844e53edf94216871b1d4dd8afa3b95cd19266e30ff0159f1b177284810ebbf85cf81765051a47ecd6302e96884eeff8f9731e493ceb1f0d72a19ccf661dcdc8c6a2cd807f4b550c684fe6bac06934b6b325a87f94410143f9a3cd01881bf3e278f4ab4be00e25ae47e44805b4f14f6a207458b058a751c26feca901f34fff4ef728f3bcfeb2947859cfda4c9e01406b020c2f94ff6d9b028340e42f2967d3d23b2b2f9272882d17a859ed735bb90567aac57051f9b014a9cd800e54d551f195ce83c93554133794cf43efb3d8c0ccf0dce4959d0a822f90f5ad1ab383027d94cdc97ad63cb27bbcfd2dd63a8d894c8333f9073a4cf3d6353d5e16f939956de78219346981c42346c0855a8c5293658a991f4a70c5c6d889b962d80ecefe53af07bc526c055d7f96d5ee9a5b444edec382ab09f250cd02e2d9ebe6a01a892dcb85069a18e37aeee4dd4073187c49a1951219deb7ca194f4db2cfce69a02a2cb75af273812ce919d85af7e6459a7a89f18f025ca740da2f95c970f6622e70c0428c2015d5e0caafafe435337eadb0696f5f40dee73a01c06b18f614826523a7958618849ceff5e3ce4584733c57c3f289f8bb8addfdfbe82a9dcc094f91519feb6ce9d0e08be5c81d9b7457d4546b67daf32d4383115002235d4efa22135e1ddcc42d34686079d48e5c22b59cbb007c5aa48e3392135b528e74ec8f2a8a5d79392d93548061a4a562af3a244c43b8a4302ad032ab34efa133d8c551842eb99f9ad773b6231917c5a6053c044562b7a30bdf170fcec65e85f3ef47265e6f97664653cd7c1cfb5905fe886a704858eecef541fd4c71415a3f2327900e3ad8509b25e375f7d7f9d0a06a6b00987e0d5986fe49c1d57371328834ffdd7c67544672e6f9967761c188c6f5d5e8177eb10e69b9b59a6942b0ffd8124180f4a99c6b7920021cc15e329f0e28bb0fb0d4fba9da6abb2e9818ede149dd621295fb484bb66b8e94076adc23aa301ed5d1be40e0bbc05fc59a3987edb8280a34864b1453ba5ef3f6ea3245b5c85be3378b983363c92fd8f3b233c5fb7c67cf4051df048ed2b785c410a62a30630ad8526fdae39fc5140eade54e30864e72f2bd9f099e355e72b3f40586be6c746077b8792a54ebaa7c7f7d10c0b538a8bb532fef8757e05c60c559fd4c71421b7311c581b3d7bc2aaa4f5b07b900c19e335c9f63a9ddc6c6511e7666de457490ffb8722c60de3ddb24452de6bd9ed26a59dd330f677c51088eaaac2dead0f0d96e138a28c0a6231a0581f388c83ed46ba0e1cc882207ded9fec05fb35ccd9fe4a562c4a970e34e009b39e0c48b7781ecc0f8896950ff1851256d3eafb501f7c9a4d548582075d23d357ddb4b48450bc963a10547f02f112347e075ab7af4378dac6d3db3240b7dc3099fd2de14340620e151f7c9e0bbeaf94f386d90a239a9c9c1ec327ca9a2f718db6300a21ea2025af0c6e1a2013c837b320ddf8e713408a3d9e74a81e374f61041aff77726e6c08fd1af61ea9c8872b87e99b3d5714a99b704ee08bcaa97d43af0ef08fc00a7c3d0806fa0f01c1150e5583d93eb796db6344d7d80eba76281f6f12141219bbde6a869b51a065b1a6dd8b2a80b40ffd564787f85d188722f1f5cd7a5ba6ae44956f4c8b539d898681c796dc2fe10842134d2f41b5204e100c6d41bec1cd104a6fcc30c4570ff71c17e63e41131b8be6c17fc47c1910766ba76069ae742b220f79a2cb97251bfbc76f8c936cbe53d1cd10c01af5bb883f90e98dae8e259c86c7acc59df3d51e74f9f84add516612100b3423edbe102ccb59a8645b47dd0867e8373872bd4723dc4e55952977f7a6b7e324c3279d6a8aff2e1f843cb079819165efc20ae0e6d95a6472f5504388a39ccecbf2c73092b0a1df0419291625bf79b7cc6f186554fd7c1396a8bb0c50faf16311adeb8e2cf8be3abd664e3f612e22c0fac39270b0c8a89ecb104aae536d7e008325710223e446b36c4da482fb8cc06387e1fcb9f7558d0527b8022319306ec3654da068e36edb04482b6c8c8dab72c204fffffc260710000000010202030007000000000000000502000500010000400000000000000029000000360000000305000000000000c2047fffffff07200000000306430800ff0f000000000000ff7f0000000000000000000000000000140000000000000029000000080000000500000000000000301000000000000029000000370000002f02000000000000c204ffff0001000100030043ca2a3a7228ed062bab2a08a0bafd37f2ea8df1405302440a3130d5dec988debc19191241a38f4e716ae7dd30da08e7ac31bb5f8f980db0ef2fe21453688edc8c1e97ab84245fec1772e51189c1ba59a94d0b867271872c384941624a38610719cf00f8ffd02a4a26c5dbea09813f6820ccaccedff33740c052a169fff830dc45c2ff0b49d7c6f2b2da3aea006e549b78e52ff0139dae45cb44424d78a0ce5b07f266e649ec84933b3fea90d2191b19584ccfc3b885f3ab452f7c4bc0946079b03432783049aba7ba20976fa1699ad7a1c338a6258fec1494ad8dea0c430c84570c4eb52abf473b819aa4d92cf6bc72d93588448f18431198ea958b08ee7d4b85ca11e41c496a2f5954e8d22a3068abe33e9199c60695ab5afc783bc8bab0b9bf317a767eefe127e091f9dd9a7bbd5efc3012115c1ef4f56182761b001d981814778a64c4eadfebb85717194dc626d5ff686ded41ad9b5692cf5509d5b05e24e4a97b2a0baf2201adcaae3125551948e0743373ed5013b3edc293a7ddd1b2d218c1acb0e8090a5cff39096dd9185d84dac1d596b405e417eda43d4c97ebfd8193361fed5762dc1074ed053d110b117e23af9031f6949ad700b93f6eb5431c3efd9f003b115d08ef380593042dbd4e58cf3e3a5930336cc5d728e3fdbc42d17e457cc881d2911b79c006c2eae18f3d43741537cc27a9e86c6933023758f4aea390f611820ebba863908d63a3f324872b5b0c068d15675cdb82328705e2ae33a35d099c89a9abb93bf731bb8c0697f16ef768eff8fff8a36b8249f0bfd5b645fbcb29d9eb135a9a52a42b0b9f1d3393edbf50346a1f7f1911c411de7cebd38e69a02aa2e0152eb4c602bdd7f6c4d2e8510e719abc7e0ef32c32de9f8dfbae34d561f98675167c9e841dd49fc481e5b85f03d3213b49f5b9fa8be24e5dd567f4eaa3716c59ba14f1fb89d2b5c70d5145a6ce9fbd915fde8f1559b54f507572122b4e24a7900120dfc09ddca449eff4ab3c0ba96de02f489dc841d96f93fc5d9a931ace4a8330f7261e9f1213e36b10dd4a63756cdc1e80d7e6be03543b8aafea4535dafb81b8ac3c23ab54c3d451730e07f05fb9c9070266ee930dd82437539d38608e8537d6c00f17fb1aa1286e7c85d46796b0c21895c04ee8841bc7d0121b487b461e19b74633240526221db591291e31536d6904566b333d3ab6138e9b7f19b8d13550b38aaf7266ace408ad547f71a831c469e6abda0ec37af8a0b0748ca88389e819ac5f36d3bd2cbc3a08b80c3006740be2930a71ff0793f0a0e119feccd78e38e62629e07252a3fc9c23fc3df352105fae07556b83cadfdc8a786c7629504acac84081df3ddf08e674a58fbbf39f829795e015d3cd823183811aa2c7c4feb75a56e93aa49d024b4648ac5ae27455ef64fe89140e14c2dd5eabcf699170808363c33efb904bd3c34065469c2e0ef5c60cf21553833dddebc279186db20ba7f19bcb2610f19ef4261205e186ab6d779be7b66a4286e63fde175e6a40fbcb512f178253340e8055ab6efd560d56905eb21246c39fb29d58085e7b126435b91442d67c24adb9fcc0a0dda93816c6db26be5e4ab8106531a5edb1c6b7e1f7dd7a45ba6d149fe6d1407e07fe38a1e383107281e7114fcbb81daeec91f04eb4d75ae0601e3c2e5d162a12330ed37507bd1c0bf858663f3ba4843120e76fb165dd1ef5f075dcbb1c6d41a2d5a05d60bd859bea0648d734ae121b7e95e222da651dec25f7ad117e9af1a222f50466d201ca9820f3a34ba335307f51a81cb0a04485e6c2481e127a1098e778a56cfd140f600f3e15c2a1cd10ea012313b6d858c77d329d560e12f51321198134b16ec4aabdb515d1cb14c3d8327763ba0e637b1ac53bc11e18ae906126f952c2836f488a5f40bd0c36022b1bcd84a9e6f9ac41528c6a5a33caf2ffc35ef11cdcafee206b2619ce0cde7e8b9b4c0a99c415fdd54e2769abf6340bc727604b47161f433cb65e742a07d302d4eecf565c46d71154ea5ec92e8c392e4574d0de40cca1231a6ce52bc8496474a8619a50e126c2a9528ec08e525babe215b2a1516839cd3bef230e0ee25ed620b7cae0e839428515ea08400e8404b2a80d076c3ed8b89d9a2f0b6b91f7078ab8837ea18592c2d71e649ed859d00619cd2c1687d37bedcc18ed94979545704f747dfedb77c3031dd8733d60aada075543800af0f2e897b946944b66ffc9323624e6c296529d024e543588a8740f6bba06b861db7ebeac666945f06fb5a0bfa82dbda4240358fe91ec01b80be2a4804a329376ef91c40f2c96db4f4852774c491d763ca049b395f41da12b1217b59933ee6f298f731c9ea69ba843c5c25062607791ae673f63a580603e07078e8cad5b071155437bc5599de567e44811dc744fd9e1e2ccd93cbbde0658d3812801446e112ea5223b2d8b5ed86f2db47eed9c14bb4847588f022ef1ae32cd9e53c94f737607880a5eef387a27f86d19b2906c150273c5251b2a69a9ec4e06654cf21644b91599a8b4b9a0954c2621bbe451286d5908d19ab8f3635d7e7ecab28d86ba4d0b91eb3f7d4d64617e95f8d94bb022de89f193266f87caba93abb2388bf67644b5bed864b948a2692155ff20c867b3b65e3be9e02c27da5c07adcbd631febfd2223d558b9ca8c4fba5fc61c849f7662218437e7712a57be8855d5981e5a9855f3f319756227d6503b8c75ee027e880adf7c6a2a1f32e2b0221b56e7f86e16810f1d8b7a8ba01e615c9ea9d48c49ac2af8623dfd9ed61bf06de38f34fa345a6674f9c3fd3e8b5ecaafe717eed4f35dfc2f9ad7bafbbff438834279696607522a8dbe3a8939fa522712d649141c95a9d524764d7df67a5c74ace115737483fc99a5a7644a365e7cc8dc35834322d96568aec1ab0ea8adb7b4ae8dae6b00d3ffd0b820baa2202f2c09f4ca18cd994ec5ddb04d571d379bfd3794b87d5075d4f63caeb915dd1fe282564e99e17443093812ec833605ef77b1fc0cdc02e59f0cf8180e374c3bc5c19f3f34a9b45611ca24e33502018cd4fa0c69c6fe35c0ba2504daaa22233705faa5ec17cd1c4584a17e0a94601c8eaf325ccb9384170d3f092a3866658a2205fa09594481225231f468995cd96fcbb01b892d31682f67fec44e4f543fc12709efc8e55e22d8046c6f08fc4dd8b3d88867daa0a4b2a8495a3e968ce31233deecb5aa5de3177ec59e7c2d6993a8a4ae8f6452683b0356b1fcd76b5a5639ca753a4c042acb2b35a6813bd8ea27b3d431de020c5d2e597da5d34710467b9923ceb17163954ba158f659daa54b953ca63392531e36fd21a40dfa3e45fd3e28de0d0c3b23afa72b9a08897c964653db0b779fc68d111b3f004633646d73a4461dc151798116ce6ef7b12ab193cda88b50f7cb0bf767171144ed2e7d6ef59c43c5f961ab301443268bca7bcc52ed79b3649a2f72a65f26c2f0a504fc15c95681f668132958eee0e3861393aa34901c24f38ce483afd9c4213e85621de19abd323229964c5b338d0774a3f775366fc38c174241519e514b33bae65ef4c4fcef675e26006eb8163d1a90aac7d24975f95d4c4301df65cc794a0f6733a50d3c871f23204eadd5aef6d4d7e30b990263bc8427694b464c621e4a502feaeba24dd3fbb102cd3cdcac444638529921433fe153441f8eb5b9e6e7c50acefdac052309dfc5d03df48a311d4635b093a4036a638ba6c47758afc090cc9f1e9c76164bfdc82541c60c8f5946ae82331f98cd1c455f54b67f093e2f947cca08952a824bfe633d8126f715ec313feeee2be44b1f42f360fd856ed2d4dcc076f1af6208f1968f90748ca1d8f4e9184733ae3d0f024c9c97d5dfc52565bae3d915108bc232d76850c94e73b2e4738877404f86f126acbecf072392a62231b2c82ed90c4fd091f6c32d4cf74da62e57893f97dd0f696cfbe5fd585d3a5b9a4427cfb3f20abfeb737f524d1b28ba4dab9c416bac3e6a15e6ead33bd7cb1707163cd6b759d856938dab3149143baa84e64ecc9ee3d7f01697d4496aa7ed715eec9f92813fbe2652152230c52913ad0e568aa93b2b0598cbae7e4544905cb53474082297ff0e59a43e00d1107b836aebc673205a65604e0fc209f343d269bdb2b444557a3fef48b5792e1637d29e89c0fd6313e33a662788a4a6cfe4352e030dd53dd91c71d1894810f06d28a90e89f066d9007e45b85cdca1f7204b19c2e423f95e7a981bb0b3586a6de95f60dbe3d4b2a4f3c6b4596ace28502bc545dac9f5c87595cdbe8c9d7a62b820b253b6f948bd8d43fb3be9b993f690f2afe34664791efc8e2bbd9655fb5353f916b13c1b3f2067bb79e89226d4df0053d5fce4fcdb8c210e5f4d36eb9c4810711f970b581e8bca344bedc9abe2bacffc82d77576ee3fdcadc153d0b76764bdd4a822be1a9bff975774caa5a7739e5834003ae59ce70dcdce4e38578cb7fedecce32a3f539a1c5703bbaa52badddba75c276ced91a54be65e0c0cb34449b0d4c720108eae03fb16ed86bd7fc09bf988accbe1c9864edbbc60cfe86d6ff74e84d4c46e664b493395c18d1fdc4514eee577c5c879af569f7565869481b62501e3cd3cda730982b62c7e1355380612ad10dce28d8070509ebb3a1e590057cdfbb97712db221c09e4a6917a18cdcf80db504d8f853883c9cfaf2cb5f43d8049347b1da478d83f7cb042aacb3abfe2f2833933ce4c26e6ff184588473c2b698f35a85ed788d1688542cc70955073d3aa6b4f4413c5c94d0ae6baa3309bbe6ba2a5e80ce3c08d93de677f747ac0cd4db34d621621d27e586eb3cf4b497f7a812ae2f0a54f38e53338834f396a7ca26d7392c21a94be414669d6e30e5d93f0f648790ce07063076287f4087541e3fcc9dc1dfa3f6f0d91ed9a938d981d34d3c1d5be2a5dd5df8ec7ecd974f78bc571391e6593d9652123aabf51662dc08b79708325c005f349335565c9cfdfdae6d291882ef5379f968825cdc71b96adf29ded7f40c358af8117516db3b29e74847088fc64cb9dbc40ee3fe137bdc3035b9215e0813888f69e1f28ea92d02d727e510a224064b627675d0c28db3adac67bfe184d506c8894aa2ffb99940c1c3ca0a6e991ef516d94b252d720fae88a3f11fdee36628bf197cacf11fa982aa5df2a555262439887e03a34f6a2daf5ab221126b891174688d75dedbd88c67f3933eba65f603b46c6922435b0bf5991ae8691683eb59413e1a1a0065fd2340b3eec174fe3b108758fc7e5e9e5a26491d9d9229b543e99f2a2621d282ddd21eb0262c2ec57603de23a88cb6c75d5aa97c33fe3522927ed3286f3a474cdb7065521c82346474c2a71e762d0eae8a15c27cbdc8e2b2c425ce625481e448c10e4b492542dc339e6f7fd8f4a7907562d1a247276e1e467d78149900c228c377377094ae2ef90b704c5f8fe51603d65c8600856b1f424760c060d91809a70efb255595e300e8200c56e3d5f06251a709a54ce2a653cf864e54b667448c6ce5cbbd79c6292fce17eb996a01b86c04e88d1a9c4d09a0cba9e86dd513cf0c869b1b6f585b0d5e1f4193bca4b14c4fe44dcc5ce5eb6755f452595188a1e4f739ccb038bda270efa751299f4d827b77aed11468cd74bdaaa82f289990569505579b85d11d91c9a96604ea1a0b01474d07596d19c7d3471dd54174a50d331636dfe950924e3f23fd250c5cbf9f7c73544faee949a14b2c5c9198ec0591ae25a7a4362dca9d179afc958073a4c9c5532e9fbdf1fae7cc1d0502fff7c2040000000400000028000000000000002900000039000000ff02024c00000000fc000000000000000000000000000000c80000000000000029000000040000002c15000000000000c204000000093f6ece02d7678344ce342aee5c5f4d9b0d912b526f6af8479aaafbe3512c1fff21f96b9a5f9391bb1c7375efb16dcdeeb9388a45dc4928ce1c04c3cd3fa4179a842efbee4e9ee70c1da8b571c48e714f6862ec0a25acdb5ec160948fcd8bb7525f67ff2768cd7b96132b6762ffce5362000100c910fe8800000000000000000000000001010502004004010101110283cc44281277565a92ebdfe9ad36a93a0001000502000800000000900000000000000029000000360000003a0e000000000000000100c204ffffffff000100c20400000007000100000100c9100000000000000000000000000000000000418893b736122e2ec8d2423154d76f7e63ff04abee4bfafb6f75914d96574334efc4fc85f812e227b6acee58eff0695525eb9062a7b924225418d30410f6e717e41d0502000900010000000000180000000000000029000000370000000000000000000000140000000000000029000000080000000200000000000000d0"], 0x2430}}], 0x2, 0x0) 03:11:10 executing program 2: setitimer(0x0, &(0x7f0000000140)={{0xffffffffffffffff, 0x10000}, {0x0, 0x80000001}}, 0x0) 03:11:10 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:10 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x455b, 0x4, 0x3}) 03:11:10 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:10 executing program 3: syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={r2}, 0x14) 03:11:10 executing program 0: keyctl$join(0xffffff1f, 0x0) 03:11:10 executing program 2: setitimer(0x0, &(0x7f0000000140)={{0xffffffffffffffff, 0x10000}, {0x0, 0x80000001}}, 0x0) 03:11:10 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:10 executing program 5: mq_open(0x0, 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x455b, 0x4, 0x3}) 03:11:10 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:10 executing program 2: setitimer(0x0, &(0x7f0000000140)={{0xffffffffffffffff, 0x10000}, {0x0, 0x80000001}}, 0x0) 03:11:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@ipv6_getaddrlabel={0x30, 0x4a, 0x1, 0x0, 0x0, {0xa, 0x0, 0x80}, [@IFAL_ADDRESS={0x14, 0x1, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x30}}, 0x0) 03:11:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_FLAGS={0x8}]}}}]}, 0x40}}, 0x0) 03:11:11 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:11 executing program 5: mq_open(0x0, 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x455b, 0x4, 0x3}) 03:11:11 executing program 3: shmctl$IPC_INFO(0x0, 0xe, &(0x7f0000000000)=""/3) 03:11:11 executing program 0: prctl$PR_CAPBSET_READ(0x17, 0x66a) 03:11:11 executing program 2: setitimer(0x0, 0x0, 0x0) 03:11:11 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:11 executing program 5: mq_open(0x0, 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x455b, 0x4, 0x3}) 03:11:11 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) [ 166.338650] syz-executor.2 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 03:11:11 executing program 0: r0 = socket(0x840000000002, 0x3, 0x200000000000ff) sendmmsg$inet(r0, &(0x7f0000000b00)=[{{&(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000009c0)=[{&(0x7f00000000c0)="1f2728e710591174c551edd5c1bb47f39d23913e37aad3f18f6a7014250ca2a961178c9c0f84cb950e5aa8d15076cc19346ba407de2e000000000000", 0x3c}], 0x1, &(0x7f0000000f00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @broadcast}}}], 0x20}}], 0x1, 0x8ba0) 03:11:11 executing program 2: setitimer(0x0, 0x0, 0x0) 03:11:11 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:11 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) futex(&(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={r1}, 0x0, 0x0) 03:11:11 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x0, 0x0, &(0x7f0000000040)={0xffff, 0x455b, 0x4, 0x3}) 03:11:11 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:11 executing program 2: setitimer(0x0, 0x0, 0x0) 03:11:11 executing program 0: r0 = socket$inet6(0xa, 0x8000000000080001, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1}}) 03:11:11 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x0, 0x0, &(0x7f0000000040)={0xffff, 0x455b, 0x4, 0x3}) 03:11:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x18, r1, 0x703, 0x0, 0x0, {0x6}, [@ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x18}}, 0x0) 03:11:11 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:11 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:11 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x1275, 0x0) 03:11:11 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x0, 0x0, &(0x7f0000000040)={0xffff, 0x455b, 0x4, 0x3}) 03:11:11 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:12 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000700)={@local, @remote, @void, {@arp={0x806, @ether_ipv4={0x1, 0x500, 0x6, 0x4, 0x0, @link_local, @dev, @empty, @dev}}}}, 0x0) 03:11:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000001640)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x80086603, &(0x7f00000001c0)) 03:11:12 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, 0x0) 03:11:12 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f00000000c0)={{0x0}, 0x0}, 0x20) 03:11:12 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:12 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:12 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='highspeed\x00', 0xa) sendmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000b40)='9', 0x1}], 0x1}}], 0x1, 0x0) 03:11:12 executing program 0: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000080)=@newtaction={0x78, 0x30, 0x53b, 0x0, 0x0, {}, [{0x64, 0x1, [@m_skbmod={0x60, 0x1, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_SKBMOD_SMAC={0xa, 0x4, @remote}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x0, 0x0, 0x20000000}}}]}, {0x4, 0x14}, {0xc}, {0xc}}}]}]}, 0x78}}, 0x0) 03:11:12 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x2, 0x5, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private2}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x60}}, 0x0) 03:11:12 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, 0x0) 03:11:12 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:12 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:12 executing program 3: r0 = socket(0x2b, 0x1, 0x1) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) 03:11:12 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x804, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x804, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) syz_emit_ethernet(0x4a, &(0x7f0000000900)=ANY=[], 0x0) 03:11:12 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, 0x0) 03:11:12 executing program 0: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000080)=@newtaction={0x78, 0x30, 0x53b, 0x0, 0x0, {}, [{0x64, 0x1, [@m_skbmod={0x60, 0x1, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_SKBMOD_SMAC={0xa, 0x4, @remote}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x0, 0x0, 0x20000000}}}]}, {0x4, 0x14}, {0xc}, {0xc}}}]}]}, 0x78}}, 0x0) 03:11:12 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:12 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000fc0)={{0x14}, [@NFT_MSG_NEWRULE={0x14}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x201, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x48, 0x3, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_CHAIN_TYPE={0x5, 0x7, 'nat\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0xa4}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000fc0)={{0x14}, [@NFT_MSG_NEWRULE={0x14}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x201, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x48, 0x3, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_CHAIN_TYPE={0x5, 0x7, 'nat\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0xa4}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 03:11:12 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, &(0x7f0000000040)={0x0, 0x455b, 0x4, 0x3}) 03:11:12 executing program 2: rt_sigprocmask(0x3, &(0x7f0000000480), 0x0, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000080)='./file1\x00', 0x0, 0x8}, 0x10) creat(0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x56) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @empty}, 0x10) sendto$inet(r0, 0x0, 0x2f5, 0x200007fc, &(0x7f0000000000)={0x2, 0x3, @local}, 0x10) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) getpid() stat(0x0, 0x0) pipe2$9p(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) memfd_create(0x0, 0x0) fdatasync(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) lstat(0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) 03:11:12 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000540)={0x4c, 0x13, 0x10aeb7656b528f63}, 0x4c}}, 0x0) 03:11:12 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:12 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:12 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, &(0x7f0000000040)={0x0, 0x455b, 0x4, 0x3}) 03:11:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) fgetxattr(r0, &(0x7f0000000040)=@known='system.sockprotoname\x00', 0x0, 0x0) 03:11:12 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:12 executing program 2: r0 = timerfd_create(0x0, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, &(0x7f000000b000)={{0x77359400}}, 0x0) dup3(r0, r1, 0x0) 03:11:12 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, &(0x7f0000000040)={0x0, 0x455b, 0x4, 0x3}) 03:11:12 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x22441, 0x0) fcntl$getown(r0, 0x409) 03:11:12 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:12 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@setneightbl={0x24, 0x43, 0x601, 0x0, 0x0, {}, [@NDTA_NAME={0xe, 0x1, 'mountinfo\x00'}]}, 0x24}}, 0x0) 03:11:12 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x0, 0x4, 0x3}) 03:11:12 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, &(0x7f0000000040)=0xc) 03:11:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x1c, 0x1d, 0xf07}, 0x1c}}, 0x0) 03:11:12 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:12 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:12 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x0, 0x4, 0x3}) 03:11:12 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$NS_GET_PARENT(r1, 0x541b, 0x73b000) 03:11:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/snmp\x00') read$usbfs(r0, 0x0, 0x0) 03:11:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000800)=ANY=[@ANYBLOB="140000001e00c553000000000000552901"], 0x14}], 0x1}, 0x0) 03:11:12 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:13 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x0, 0x4, 0x3}) 03:11:13 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) 03:11:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={[0x0, 0x0, 0x8], [], @remote}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) 03:11:13 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x72109c5fef5d34d3) r0 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x0, r0}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(0xffffffffffffffff, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:13 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x21, 0x0, 0x0) 03:11:13 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 03:11:13 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x455b, 0x0, 0x3}) 03:11:13 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x72109c5fef5d34d3) r0 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x0, r0}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(0xffffffffffffffff, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:13 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:13 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0x401000) 03:11:13 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:13 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x455b, 0x0, 0x3}) 03:11:13 executing program 3: unshare(0x400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONE(r0, 0x40049409, r0) 03:11:13 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newsa={0x144, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@broadcast, 0x0, 0x32}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @offload={0xc}]}, 0x144}}, 0x0) 03:11:13 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:13 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x3, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:11:13 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x72109c5fef5d34d3) r0 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x0, r0}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(0xffffffffffffffff, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:13 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:13 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x455b, 0x0, 0x3}) 03:11:13 executing program 0: r0 = memfd_create(&(0x7f0000000040)='%Kode`h\t\x00\x00\x00\x00\x00\x00\x00\x85\x8c\xd6\tV\x1d(\xb30\x00\t\xb6Y\x94\xc4\xc0\xde5/;n\xd4\x1a\xd9\x910zf', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60fe01, 0x8) 03:11:13 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:13 executing program 3: r0 = userfaultfd(0x0) io_setup(0x7, &(0x7f0000001400)=0x0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) r3 = dup2(r2, r2) io_submit(r1, 0x2, &(0x7f00000000c0)=[&(0x7f0000001480)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x4008, r3, 0x0, 0x0, 0x0, 0x0, 0x2}]) 03:11:13 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:13 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x455b, 0x4}) 03:11:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000500)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab3", 0x18}], 0x3, 0x0, 0x0, 0x1a0}}], 0x1, 0x0) 03:11:13 executing program 1: r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:13 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:13 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:13 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x455b, 0x4}) 03:11:13 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r0 = memfd_create(&(0x7f0000000b80)='\vbm1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff\xc4\xf3yz\x02\x00kM\xb2\xd4k\xa2\xcc\x19\x1b\x12\b%\x92ACa\xeb\xf3\xe6L\\\xbcZ\x8b?\xd9\xc3\xf5\xbd\xb7B~D)\xfb\xa5x\x118Q\xbc1\xeak\x1aj`\xb5\x8e\xd1H\'\x11\xf2P\x01h\xb8\f\xb6\xd6\x96\x9d1\xedo\xe1\x8b\xcc\xf5\xba\xa4a#efb\x8f\xd2\x9a\xbf|\x15\xd7\x16S&\x18\x89;\xf8\\\x80\xec\xaa\xdb\\\xaa\\Y7S\xb9\xb3\x17T\xfb\x92\xbac\xe6\x95|\xbfB\xf0\x8b+\xff\x82\x8f\x84\xb3\x98(\x11\x14\xa2\x8e\x81\xe2{FG\xa7~G\xdbv\xa1\x15\x01i\xba*\xc2\x18\x93\x1ft\xa5z\x9cAG\xfd\x981\x81\x19\xd1\n\xd38\x819\x9a>\xe0\xa5\xb5\xd4LX\xd8\xc7\xc8\r\x99C\xec\xeeT\xe2jIxEz\x14\x8f\x10\x98', 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="4afaea0c4cc83f"], 0x72) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0xfffffffffffffff2}, 0x0) 03:11:13 executing program 1: r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=@ipv6_getaddr={0x2c, 0x16, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @dev={0xfe, 0x80, [], 0x1f}}]}, 0x2c}}, 0x0) 03:11:13 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:13 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:13 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCETHTOOL(r1, 0x8971, &(0x7f0000000040)={'veth0_to_bond\x00', 0x0}) 03:11:13 executing program 5: mq_open(&(0x7f0000000000)='&$\x00', 0x40, 0x0, &(0x7f0000000040)={0xffff, 0x455b, 0x4}) 03:11:13 executing program 1: r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:13 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000280)={&(0x7f0000000040)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="b5", 0x1}], 0x1, &(0x7f0000000140)=[@dstaddrv4={0x18, 0x84, 0x7, @loopback=0x7f000005}], 0x18}, 0x0) 03:11:13 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:13 executing program 1: creat(0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:13 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='yeah\x00', 0x5) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000340)) 03:11:13 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="252e09214a5549c3792b3a"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, 0x0) 03:11:13 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:13 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:13 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r3 = dup2(r2, r1) dup3(r3, r0, 0x0) 03:11:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) write$P9_RLCREATE(r1, &(0x7f0000000040)={0x18}, 0x18) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r1}) 03:11:14 executing program 1: creat(0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f000001a680)={0x0, 0x0, &(0x7f000001a640)={&(0x7f0000019400)={0x30, 0x3, 0x8, 0x801, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_CLOSE={0x8, 0xa}]}]}, 0x30}}, 0x0) 03:11:14 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:14 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:14 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r3 = dup2(r2, r1) dup3(r3, r0, 0x0) 03:11:14 executing program 1: creat(0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:14 executing program 5: get_robust_list(0x0, &(0x7f0000001c80)=&(0x7f0000001c40)={&(0x7f0000001b80), 0x0, &(0x7f0000001c00)}, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 03:11:14 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:14 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:14 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8910, &(0x7f0000000240)={'tunl0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @remote}}}}) 03:11:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x10132) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000080), 0xfd13) recvmmsg(r1, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x2, 0x0) 03:11:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x60, &(0x7f0000000040)={0x0, 'team0\x00'}, 0x18) 03:11:14 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000780)="674b2a2eddfda96d6f9cc9295aff3fcc4466c69107b5e43e544cdcc848de670d3dabdac84f482853", 0x28, 0x0, 0x0, 0x0) 03:11:14 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:14 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:14 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x66, 0x0, &(0x7f0000000080)) 03:11:14 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000180)='./file0/../file0\x00', 0x0) 03:11:14 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}]}, 0x58}}, 0x0) 03:11:14 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 03:11:14 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9c504c9f1f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sys_exit\x00', r0}, 0x10) 03:11:14 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0x8010aa01, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x200e2002}, 0x0, 0x3}) 03:11:14 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:14 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x54, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x6, 0x1, 0x0, 0xe8}]}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x54}}, 0x0) 03:11:14 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x30, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}]}, 0x30}, 0x1, 0xa00000000000000}, 0x0) 03:11:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000200)='.', 0x0, 0xe110, 0x0) 03:11:14 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:14 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@dstaddrv6={0x20, 0x84, 0xa, @mcast1}], 0x20}, 0x0) 03:11:14 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:14 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:14 executing program 0: kexec_load(0x0, 0x16, 0x0, 0x0) 03:11:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000200)='.', 0x0, 0xe110, 0x0) 03:11:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)={0x24, r3, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_HARD_IFINDEX={0x4}]}, 0x24}}, 0x0) 03:11:14 executing program 4: perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:14 executing program 2: r0 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x7fffffff, 0x0) 03:11:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000200)='.', 0x0, 0xe110, 0x0) 03:11:15 executing program 0: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x842, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x3938700}) 03:11:15 executing program 4: perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:15 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:15 executing program 5: r0 = socket(0x28, 0x1, 0x0) connect$pppl2tp(r0, &(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x26) 03:11:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x7fffffff, 0x0) 03:11:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x58, 0x2, 0x6, 0x5, 0x9000000, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x58}}, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x0) shmctl$SHM_LOCK(0x0, 0xb) shmctl$SHM_LOCK(0x0, 0xb) shmctl$IPC_INFO(0x0, 0x3, 0x0) shmctl$IPC_STAT(0x0, 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x3, @empty}, 0x10) sendto$inet(r1, 0x0, 0x2f5, 0x200007fc, &(0x7f0000000000)={0x2, 0x3, @local}, 0x10) sendto(r1, &(0x7f0000000200)="268968", 0x3, 0x240400d1, 0x0, 0x0) recvmsg(r1, &(0x7f0000000080)={&(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000002640)=[{0x0}], 0x1}, 0x101) 03:11:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='devpts\x00', 0x0, 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000200)='.', 0x0, 0xe110, 0x0) 03:11:15 executing program 5: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, r0, 0xfffffffffffffffd, 0x0) 03:11:15 executing program 4: perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:15 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, 0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x7fffffff, 0x0) 03:11:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000200)='.', 0x0, 0xe110, 0x0) 03:11:15 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x248800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0xd, r1}, 0x14) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f0000000040)) 03:11:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x10000, 0x32}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 03:11:15 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, 0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:15 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:15 executing program 3: mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000200)='.', 0x0, 0xe110, 0x0) 03:11:15 executing program 2: pipe(0x0) r0 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x7fffffff, 0x0) 03:11:15 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, 0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:15 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1, 0x10, &(0x7f0000000000), 0x19f}, 0x48) 03:11:15 executing program 2: pipe(0x0) r0 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x7fffffff, 0x0) 03:11:15 executing program 3: mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000200)='.', 0x0, 0xe110, 0x0) 03:11:15 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000), 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:15 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:15 executing program 0: bpf$OBJ_GET_PROG(0x15, 0x0, 0x0) 03:11:15 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000), 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x24, r3, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x24}}, 0x0) 03:11:15 executing program 3: mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000200)='.', 0x0, 0xe110, 0x0) 03:11:15 executing program 2: pipe(0x0) r0 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x7fffffff, 0x0) 03:11:15 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:16 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000200)='.', 0x0, 0xe110, 0x0) 03:11:16 executing program 5: timer_create(0x0, 0x0, &(0x7f0000001540)) timer_gettime(0x0, &(0x7f0000001580)) 03:11:16 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:16 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:16 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000), 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:16 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000200)='.', 0x0, 0xe110, 0x0) 03:11:16 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000001580)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) 03:11:16 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$HCIINQUIRY(r1, 0x400448cc, 0x0) 03:11:16 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:16 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:16 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:16 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000200)='.', 0x0, 0xe110, 0x0) 03:11:16 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:16 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:11:16 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='.', 0x0, 0xe110, 0x0) 03:11:16 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:16 executing program 0: clock_gettime(0xeb330a7aa6e3bab4, 0x0) 03:11:16 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:16 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='.', 0x0, 0xe110, 0x0) 03:11:16 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0/file0\x00', 0x1011c2, 0x0) 03:11:16 executing program 0: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000009c0)={[{@fat=@check_strict='check=strict'}]}) 03:11:16 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:16 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, 0x0) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:16 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) readv(r0, &(0x7f0000001900)=[{0x0}, {0x0}, {&(0x7f0000001800)=""/254, 0xfe}], 0x3) [ 171.804925] FAT-fs (loop0): Directory bread(block 6) failed 03:11:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000100)={0x20, r1, 0x1, 0x0, 0x0, {0x3}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}]}, 0x20}, 0x2b}, 0x0) 03:11:16 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='.', 0x0, 0xe110, 0x0) 03:11:16 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, 0x0) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:16 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000340)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_off='index=off'}, {@xino_auto='xino=auto'}]}) 03:11:16 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', 0x0, 0x0, 0xe110, 0x0) 03:11:16 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:16 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:16 executing program 0: r0 = socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$ARPT_SO_SET_REPLACE(r0, 0xa02000000000000, 0x60, &(0x7f00000000c0)={'filter\x00', 0x100a, 0x4, 0x3a0, 0x0, 0x1d0, 0x0, 0x2b8, 0x1d0, 0x2b8, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xe8}}, {{@arp={@remote, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'netdevsim0\x00', 'ip6tnl0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@arp={@dev, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@random="d98c760cdb91"}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'vcan0\x00', 'dummy0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x1d0}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x3f0) 03:11:16 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, 0x0) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060a0000fdc3e80001dd7f9d040d001800ea1103000053000000", 0x29}], 0x1) 03:11:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', 0x0, 0x0, 0xe110, 0x0) 03:11:17 executing program 4: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:17 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:17 executing program 0: r0 = gettid() process_vm_writev(r0, &(0x7f00000003c0)=[{0x0}, {0x0, 0x14}, {&(0x7f0000001580)=""/113, 0x71}], 0x3, &(0x7f0000001700)=[{&(0x7f0000001600)=""/241, 0xf1}], 0x3, 0x0) 03:11:17 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', 0x0, 0x0, 0xe110, 0x0) 03:11:17 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20041084, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) 03:11:17 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:17 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:17 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0xfffffffffff, 0x1000}, 0x20) 03:11:17 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:17 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:17 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$TUNSETGROUP(r0, 0x400454ce, 0x0) 03:11:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000200)='.', 0x0, 0x0, 0x0) 03:11:17 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875b2e32a60b244e340b7679500800058110308d9123127ecce6616f3f6db1c00010000000000210050740000000000000006ad8e5ecc326d3a09ffc200000000000000000000e000"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000003c0)=@updpolicy={0xc0, 0x19, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@XFRMA_IF_ID={0x8, 0x1f, r2}]}, 0xc0}}, 0x0) 03:11:17 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000200)='.', 0x0, 0x0, 0x0) 03:11:17 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:17 executing program 0: r0 = socket(0xa, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f0000001b80)=[{&(0x7f0000000000)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000005ac0)=[@cred={{0x13, 0x29, 0x5, {0x0, 0xee01}}}], 0x20}], 0x1, 0x0) 03:11:17 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:17 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000200)='.', 0x0, 0x0, 0x0) 03:11:17 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8912, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) 03:11:17 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0, 0x89, 0xb6, 0xffffffff}, 0x20) 03:11:17 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0x0, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:17 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xc, &(0x7f0000000640)=0x4, 0x4) sendmsg$netlink(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000003ac0)=[{&(0x7f0000002300)={0x114, 0x16, 0x111, 0x0, 0x0, "", [@nested={0x102, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4}, @generic="8afef85c05e9c9a9db0752b1fab091caf41c6239019e63571e2fd0b37c6854d057739ca742ef86186a5665260721ac47bc6e0ed85395a0ef58c9dbb8171b2882d98baebed38c9412d3599b4d223ef1c4bf44c4831e7a04df54f303e519643af1c579f9d453ad02c38227e9942cab029f9761e9762c19a1093d5e68e2d33f8f7c3c2cff09d485", @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast1}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @generic="6f930cd693bf15273c92555c3cc62381ccdff0ef35156d331406570fc23501cd529f5fd22dcc74c07b9fee8762f2cd3af74c06ee8d82d358ac06917212cb7f287a070b92a5c34fab50f49af3203cea26713948c58edf81cdca2d7a9f35e0a798"]}]}, 0x114}], 0x1}, 0x0) 03:11:17 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x400c894) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) 03:11:17 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x411, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_SELECT={0x5}]}}}]}, 0x3c}}, 0x0) 03:11:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)={0x44, r1, 0x1, 0x0, 0x0, {0x9}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x44}}, 0x0) 03:11:17 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:17 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0x0, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:17 executing program 0: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x1a}, 0x10) 03:11:17 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:17 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x21f}, 0x40) [ 172.992238] bond0: option ad_select: unable to set because the bond device is up 03:11:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x9003000000000000, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x178, 0x178, 0x178, 0x0, 0x178, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0x158, 0x178, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'kmp\x00', "f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c", 0x47, 0x2}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 03:11:17 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0x0, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000c80)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x30, 0x16, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_HOOK={0x4}]}, @NFT_MSG_DELOBJ={0x34, 0x14, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0xac}}, 0x0) 03:11:17 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:17 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:17 executing program 5: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x17, r0, 0x0, r2) 03:11:18 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 173.131425] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 173.170210] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING 03:11:18 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:18 executing program 3: syz_emit_ethernet(0x142, &(0x7f0000000140)={@random="41b1593f201e", @local, @val={@void}, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "34fe83", 0x108, 0x3c, 0x0, @private1, @mcast2, {[], {{}, {}, {}, {}, {}, {0x8, 0x6558, 0x0, "f35f3c72b25660da5dff9d42f5ffce8a7e0c03f74dc5101f6ede83fa98a1837afd704c3542be9545c5e82058d990a2f513a98834b60ce6b31018ee6b23c76cae3d62e3612fae05a9f8a523da0e50bf90e575f2bbefd61f05c45d3238604495bcee32b829b40a7e0fb197e99e899548b76dd93aec96866660c6c7c92f911019cb00f762e5251820e45de4310c1d841557f11a1174bdbdfd85a4c65b471c4e863ea32b6e938974cbae6785e966ea0a406b3b0371280e9aeed82009e35f1bb6e0619937f10a"}}}}}}}, 0x0) 03:11:18 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:18 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x15000000, &(0x7f0000000000)=[{&(0x7f0000000100)="5500000018007f6000fe01b2403b7bbb0a60000200a8430391000000390009002d000c00020000000d00050000009f46da00000000c78b800800000000009d5631009b84136ef75afb83de44000000000000000000", 0x55}], 0x1}, 0x0) 03:11:18 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000380)={&(0x7f0000000140)={0xa, 0x4e23, 0x0, @mcast1}, 0x1b, 0x0, 0x0, &(0x7f0000000340)=[@hoplimit_2292={{0x14}}], 0x18}, 0x0) 03:11:18 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 173.349703] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 173.356489] IPv6: NLM_F_CREATE should be set when creating new route 03:11:18 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:18 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:18 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:18 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000300)) 03:11:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x4341e) 03:11:18 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:18 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:18 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:18 executing program 3: syz_emit_ethernet(0x82, &(0x7f0000000540)={@local, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x74, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @source_quench={0xb, 0x0, 0x0, 0x2c00, {0x16, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @broadcast, @private, {[@timestamp_prespec={0x44, 0xfffffffffffffff9, 0x0, 0x3, 0x0, [{@remote}, {}, {@multicast2}, {@dev}, {@loopback}, {}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {}]}]}}}}}}}, 0x0) 03:11:18 executing program 5: r0 = socket(0x10, 0x802, 0x0) fcntl$setlease(r0, 0x400, 0x10) 03:11:18 executing program 0: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x11000052) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000001180)='.\x00', 0x65000854) inotify_add_watch(r0, &(0x7f0000001180)='.\x00', 0x65000854) 03:11:18 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:18 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:18 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000003c0)=0x6, 0xdc) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:11:18 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000180), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="05"], 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x6, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "f3094b1723ab02da"}}, 0x48}}, 0x0) 03:11:18 executing program 0: bpf$MAP_CREATE(0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 03:11:18 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:18 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:18 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) [ 173.805183] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:11:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e20, 0x7, @rand_addr=' \x01\x00', 0xfffffff8}, {0xa, 0x4e21, 0x4, @remote, 0xfff}, 0x5, [0x9, 0x1ff, 0x200, 0x2, 0xce, 0x1c73, 0xfffffffc, 0xe32]}, 0x5c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback}, 0x20) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) 03:11:18 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) [ 173.860196] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 173.879582] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:11:18 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:18 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, &(0x7f00000000c0)) 03:11:18 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, 0x0, 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000100)={0x2, [0x0, 0x0]}, 0x8) 03:11:18 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:18 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) 03:11:18 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, 0x0, 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:11:18 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x1, 0x7, 0x801}, 0x14}}, 0x0) 03:11:18 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:18 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:19 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getqdisc={0x24, 0x26, 0x905, 0x0, 0x0, {0xa}}, 0x24}}, 0x0) 03:11:19 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, 0x0, 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000000540)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000200)=""/195, 0xc3}, {&(0x7f0000000740)=""/145, 0x91}], 0x2}}], 0x1, 0x0, 0x0) 03:11:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x2, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x9}]) 03:11:19 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:19 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000780)=@newtfilter={0x68, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x4000, 0x0, {}, {}, {0xd}}, [@filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0x38, 0x2, [@TCA_FLOW_ACT={0x34, 0x9, 0x0, 0x1, [@m_police={0x30, 0x0, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) 03:11:19 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0x0) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000740)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f0000000000)=""/15, 0xf}], 0x1}, 0x0) 03:11:19 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000011c0)=0x5, 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 03:11:19 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:19 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0xa4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 03:11:19 executing program 0: mmap(&(0x7f000082d000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x18, 0x4, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x0, [0x2e], 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x40) 03:11:19 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0x0) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x28, 0x1, 0x7, 0x301, 0x0, 0x0, {}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_MASK={0x8}]}]}, 0x28}}, 0x0) 03:11:19 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x3, 0x2, 0x0, 0x1}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, 0x0}, 0x1c) 03:11:19 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xd, 0x0, &(0x7f0000000280)) 03:11:19 executing program 0: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:11:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000000200)={0x10, 0x0, 0x0, 0xe4cf95bb60253587}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc) r3 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc) r4 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r4, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000000}, 0xc) r5 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r5, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4140045e}, 0xc) r6 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r6, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc) r7 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r7, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc) r8 = socket(0x10, 0x3, 0x0) bind$netlink(r8, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc) r9 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r9, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc) r10 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r10, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(r12, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) bind$netlink(r11, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000000}, 0xc) r13 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r13, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x2ddffd57e}, 0xc) r14 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r14, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc) writev(r0, &(0x7f0000001740)=[{&(0x7f0000000480)="580000001400192340834b80043f679a10ff3d425f9cc3f4ff7f4e32f61bcdf1e422000000000100804824cabecc4b38945f64009400050028925aaa000000c600000000000000feff2c707f8f00ff000000000000000000", 0x58}], 0x1) 03:11:19 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0x0) fcntl$notify(r0, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:19 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:19 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)='#H*%$)\\-{#/[/\x00') 03:11:19 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:19 executing program 0: set_mempolicy(0x0, &(0x7f0000000300)=0xa, 0x0) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f00000000c0)={0x0, 0x4}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) 03:11:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) write$P9_RLCREATE(r0, &(0x7f0000000040)={0x18}, 0x18) lseek(r0, 0x0, 0x3) 03:11:19 executing program 3: r0 = socket(0x15, 0x5, 0x0) sendto$l2tp6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0x20) 03:11:19 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(0xffffffffffffffff, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:19 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:19 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@newtaction={0x48, 0x30, 0xfcdf, 0x0, 0x0, {0x0, 0x0, 0x1360}, [{0x34, 0x1, [@m_gact={0x30, 0x1, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) 03:11:19 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x7fffffff, 0x0) 03:11:19 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(0xffffffffffffffff, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:19 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000540)={[{@gid={'gid'}}]}) 03:11:19 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:19 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, @loopback, @loopback}, "00006371ae9b1c01"}}}}}, 0x0) 03:11:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) 03:11:20 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(0xffffffffffffffff, 0xa, 0x21) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:20 executing program 2: pipe(&(0x7f0000000100)) r0 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x7fffffff, 0x0) 03:11:20 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, 0x0, &(0x7f00000001c0)="da488a4d45128ff25c6d2037e39ebb57c6fdfee433455c381773d2a395a251da258e8046a5751e90778b72de5a4c408cb21758131a03d1a4e31644c31f8ba69684449db443152ead22eaa7c53cce779f23a4131b81b6b827c150cdb8ebcddd20a3c75d6c962936fedf112a52447c93fb36632f2606ed6a50c11d7431341b5082b681a5bebcb87aebad798b1cd50fc84dbdfcfe7fee0acbd3eab2b10eda9deace4d4f902709be51bd6c14558345249f5e6d2f5a883edcf6a37d93b3b4d5976cb2dd7f8cb54413", 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) 03:11:20 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:20 executing program 5: r0 = memfd_create(&(0x7f0000000200)='\x00\x83\xc5\xcb\xc7\x108\xa4\x03\x9c0T3\xc5\x97\x95\xb5\x8fM\xddU\x10\xaaod\x96\xeeM\xbe\x0e\xe4\xcc\xc4\xcf,\x9f7\xcc(Z\x13`\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00c\r\x14\xd8g\x02S -\xfd\xb5a\xedf|\xc4\xf9\xd2J\xadi\xcc[\\P\xa6F\x8c^\xc7i)d\x9f\xfckW\x86\xe4Qg1\xbdD\x1c\x13O\\\x7fS/\xc9d!\x19\"\x16\xfdC\tz\xf1\xf3q\xfd\'.\xb4\x14\x14m_&\x88\x8cfI\x18&\xea5\xa0\x00\xd2\xcd\xf0\xd5\x03\x9f\x18\x8d6\xc9,\xc9Y\xb8\xc9\xdd\xadp3\xbe\x93C\xa3b\x18\xe7\xcdx\x86aA\x9e\x83\aKc\xba\x05\x19\xb1\x9cJ\xce2\x9fW\xd3', 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000080)=ANY=[], 0x560) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x13, 0x0, &(0x7f00000001c0)) 03:11:20 executing program 2: pipe(&(0x7f0000000100)) r0 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x7fffffff, 0x0) 03:11:20 executing program 3: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) dup2(r1, r0) 03:11:20 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x0) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:20 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x0, 0x0, &(0x7f0000000140)) 03:11:20 executing program 0: r0 = socket(0x2, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x84, 0x75, 0x400000, 0x8) 03:11:20 executing program 2: pipe(&(0x7f0000000100)) r0 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x7fffffff, 0x0) 03:11:20 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x0) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipv6_getnexthop={0x20, 0x6a, 0x601, 0x0, 0x0, {}, [@NHA_ID={0x8}]}, 0x20}}, 0x0) 03:11:20 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:20 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000540)={0x54, 0x13, 0x10aeb7656b528f63, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x1, '\n0/s'}]}, 0x54}}, 0x0) [ 175.740188] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=106 sclass=netlink_route_socket pid=10602 comm=syz-executor.5 03:11:20 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x0, 0x0) 03:11:20 executing program 0: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20000005011, r0, 0x0) rt_sigsuspend(&(0x7f0000000000), 0x8) 03:11:20 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x0) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) 03:11:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f2, &(0x7f0000000340)={'gre0\x00', &(0x7f0000000200)=@ethtool_ringparam}) 03:11:20 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:20 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x0, 0x0) 03:11:20 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001d008105e00f80ecdb4cb9f207a07e4f1e000000880306fb0a000200030ada1b40d805000302c50083b8", 0x2e}], 0x1}, 0x0) 03:11:20 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000080)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e) socket$nl_audit(0x10, 0x3, 0x9) 03:11:20 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002840)=@ipv4_newrule={0x1c, 0x10, 0xb01, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0x1c}}, 0x0) 03:11:20 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(0x0, 0xffffffffffffffff, 0x0) [ 175.981096] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. 03:11:20 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200087fd, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) splice(r1, 0x0, r0, 0x0, 0x0, 0x0) 03:11:20 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000000000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x40000120, 0x0, 0x0) 03:11:20 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:20 executing program 5: syz_emit_ethernet(0x33, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x21, 0x0, @private, @multicast1}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, '\x00', 0x0, 'Kxl'}, "04"}}}}}, 0x0) 03:11:20 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(0x0, 0xffffffffffffffff, 0x0) 03:11:20 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x3c, 0x0, 0x0) 03:11:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_FLAGS={0x6}]}}}]}, 0x44}}, 0x0) 03:11:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@ipmr_newroute={0x1c, 0x18, 0x625, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0x1c}}, 0x0) 03:11:21 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) [ 176.202988] dccp_v4_rcv: dropped packet with invalid checksum 03:11:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0xd, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:11:21 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) prlimit64(0x0, 0xb, &(0x7f000002fff0), 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa4002b5c) fcntl$notify(r0, 0xa, 0x21) lchown(0x0, 0xffffffffffffffff, 0x0) [ 176.248958] dccp_v4_rcv: dropped packet with invalid checksum 03:11:21 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:21 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff000d000000020000000b000000ec0079c9130001", 0xfed3}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102", 0x1b}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x200003f8, 0x0, &(0x7f0000000100), 0x5, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:11:21 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x89e1, 0x0) 03:11:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_HWID={0x6}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x2}]}}}]}, 0x4c}}, 0x0) 03:11:21 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x2080, 0x0) close(r0) 03:11:21 executing program 1: r0 = socket(0x29, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000066c0)=[{{0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {&(0x7f00000014c0)=""/249, 0xf9}], 0x5}}], 0x1, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) 03:11:21 executing program 5: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f00000001c0), 0x10) 03:11:21 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000001b00)={@empty, @local, @val={@void}, {@arp={0x8100, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @link_local, @dev, @multicast, @private0}}}}, 0x0) 03:11:21 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@ipv6_delroute={0x28, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x8}}]}, 0x28}}, 0x0) 03:11:21 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:21 executing program 0: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000d53000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000e20000/0x4000)=nil, &(0x7f0000ee9000/0x3000)=nil, &(0x7f0000000180)="633f3a0e3765b2c0d4b3e4b738289cf50561181ed2af8285544d0ac4702977a9a623dd9a2c2114c6396a63d46833a8d37f722caa33b7460c061ff3ccb57c7e05a47dee482fbedaf0c4f576692b042eae979d36e3d58cad750a14fdd21f", 0x5d}, 0x68) bpf$BPF_BTF_LOAD(0x1c, &(0x7f00000001c0)={0x0, 0x0}, 0x20) 03:11:21 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0xffffffea}) 03:11:21 executing program 3: syz_emit_ethernet(0x5f, &(0x7f0000000140)={@link_local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00001a", 0x29, 0x3a, 0xff, @private0, @mcast2, {[], @ndisc_ns={0x87, 0x0, 0x0, @local, [{0x0, 0x0, "c85a"}, {0x0, 0x2, "6a32ecd1da60907bb7b14317bbb9f7"}]}}}}}}, 0x0) 03:11:21 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f0000000080)={[{@type={'type', 0x3d, "8a542b04"}}]}) 03:11:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) preadv2(r0, &(0x7f0000000140)=[{&(0x7f0000000440)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0xf) 03:11:21 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xf, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='syz_tun\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000340), &(0x7f0000000100)=@tcp=r1}, 0x20) recvmsg(r1, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x20002021) 03:11:21 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:21 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$inet6_udp_encap(r0, 0x6, 0x64, 0x0, 0x0) 03:11:21 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00000020008104e00f80ecdb4cb9020200000400000b01810540fb12001400040fda1b40d819a90600050e030f", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) [ 176.827618] hfsplus: unable to find HFS+ superblock 03:11:21 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000180)='GPL\x00', 0x4, 0xbe, &(0x7f00000001c0)=""/190, 0x0, 0x0, [0x68], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_tracing={0x1a, 0x1, &(0x7f0000000000)=@raw=[@ldst], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) 03:11:21 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_PRIORITY={0x6}, @IFLA_BR_GROUP_ADDR={0xa, 0x14, @multicast}]}}}, @IFLA_GSO_MAX_SIZE={0x8}]}, 0x50}}, 0x0) 03:11:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000200)='#\x9c\x1c\x82\x90\"\x15wQ\xfd\xb8V\xf1\xa1M\xab\xaa\xbd\xaf\xfb*6\x98\xf1\x95U\xe0\x9e\xe0\xc7/X\xe5\v\xf1\x1c\xa0\x80\bk<\xf2\xebv\xb5\xf6\xca\xa8\x16bW2tB\xf3\xaf\x1e;@4{\xd6(\x8bU>K?0\xbb\xb0\x0eiVS_\xce*\x93k\x02\xabDD\x97\x91\x97\xca\x8f!~((\x8e\x0f\xef\xba\xbc\x93+\x80\xe4\xaf\xb8\x98\xdc\xd3\xbb\xb7M\n^\xb1\xd9\v\xab\xe0\xb4\ri\xfc^n`\v\xf5!\xb6\xfez{F#D\xe773\x0e\xd2sDj)\xbf\x92', 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="e40004000000343fe3"], 0x291) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000500)={[0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) [ 176.918779] hfsplus: unable to find HFS+ superblock 03:11:21 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x8008f512, 0x0) 03:11:21 executing program 1: setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000cc0)={'filter\x00', 0x5, 0x4, 0x4c8, 0x1e8, 0x2f8, 0x2f8, 0x2f8, 0x3e0, 0x3e0, 0x4, 0x0, {[{{@uncond, 0xc0, 0x1e8}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:update_modules_exec_t:s0\x00'}}}, {{@arp={@broadcast, @dev, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_hsr\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @multicast2, @loopback}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x520) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000d1a000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000d57000/0x4000)=nil) madvise(&(0x7f00008b4000/0x2000)=nil, 0x2000, 0x1) 03:11:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) getsockopt$inet6_buf(r0, 0x29, 0x45, 0x0, &(0x7f0000000240)) 03:11:21 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:21 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x10000, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000140)="9b", &(0x7f0000000000)=@tcp6=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x4, &(0x7f0000000100)={r0, 0x0, 0x746000}, 0x20) 03:11:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=@can_newroute={0x34, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_CS_XOR={0x8, 0x5, {0x0, 0xfffffffffffffffb}}, @CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "37cdea79e58449c9"}, 0x1}}]}, 0x34}}, 0x0) 03:11:21 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) accept$packet(r1, 0x0, 0x0) close(r1) tkill(r0, 0x1000000000016) 03:11:21 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:21 executing program 2: unshare(0x2c020400) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="01"], 0x2000, 0x0) msgrcv(0x0, &(0x7f0000001380)={0x0, ""/115}, 0x319abb17, 0x0, 0x4800) 03:11:21 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000001340), 0x0, &(0x7f00000013c0)={[{@cruft='cruft'}]}) 03:11:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x77, &(0x7f0000000080)={r2}, 0x8) 03:11:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'blake2s-256-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x20848000, 0x0, 0x0, 0x8dffffff) 03:11:22 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0x0, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:22 executing program 1: bind(0xffffffffffffffff, &(0x7f0000000040)=@generic={0x0, "0000010000000000080044944eeba71a2f76e252922cb18f6e2e2aba000000012e0b3836005404b0e0631a4ce875f2e3ff5f163ee340b767950080000000fa00000101013c581103e6d8123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x3d, &(0x7f0000000080)={0x0, 0x0}, 0x8) 03:11:22 executing program 2: socket(0x3, 0x0, 0xa7c5) 03:11:22 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) r1 = dup(r0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f00000001c0)=0x400000fa, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 177.332285] ISOFS: Unable to identify CD-ROM format. 03:11:22 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0x0, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:22 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @mcast1}], 0x1c) 03:11:22 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000900)='.^\xe5\xce\xb2\xc1b#\xf4\x91\xfcS\x96(\xe2\x90\xba-L\xb1^\xe3\xa7\x9b0\xefHEG\x18\xcb\x15\xc1\x1b\x18\xbd\xb6\x14\xe9G\xa6\xbb*\xdff\xe4{2\xd0\x91\x874\xdc(\xa4\xa8?Q\xa6\xee\xb54\xd0\x05.`\xe7\x04@\xff\x83\n\xb9\x12\xaf\x83\x04\x1e\x8b\xca\x17Y\xb6\x94\x99\x90\x9f\xac\xcf\xc1\xb4\xfb\x9c)\xa0xY4\xaf\xe3\xd5R\x012\xd2R', 0x0) pwritev(r1, &(0x7f00000004c0)=[{0x0}], 0x1, 0x81805, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8c098d3b6438c1fbd8180b45d3cc9c164baaee13bf783eb1d66c353f731ae8174ad642085432430c390addf9b2f04d58d3b88e996e773c83fce60fa794a1cc81", "65f436ffca4a06b71c7a963ce778e03a4b090199add92ae18e13b1fbd14dade59e0dbdefaeb3d4c9755b165b06e58e929c10c5a54dbf780080ca9099661800", "e30e5a2a56a49f7cb627fa8ad4bb8aef75848f4aff2fc67a0ff75e1288f59ea9"}) 03:11:22 executing program 3: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x320, 0x160, 0x0, 0x148, 0x160, 0x148, 0x288, 0x240, 0x240, 0x288, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth0_virt_wifi\x00', {}, {}, 0x0, 0x0, 0x50}, 0x0, 0xf8, 0x160, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'macvtap0\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xec, 0x7}}}, @common=@addrtype={{0x30, 'addrtype\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@common=@unspec=@pkttype={{0x28, 'pkttype\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x380) [ 177.449402] ISOFS: Unable to identify CD-ROM format. 03:11:22 executing program 1: r0 = socket(0x10, 0x800000000080002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x50}}) 03:11:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x7}, {}]}]}}, 0x0, 0x36}, 0x20) 03:11:22 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0x0, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:22 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) unlink(&(0x7f0000000000)='./file0\x00') [ 177.486972] xt_CT: You must specify a L4 protocol and not use inversions on it [ 177.518331] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:11:22 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000280)={0x6}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000040000", @ANYRES32], 0x48}}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0xffffffffffffff4a, &(0x7f0000000200)={&(0x7f0000000080)={0x18, 0x16, 0xa01}, 0x78}}, 0x0) 03:11:22 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140), 0x8) 03:11:22 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@private, @rand_addr, @empty}, 0xc) 03:11:22 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x10, 0x1403, 0x39b}, 0x10}}, 0x0) 03:11:22 executing program 4: perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:22 executing program 2: r0 = socket(0x840000000002, 0x3, 0x200000000000ff) sendmmsg$inet(r0, &(0x7f0000001000)=[{{&(0x7f0000000040), 0x10, &(0x7f0000004440)=[{&(0x7f0000000340)="acd8c47cbff85468fdb8d536b2f1285916b3ae1e15e25b6df492e65750eb1eafb118465b0e6a82d07ab9653f0c70f7dd", 0x30}], 0x1}}, {{&(0x7f0000000000)={0x2, 0x0, @private}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_retopts={{0x10}}, @ip_retopts={{0x10}}], 0x20}}], 0x2, 0x0) 03:11:22 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='ext3\x00', 0x0, 0x0) 03:11:22 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @multicast1}, 0x2}}, 0x2e) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000280)=[{{0x0, 0x700003a, 0x0}, 0x4}], 0x400000000000085, 0x0) 03:11:22 executing program 0: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0x5, r0, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x6, r0, 0xfffffffffffffffb) 03:11:22 executing program 4: perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) [ 177.818113] print_req_error: I/O error, dev loop1, sector 2 [ 177.831151] EXT4-fs (loop1): unable to read superblock 03:11:22 executing program 5: sched_setattr(0x0, &(0x7f0000000040)={0x38}, 0x0) prctl$PR_GET_PDEATHSIG(0x25, &(0x7f0000000000)) 03:11:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x8, 0x3, 0x2a0, 0x178, 0x10e8, 0x10e8, 0x0, 0x0, 0x208, 0x11a0, 0x11a0, 0x208, 0x11a0, 0x3, 0x0, {[{{@ip={@dev, @local, 0x0, 0x0, 'syzkaller0\x00', 'vlan0\x00'}, 0x0, 0x130, 0x178, 0x0, {}, [@common=@unspec=@conntrack2={{0xc0, 'conntrack\x00'}, {{@ipv4=@broadcast, [], @ipv6=@ipv4={[], [], @private}, [], @ipv4=@remote, [], @ipv4=@local}}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x300) 03:11:22 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x10\x01\x00t\t-\x81E\xb67\x92^\xd4\x81E\xb3-1\xa6)\x99+/\xdf\x80\x00\x00\x00Hc\x9ag\x8f\xa3\xae\x0e\xad\x8d\xcc\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000980)=[{&(0x7f00000004c0)="8d57ec69b731336d9882498fea0c29850eaff25b88f1c9ec5e797da56cccad89735ef0d5eddb9269c88b2caa3f936c2eae27b17fd2f6a6ec5e12e5558673893f2866fff45c4cdfef85f0ecaed01057ab9f5f946e3be262995c39244273937550d8730f4c5caa422ead8bebda8548682ea79a3b4a4568c199443082f54a54e05150bd97fbeeed936f6d017d64a2821383262b077ed4", 0x95}, {&(0x7f0000000580)="3db6189eda170a92fab0b0952f922b1e28a06dd7b5a0a26cb99e736cd175568be4558cf1a6c08999372517978a6640c72ea6dc58986d9e59e8a9baa2f367fa3525209deec9ba1fb31b90f23e5b5e11368d2315d7d38a546afc7a337c4323fd54a2f27ba86dcdc9a8243157bac7481060e9999ae73519927dc3561acea6da3282a29b70e916f97a87944e", 0x8a}, {&(0x7f0000000000)="d1225fd04697b63909de5e8949ac6559e8e574fb0abc0d", 0x17}, {&(0x7f0000000640)="2c8caa02362082d40cea43ad87bdfeae1544438466727d60d19631fea372fc6d5d1b66a82d1801b751406cf8e71f87d4c542429b3bcdef870b6c5d238771263bdcfd1d817b6c0ecdec2e95dc8772a636b2330596b7ea9be878915317662a585cf1c789c32976d111114128e558a51fea8ab676fd4ade125a21", 0x79}, {&(0x7f0000000700)="9ad1c3b5ef2ef3a58672336927f4650f174708e1d00dc0eec56c79253d638306abab810d64edc9da7cb8619be3b0370c3b3ed59060311208be8a2d46439e672008ecfbdd49138c0ecc707e87faf21d6115", 0x51}], 0x5, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {0xd00}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d7560f000000557cc5e50000a482ebf7888c305bee6fd6"}) 03:11:22 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x42, 0x301, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 03:11:22 executing program 5: r0 = socket(0x22, 0x2, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) getsockname(r1, 0x0, 0x0) 03:11:22 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 03:11:22 executing program 4: perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:22 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'blake2s-160-generic\x00'}, 0x58) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0xfffffe3e) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) 03:11:22 executing program 1: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x358, 0xb8, 0xb8, 0xffffffff, 0x208, 0x208, 0x2c0, 0x2c0, 0xffffffff, 0x2c0, 0x2c0, 0x5, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'dummy0\x00', 'gre0\x00'}, 0x0, 0x70, 0xb8}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@private1, @ipv6=@private2, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0x70, 0xa8}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @multicast2, @multicast1}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @broadcast, @empty, @port, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@private, @ipv6=@private0, @icmp_id, @icmp_id}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r4, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@delchain={0x68, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x4}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_mpls={0x30, 0x0, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) 03:11:22 executing program 5: r0 = memfd_create(&(0x7f00000000c0)=')\xb2\xb6W|\x99\xe1\xff\'\xa7I\x8a\x1c\x06p\xbb\x9d\x0e\x97\xcb\x06\x8b\xc6\f\x15P\x80\xe0\xd9\x93\xa2\xef\xf0\x88\x1bwH\xd2>#-\x0ePU\xba\x19G\x97\xd9\xa8\x9b\xcbc\xdb\\\xefTW\xed\xa7\x0f\x19\xc3\x8d\x16\xfa\x11w\xf8wV\xa4@\xaf6!-\x9dMN*\x90\x18H\xee\xbc-\xa8/\xd7%\xd7qA\f\xf0\xd0\xa9\xf9\xd4\xa4\xd2\xca\xde\a\x87\x1e\x16\x91\xd4\xb93L\xad\xbb\xc9\x9f\x9f\xc4\xdc\"*:~\b/\xcbl', 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[], 0x6) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffffffffffff) [ 178.073802] loop0: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 178.111069] loop0: p1 start 2403959448 is beyond EOD, truncated 03:11:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000100)={0x1b, 0x1a, 0x1, 0x0, 0x0, "", [@typed={0x102, 0x0, 0x0, 0x0, @binary="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"}]}, 0x114}], 0x1}, 0x0) [ 178.112522] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 178.135276] loop0: p2 start 1771232237 is beyond EOD, truncated 03:11:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x574702, 0x0) write$sndseq(r0, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @connect}], 0x40002) 03:11:23 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) [ 178.175827] loop0: p3 start 4110378536 is beyond EOD, truncated [ 178.198404] loop0: p4 start 1349882739 is beyond EOD, truncated [ 178.202950] HTB: quantum of class FFFF0004 is small. Consider r2q change. 03:11:23 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002ec0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x3f00, &(0x7f0000002640)=[{&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000080)=""/140, 0x8c}], 0x2}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3fffe3f, 0x0, 0x0) [ 178.237135] loop0: p5 start 4118949956 is beyond EOD, truncated [ 178.275967] loop0: p6 start 414596564 is beyond EOD, truncated [ 178.291396] loop0: p7 start 1450561900 is beyond EOD, truncated [ 178.305636] loop0: p8 start 3131697241 is beyond EOD, truncated [ 178.336375] loop0: p9 start 1418384343 is beyond EOD, truncated [ 178.353891] loop0: p10 start 2593778016 is beyond EOD, truncated [ 178.365949] loop0: p11 start 1188060962 is beyond EOD, truncated [ 178.372996] loop0: p12 start 3926709378 is beyond EOD, truncated [ 178.471941] loop0: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 178.485139] loop0: p1 start 2403959448 is beyond EOD, truncated [ 178.499994] loop0: p2 start 1771232237 is beyond EOD, truncated [ 178.507139] loop0: p3 start 4110378536 is beyond EOD, truncated [ 178.513369] loop0: p4 start 1349882739 is beyond EOD, truncated 03:11:23 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:23 executing program 1: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f00000007c0)={[{@discard='discard'}]}) 03:11:23 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8931, &(0x7f0000000040)={'bond0\x00'}) 03:11:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'ipvlan1\x00', &(0x7f0000000100)=@ethtool_coalesce={0xf}}) 03:11:23 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:23 executing program 3: r0 = add_key(&(0x7f0000002000)='logon\x00', &(0x7f0000001000), &(0x7f0000001000)="2e989cc9f58ec796be4720e6160291a2fb7c6445e84b8e9e349ead029fe38d5810bf992b5d51f406a51cc339021268aed6f767582af42dbc8ea1110e4353fcf30b20f1f27ed3b44bef6444f8ca6a808e34ded636ef55e151c11b4ef7a5384f4a0ceb885759dfeeca5aaa540de461d2130755897533032f5639c4ba79988a49d63084f2cbed0a84e5e733146f15192fdabd0e3a", 0x93, 0xfffffffffffffffc) keyctl$clear(0x7, r0) [ 178.519437] loop0: p5 start 4118949956 is beyond EOD, truncated [ 178.526474] loop0: p6 start 414596564 is beyond EOD, truncated [ 178.534172] loop0: p7 start 1450561900 is beyond EOD, truncated [ 178.540257] loop0: p8 start 3131697241 is beyond EOD, truncated [ 178.546398] loop0: p9 start 1418384343 is beyond EOD, truncated [ 178.552522] loop0: p10 start 2593778016 is beyond EOD, truncated [ 178.558657] loop0: p11 start 1188060962 is beyond EOD, truncated [ 178.564881] loop0: p12 start 3926709378 is beyond EOD, truncated 03:11:23 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000005680)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="28000000100001000000000000000000040000000c0000002d282d2b283acf0008000400cca36d"], 0x28}], 0x1}, 0x0) 03:11:23 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@mpol={'mpol', 0x3d, {'prefer', '=static'}}, 0x30}], [], 0x2c}) 03:11:23 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8931, &(0x7f0000000040)={'bond0\x00'}) 03:11:23 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) [ 178.696624] JFS: discard option not supported on device 03:11:23 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, [0x2]}) [ 178.788656] JFS: discard option not supported on device 03:11:23 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:23 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, @void, {@ipv4={0x800, @generic={{0x7, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@lsrr={0x83, 0x3, 0xb}, @ssrr={0x89, 0x3, 0xd4}]}}}}}}, 0x0) 03:11:23 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:23 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) fallocate(r0, 0x5b, 0x0, 0x9cb3) 03:11:23 executing program 3: mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x5, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000001a80)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}, 0x6}, 0x5c) 03:11:23 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8931, &(0x7f0000000040)={'bond0\x00'}) 03:11:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)={0x1c, r1, 0x6773c1220b554753, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 03:11:24 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8931, &(0x7f0000000040)={'bond0\x00'}) 03:11:24 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:24 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x21, &(0x7f0000000000)=0xffffffff, 0x4) 03:11:24 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x50700}}) 03:11:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfb, 0x800}, 0x69) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x25dfdbfb, 0x7}, 0xc) 03:11:24 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:24 executing program 3: socket$inet6(0xa, 0x2, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x69) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x1}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@timestamp={0x44, 0x1c, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7, 0x0]}]}}}], 0x30, 0x5}, 0x0) 03:11:24 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000480)="a751b20a5d142ef21c93fe531e666a291fbb5f95d6c0e7a44850393cfeaa1434e9b3ef3f84aafc90023b50705d4ff54f9e4479bfe41abf040cf054e1e3d5b6440deee9a8dc17e895b34200b9f238bedffc58", 0x52, 0x177}]) 03:11:24 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:24 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000b00)={@link_local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0300", 0x18, 0x3a, 0xff, @private0, @local, {[], @ndisc_na={0x88, 0x0, 0x0, 0x60, [], @remote}}}}}}, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="230050ff01e8f60800002c0007031dfffdb0cb00421ba3a20400f20000000000000000", 0x23}], 0x1}, 0x841) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10, &(0x7f0000000740)=0x200, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{0x0, 0x2}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xb01001f1}, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) 03:11:24 executing program 2: ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8931, &(0x7f0000000040)={'bond0\x00'}) 03:11:24 executing program 2: ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8931, &(0x7f0000000040)={'bond0\x00'}) 03:11:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x1468, 0x1170, 0x1170, 0x1170, 0x1170, 0x110a, 0x1398, 0x1398, 0x1398, 0x1398, 0x1398, 0x3, 0x0, {[{{@ipv6={@ipv4={[0x0, 0x0, 0x0, 0x4], [], @multicast2}, @remote, [], [], 'ip6tnl0\x00', 'veth0_to_hsr\x00', {}, {}, 0x6}, 0x0, 0x1128, 0x1170, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}, @common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x2, 0x0, 0x0, './cgroup.net/syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private0, 'netpci0\x00'}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@empty, @local, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @local}, @mcast1, @loopback, @remote, @mcast2, @empty, @rand_addr=' \x01\x00', @mcast1, @remote]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x14c8) [ 179.762294] Dev loop1: unable to read RDB block 1 [ 179.767422] loop1: unable to read partition table [ 179.798080] loop1: partition table beyond EOD, truncated 03:11:24 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) [ 179.814275] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 03:11:24 executing program 1: r0 = socket(0x29, 0x2, 0x0) bind$isdn_base(r0, 0x0, 0x0) r1 = mq_open(&(0x7f0000000000)='eth0\x00', 0x842, 0x0, 0x0) mq_notify(r1, &(0x7f0000000380)) mq_timedsend(r1, &(0x7f0000000000)="318f7054bad200", 0x7, 0x74, 0x0) 03:11:24 executing program 2: ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8931, &(0x7f0000000040)={'bond0\x00'}) [ 179.872374] xt_CT: You must specify a L4 protocol and not use inversions on it 03:11:24 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:25 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:25 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000010000104000000d9ffffff0000000000", @ANYRES32, @ANYBLOB="0001000000000000240012000c00010062726964676500000c0002000800050001000000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xf, 0x0) 03:11:25 executing program 1: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x87, 0x1, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) 03:11:25 executing program 2: socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8931, &(0x7f0000000040)={'bond0\x00'}) 03:11:25 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, 0x0, 0x0) 03:11:25 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:25 executing program 2: socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8931, &(0x7f0000000040)={'bond0\x00'}) 03:11:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x275a, 0x0) ioctl$FITRIM(r0, 0x40305839, &(0x7f0000000000)={0x0, 0x8001, 0x200}) 03:11:25 executing program 2: socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8931, &(0x7f0000000040)={'bond0\x00'}) [ 180.590360] device team1 entered promiscuous mode 03:11:25 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x4d, 0x0, &(0x7f0000000080)) 03:11:25 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @ipv4}, 0x1c) 03:11:25 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x58}}, 0x0) 03:11:25 executing program 3: r0 = socket(0x10, 0x80002, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="54000000020601000000000000000000000000000d0003006c6973743a73657400000000050004000000000009000200738a383c08"], 0x54}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) 03:11:25 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8931, 0x0) 03:11:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x5, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:11:25 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:25 executing program 1: r0 = socket(0x28, 0x1, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x28, 0x6, 0x0, 0x0) 03:11:25 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) keyctl$get_persistent(0x3, 0x0, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x6, 0x0, 0x0, 0x0, 0x71, 0x11, 0xdc}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit={0x95, 0x0, 0x4c}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0xff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:11:25 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8931, 0x0) 03:11:25 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r0, 0x0) 03:11:25 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x58}}, 0x0) 03:11:25 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) keyctl$get_persistent(0x3, 0x0, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:25 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8931, 0x0) 03:11:26 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x14, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000340), &(0x7f0000000100)=@tcp}, 0x20) 03:11:26 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) sendmmsg$inet(r0, &(0x7f00000032c0)=[{{&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, 0x0}}], 0x1, 0x3) 03:11:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'ip_vti0\x00', {0x2, 0x0, @initdev}}) 03:11:26 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x58}}, 0x0) 03:11:26 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) keyctl$get_persistent(0x3, 0x0, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:26 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000140)=ANY=[], 0x17) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r0, 0x0) mbind(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1, &(0x7f0000000280), 0xd2, 0x1) 03:11:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000b80)={0xf8, 0x16, 0x201, 0x0, 0x0, "", [@generic="5829ea93e7c87c5e35d1804880737be612edce17d87550cc8cfaba560a2fd763b0618ab7773c37e8cb5be014db33c1b6db9717303011ce22c6f804febdc654b6ed412a04161d9dcca614b015321bbf15237c77eec181b4194252a9d01971cf65fb2c19b0bc9228ef43ff28261e44fa4419dd1281287cb67221b2124df73cd12567abcd811ca7f8d73ab8a9c809b2e43636c1f51026d9e55c329a13d4eae7768a5759853802eb2884666209c0af9cb34facd76dacd732b4046ac687b25994fbfc3e44736da8e58864d13d9f574d8308d17ca5022f201411c623f009de78bfea154d563e1fe29aeb6e"]}, 0xf8}], 0x1}, 0x0) 03:11:26 executing program 1: r0 = socket(0x2a, 0x2, 0x0) read$rfkill(r0, &(0x7f0000000140), 0x8) 03:11:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, '\x00\x00\x00\x00\x00\x00|\x00', "b19c965f3fea724835192913b40bae1d", "3faf4d7f", "c6ca89e4e891a86b"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:11:26 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, 0x0) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x2e1) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) shutdown(r0, 0x1) 03:11:26 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x58}}, 0x0) 03:11:26 executing program 5: socket(0x1e, 0x805, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) socket(0x1e, 0x805, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x6000400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 03:11:26 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x1f) r1 = open(0x0, 0x0, 0x0) ftruncate(r1, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) creat(&(0x7f0000000000)='./bus\x00', 0x0) 03:11:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect(r0, &(0x7f00000001c0)=@in={0x2, 0x0, @remote}, 0x80) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000000340)=""/221, &(0x7f00000002c0)=0xdd) 03:11:26 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, 0x0) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:26 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x58}}, 0x0) 03:11:26 executing program 3: r0 = epoll_create1(0x0) r1 = dup(r0) readv(r1, 0x0, 0x0) 03:11:26 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x58}}, 0x0) [ 181.648593] audit: type=1804 audit(1601176286.448:11): pid=11199 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir490490881/syzkaller.1UaPLs/262/bus" dev="sda1" ino=16022 res=1 03:11:26 executing program 5: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) finit_module(r0, 0x0, 0x0) 03:11:26 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, 0x0) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)={0x14, 0x1, 0xa, 0x101}, 0x14}}, 0x0) 03:11:26 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000280)=@get={0x1, 0x0, 0x5}) 03:11:26 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x58}}, 0x0) 03:11:26 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200)='ethtool\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000c00000018000180140002007465616d300000000000000000000000180003800400010010000380"], 0x44}}, 0x0) [ 181.767493] audit: type=1804 audit(1601176286.458:12): pid=11199 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir490490881/syzkaller.1UaPLs/262/bus" dev="sda1" ino=16022 res=1 03:11:26 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000369000/0x3000)=nil, 0x3000, 0xb) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 03:11:26 executing program 2: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=@newqdisc={0x30, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:11:26 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0xc8201) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x80045510, 0x0) 03:11:26 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, 0x0, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:26 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x58}}, 0x0) [ 181.895534] mmap: syz-executor.5 (11223) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 181.908122] audit: type=1804 audit(1601176286.478:13): pid=11199 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir490490881/syzkaller.1UaPLs/262/bus" dev="sda1" ino=16022 res=1 03:11:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x9}]}}}]}, 0x3c}}, 0x0) 03:11:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000600)=@newlink={0x78, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x28, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0x7}, @IFLA_VLAN_QOS_MAPPING={0xc}, @IFLA_VLAN_QOS_MAPPING={0xc}]}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8}]}, 0x78}}, 0x0) 03:11:26 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, 0x0, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:26 executing program 2: r0 = socket(0xa, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth0\x00', &(0x7f0000000000)=@ethtool_channels={0x3c}}) 03:11:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c) 03:11:26 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x58}}, 0x0) 03:11:26 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, 0x0, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) [ 182.056578] audit: type=1400 audit(1601176286.858:14): avc: denied { create } for pid=11239 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 [ 182.091483] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 03:11:26 executing program 2: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={&(0x7f0000000000)="570c9a4ec23f6ee9d13848d4779747e808bd2e0ae393baa7a14a2a939d7d28af", 0x0, 0x0, 0x0}, 0x38) keyctl$read(0xa, 0x0, &(0x7f0000000000), 0x0) 03:11:26 executing program 3: setreuid(0xee01, 0xee00) r0 = socket$inet6(0xa, 0x802, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x8936, 0x0) 03:11:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@ipv6_delroute={0x28, 0x19, 0x11, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc}]}, 0x28}}, 0x0) 03:11:27 executing program 1: syz_emit_ethernet(0xbe, &(0x7f0000000100)={@link_local, @local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @broadcast=0xe0000001}, {0x0, 0x0, 0x8d, 0x0, @wg=@initiation={0x1, 0x0, "6f59ba5f4a67033ddeb6c19bd92b7168378e0fdf6f477fac11a1e745edc17c32", "a967527858e47f4e0c92629775a3cca55301abe491296a1509010020ced8af8be413ceb4553174d4780e817ba7310ac2", "f731a1d9f9be474794588eab658fbe765c2a1610ece33d214c35aabf", {"77cc5a1ad9a9e1a43213f907bfebcead", "91116aee49b88ae55224fdfb93da9424"}}}}}}}, 0x0) 03:11:27 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) [ 182.179259] audit: type=1400 audit(1601176286.888:15): avc: denied { ioctl } for pid=11239 comm="syz-executor.2" path="socket:[43345]" dev="sockfs" ino=43345 ioctlcmd=0x8946 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 03:11:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000007c0)={0x38, r1, 0x1, 0x0, 0x0, {0x9}, [@TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x5}]}]}]}, 0x38}}, 0x0) 03:11:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x39000, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000300)=0x2000000000000020) write$UHID_DESTROY(r2, &(0x7f0000000100), 0x4) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 03:11:27 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='sys_exit\x00', r0}, 0x10) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) 03:11:27 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:27 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:27 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x9) personality(0xd21d0356f446a02) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000280)=0x1, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x4e24, 0x4, @loopback, 0xffff}}, 0x0, 0x6, 0x38, 0x0, "00100000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000b655a8f40000000040000000000000000100000000006926ed0c00"}, 0xd8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4000000400200) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x40004, 0x0, 0x0) bind$inet(r0, &(0x7f0000000500)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) stat(0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@timestamp, @sack_perm, @mss={0x2, 0x6}, @sack_perm, @window={0x3, 0x40, 0x8203}, @mss, @sack_perm, @timestamp], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x9, 0x80000000}, 0x14) shutdown(r0, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000500)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) 03:11:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x865410, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x80d510, 0x0) 03:11:27 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:27 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 03:11:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x40}}, 0x0) 03:11:27 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:27 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:27 executing program 3: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x80184947, 0x0) 03:11:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x7a}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MTU={0x8, 0x4, 0x465}]}, 0x3c}}, 0x0) 03:11:27 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', 0x0, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x1c, 0x16, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14}]}]}]}, 0x3c}}, 0x0) 03:11:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@flushsa={0x14, 0x1c, 0x1}, 0x14}, 0x8}, 0x0) 03:11:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0x76, 0x141201) ioctl$USBDEVFS_IOCTL(r0, 0x8010550e, &(0x7f0000000500)) 03:11:27 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:27 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', 0x0, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:27 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) bind$rds(r0, &(0x7f0000000000), 0x10) 03:11:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x11, 0x4, 0x4, 0x100000001}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000180), &(0x7f0000000200)=@udp6, 0x1000000}, 0x20) 03:11:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r1, 0x719}, 0x14}}, 0x0) 03:11:28 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', 0x0, &(0x7f0000000280)='user}eth1\x00', 0x0) 03:11:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffc}, 0x40) 03:11:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0x0, 0x12}]}}, &(0x7f0000000340)=""/129, 0x2a, 0x81, 0x8}, 0x20) 03:11:28 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, 0x0, 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) splice(r0, 0x0, r3, 0x0, 0x50, 0x0) 03:11:28 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="03070006f3fffffcff001900000004000180"], 0x18}}, 0x0) 03:11:28 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0) 03:11:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000240)="580000001400192340834b80080d8c560a117fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd000000100001000a080800418e00000004fcff", 0x58}], 0x1) 03:11:28 executing program 1: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000140)) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000040)={0x7}, 0xfffffebd) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x0, 0x3938700}}, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) 03:11:28 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0) 03:11:28 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:28 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0xa, 0x0, 0x0, @local, 0x9}, 0x20) 03:11:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000010efa8c68d000000000000000000000a2000000002030100000000f787060000000000000900010001"], 0xcc}}, 0x0) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x20, 0x1, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe}}]}, 0x20}}, 0x0) 03:11:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000c80)=@filter={'filter\x00', 0x50, 0x4, 0x528, 0x360, 0x238, 0x238, 0x0, 0x0, 0x458, 0x458, 0x458, 0x458, 0x458, 0x4, 0x0, {[{{@ipv6={@mcast1, @empty, [], [], 'nr0\x00', 'bridge_slave_0\x00'}, 0x0, 0x210, 0x238, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@remote, @empty, @private0, @rand_addr=' \x01\x00', @local, @empty, @mcast1, @mcast1, @empty, @remote, @dev, @remote, @loopback, @dev, @dev, @local]}}, @common=@ah={{0x30, 'ah\x00'}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x360}}, {{@ipv6={@loopback, @mcast1, [], [], 'dummy0\x00', 'vcan0\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@loopback, @empty, [], [], 'bridge0\x00', 'netpci0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x588) 03:11:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) unshare(0x2a000400) [ 183.679946] x_tables: ip6_tables: REJECT target: used from hooks POSTROUTING, but only usable from INPUT/FORWARD/OUTPUT 03:11:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK_NETNSID={0x8}]}, 0x3c}}, 0x0) 03:11:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe, 0x1, 'wireguard\x00'}, {0x4}}}, @IFLA_NUM_RX_QUEUES={0x8}]}, 0x40}}, 0x0) 03:11:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSETELEM={0x24, 0xc, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x4}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14, 0x10}}, 0x6c}}, 0x0) 03:11:28 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0) 03:11:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000180)={&(0x7f0000000080)={0xa, 0x4e24, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@rthdrdstopts={{0x10}}], 0x18}, 0x0) 03:11:28 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:29 executing program 2: r0 = socket(0x1e, 0x5, 0x0) connect$rds(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) 03:11:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file2\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000340)={[{@ikeep='ikeep'}]}) 03:11:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r0) io_setup(0x2, &(0x7f0000000140)=0x0) pipe(&(0x7f0000000040)) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x2, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:11:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='\x10\x01\x00tA\xef\x90\xf8s\xb5hB\x82*\xf8\x8f\xf5&\xb3-\rE|\x00\x00\x00\x00\x00\x00\xad\x8d\b\x00\x00\x00\x00\x00\x1e\x00\x00\x00\x00\x00\x00\x00\x02\x10\xa5\xe6\xc4\xef\xcdt\xf5\x8f|', 0x0) pwritev(r1, &(0x7f0000001e00)=[{&(0x7f0000000600)='0', 0x1}], 0x1, 0xfff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x600, {0x17e}, 0x2ec, {}, 0x4, 0x0, 0x0, 0x0, "b04a83706694a75154c629f75b71a95a8f3b289271c607adb22d4d000000007b1291b1150d4d3aa20d7beebc689e926d5e290679d1042f1b38e9e8af694c0d43", "5244534b0f00000d574556820000a482ebf7888c305bee6fd600"}) 03:11:29 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000040)={{}, 'syz1\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 03:11:29 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:29 executing program 5: setreuid(0x0, 0xee00) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000000)=0x2, 0x4) 03:11:29 executing program 1: r0 = socket(0x2b, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x6, 0x0, &(0x7f0000000240)) 03:11:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/101, 0x65}], 0x1, 0x3, 0x0) [ 184.469766] input: syz1 as /devices/virtual/input/input5 [ 184.489293] input: syz1 as /devices/virtual/input/input6 03:11:29 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:29 executing program 2: socket(0x1, 0x0, 0x7e) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/wireless\x00') preadv(r0, &(0x7f00000007c0)=[{&(0x7f00000002c0)=""/209, 0xd1}], 0x1, 0x8, 0x0) r1 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000002c0)="f6", 0x1, 0xfffffffffffffffb) keyctl$update(0x2, r1, &(0x7f0000000240)='$', 0x1) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000000)={{0x3, 0x0, @descriptor="a6cf47c8fabddf8b"}, 0x68, r1, [], "e42371d5ab0f9f8c97d70456231f2698094f2609fa83ac4cdf7bca4562b07b851ed3133b0f78addc46c317a81417779531aeb26c98df872d91037f911ce27c38763fdf2ea4c695ef2dd838f7c38fc75d2516fb822954b9629e29686b7c7d659f74c6acae7a0086ee"}) 03:11:29 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) ppoll(&(0x7f0000000100)=[{r0}], 0x1, &(0x7f0000000140)={0x0, 0x3938700}, 0x0, 0x0) [ 184.539268] XFS (loop4): Invalid superblock magic number 03:11:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$EBT_SO_GET_INFO(r0, 0x84, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x50) 03:11:29 executing program 4: syz_emit_ethernet(0x44e, &(0x7f0000000600)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f2f2f1", 0x418, 0x3a, 0xff, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x26, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x2]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78c000004ff000053d5dea6b259fe8000000000000023493b87aa0568f00b0d71a8242373244ad2439adc07a7cc69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}, {0xff, 0x16, "84f0da1684f0da1313968050378ee824f4dffba6feed320516e05a45c70daf0622c51c7a93e357f7671975afc9c545c59d6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8551f1f8f4723b8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0"}, {0x0, 0x5e, "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"}]}}}}}}, 0x0) 03:11:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x8923, &(0x7f0000000140)={'ip6gre0\x00', 0x0}) 03:11:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b7050000000000006110480000000000d4050000200000009500000000000000747bf6dd298ca0ebc0b34b3698533abec54b671a51b91dbb97984b72f70b34c88c0ec0cfcf9e89bf3b53905c1413121071153d68399588cbd12eb2aff4d627e83ba13bcd95af193e035f17f95a"], &(0x7f00000002c0)='GPL\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0x6ee5be0d0a5cabc2}, 0x2a) 03:11:29 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)={0x60000011}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r4, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r5, &(0x7f00000001c0)) 03:11:29 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x29, 0x0, &(0x7f0000695ffc)) [ 184.727929] XFS (loop4): Invalid superblock magic number 03:11:29 executing program 4: pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 184.832063] audit: type=1400 audit(1601176289.638:16): avc: denied { block_suspend } for pid=11505 comm="syz-executor.5" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 03:11:29 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@mark={0xc, 0x15, {0x35075c}}]}, 0xc4}}, 0x0) 03:11:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002280)={&(0x7f00000000c0)=@ipv4_delrule={0x30, 0x21, 0xb334383c972d4237, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_OIFNAME={0x14, 0x11, 'batadv_slave_1\x00'}]}, 0x30}}, 0x0) 03:11:29 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x46, &(0x7f0000000300)={@broadcast, @random="0927c426f2ff", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @remote}, "00006371ae9b1c01"}}}}}, 0x0) 03:11:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x58, r3, 0x5, 0x0, 0x0, {0x1, 0x6c00000000000000}, [{{0x8, 0x1, r2}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8}}}]}}]}, 0x58}}, 0x0) 03:11:29 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELCHAIN={0x20, 0x5, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x68}}, 0x0) 03:11:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000001600)={0x18, 0x0, 0x2, 0x201, 0x0, 0x0, {}, [@CTA_EXPECT_TUPLE={0x4}]}, 0x18}}, 0x0) 03:11:29 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_BOND_XMIT_HASH_POLICY={0x5}, @IFLA_BOND_MIIMON={0x8, 0x3, 0x7}, @IFLA_BOND_ALL_SLAVES_ACTIVE={0x5}]}}}]}, 0x4c}}, 0x0) 03:11:29 executing program 2: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x6, 0x0, 0x0, 0x0) 03:11:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000900)=[{{&(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x4}}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0}}], 0x2, 0x0) 03:11:30 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000ac0)={[{@uqnoenforce='uqnoenforce'}]}) 03:11:30 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:30 executing program 5: r0 = epoll_create1(0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000b82000)) 03:11:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'tgr192\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000013c0)=[{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000000)="fe", 0x1}, {&(0x7f0000000100)="d37168c3e1d7bb6a7609d56caf7893d4610b2b4c9617afa0fadea75f03052e821d07fa856a58186fb165ee45e6f2a3b0d273fc84c2b1bdafde3a7a7ada92d5", 0x3f}], 0x2}], 0x1, 0x0) 03:11:30 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000001c0), 0x4) 03:11:30 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:30 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r0, r0, 0x100000001, 0x0) 03:11:30 executing program 3: pwritev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000200)="c5", 0x1}], 0x1, 0x0, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180), 0x492492492492785, 0x0) 03:11:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0xa, 0x0, 0xfffffffffffffffd) 03:11:30 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) [ 185.949395] XFS (loop4): Invalid superblock magic number 03:11:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={0x0, 0x1f}, 0x8) 03:11:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7, 0x7, 0xfd5, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f0000000000)=@udp}, 0x20) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000000), 0x0}, 0x20) 03:11:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {0x11}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}]}]}, 0x20}}, 0x0) 03:11:30 executing program 3: r0 = socket(0x18, 0x0, 0x1) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x111, 0x5, 0x0, 0x300) [ 186.069478] sctp: [Deprecated]: syz-executor.2 (pid 11646) Use of struct sctp_assoc_value in delayed_ack socket option. [ 186.069478] Use struct sctp_sack_info instead 03:11:31 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:31 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=@getsadinfo={0x14, 0x23, 0x1}, 0x14}}, 0x0) 03:11:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000006c0)=@newtaction={0x78, 0x30, 0x17b, 0x0, 0x0, {}, [{0x64, 0x1, [@m_bpf={0x60, 0x1, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x2}, @TCA_ACT_BPF_PARMS={0x18}, @TCA_ACT_BPF_OPS={0x14, 0x4, [{}, {}]}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x78}}, 0x0) 03:11:31 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfeed, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000700)=""/24, 0x18}], 0x1}}], 0x2, 0x0, 0x0) 03:11:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @mcast2}, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, @in={0x2, 0x0, @local}, @in={0x2, 0x0, @multicast2}], 0x1b) 03:11:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0xf, 0x4, 0x8, 0x6}, 0x40) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) 03:11:31 executing program 4: prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffa000/0x3000)=nil) 03:11:31 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:31 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000030007b010000000020000000000000002c00010028000100110001"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 03:11:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x2d}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe0c, 0x10, &(0x7f0000000000), 0xf2}, 0x48) 03:11:31 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000002c2, 0x0) setrlimit(0x7, &(0x7f0000000080)={0x3, 0x6a}) fcntl$notify(r0, 0x0, 0x0) 03:11:31 executing program 5: open(&(0x7f0000000000)='./file1\x00', 0x481c2, 0x0) r0 = open(&(0x7f0000000240)='./file1\x00', 0x0, 0x0) fadvise64(r0, 0xd519, 0x4, 0x4) 03:11:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280)='batadv\x00') socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1709, 0x0, 0x0, {0x7}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) [ 186.710935] netlink: 51 bytes leftover after parsing attributes in process `syz-executor.2'. [ 186.731702] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 03:11:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x308, 0x148, 0x0, 0x3003, 0x148, 0x148, 0x270, 0x270, 0x270, 0x270, 0x270, 0x3, 0x0, {[{{@ip={@empty, @local, 0x0, 0x0, 'erspan0\x00', 'veth0_to_team\x00'}, 0x0, 0xe0, 0x148, 0x0, {}, [@common=@socket0={{0x60, 'socket\x00'}}, @common=@inet=@multiport={{0x50, 'multiport\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'syz0\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x368) [ 186.769301] audit: type=1804 audit(1601176291.568:17): pid=11708 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir375713510/syzkaller.0bu324/290/file1" dev="sda1" ino=16076 res=1 [ 186.817427] netlink: 51 bytes leftover after parsing attributes in process `syz-executor.2'. [ 186.869133] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 03:11:31 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14, 0x4, 0x8, 0x201}, 0x14}}, 0x0) 03:11:31 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0xf, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 03:11:31 executing program 4: syz_emit_ethernet(0xba, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6035266800448406fec0ffff0000000000000000000000aafe8000000000000000000000000000aa04298a32895dbc35acad3bd300000000628bf289000086dd080088be0000000010000000010000000000264e6f240e9b18d667b02d0328cb9a0000080022eb0000000020"], 0x0) 03:11:31 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc018aa06, &(0x7f00000000c0)={{&(0x7f00005a8000/0x2000)=nil, 0x2000}, 0x3}) 03:11:32 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=[@hopopts={{0x18, 0x11, 0x67}}], 0x18}, 0x0) 03:11:32 executing program 2: r0 = socket(0x1e, 0x4, 0x0) shutdown(r0, 0x0) 03:11:32 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='./file1\x00') mount$bpf(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000000)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='./file1\x00') 03:11:32 executing program 4: fstat(0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60000011}) epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0x200034, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x0, 0x0, 0x0, 0xf, 0x0, 0x60}}) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f00000001c0)={0x2001}) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) 03:11:32 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:32 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) sendmmsg$inet(r1, &(0x7f0000001ac0)=[{{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000080)="a1", 0x1}], 0x1}}], 0x1, 0x0) close(r0) 03:11:32 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') 03:11:32 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x50, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8, 0x1, 'htb\x00'}, {0x24, 0x2, [@TCA_HTB_INIT={0x18}, @TCA_HTB_DIRECT_QLEN={0x8}]}}]}, 0x50}}, 0x0) 03:11:32 executing program 3: msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000000c0)) 03:11:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=@newlink={0x30, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x4}]}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:11:32 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x3c, r0, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r1}]}, 0x3c}}, 0x0) 03:11:32 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:32 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@ipv4_newrule={0x1c, 0x20, 0x905, 0x0, 0x0, {0x2, 0x20}}, 0x1c}}, 0x0) [ 187.857606] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 03:11:32 executing program 5: r0 = socket$inet(0x2, 0x802, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000eedffc)=0x7c4, 0x4) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000001300)=0x800003fe, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000000)=0x1, 0x4) recvfrom$inet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 03:11:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendfile(r0, r1, 0x0, 0x7fff) 03:11:32 executing program 4: unshare(0x40000000) getsockname$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000000), 0x8) 03:11:32 executing program 3: ioperm(0x0, 0x4, 0xfffffffffffffe5b) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 03:11:32 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) [ 188.065565] IPVS: ftp: loaded support on port[0] = 21 [ 188.240477] IPVS: ftp: loaded support on port[0] = 21 03:11:33 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') 03:11:33 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newae={0x50, 0x1e, 0x1, 0x0, 0x0, {{@in=@multicast1}, @in=@local}, [@replay_val={0x10}]}, 0x50}}, 0x0) 03:11:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x18, r1, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}}, 0x0) 03:11:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000002d40)=ANY=[@ANYBLOB="61128c000000000061138c0000000000bf2000000000000015000000080000002d0301000000000095000000000000006916000000000000bf670000000000004406000023ff07006706000020000000070300000ee60060bf050000000000000f610000000000006507f9ff01000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000000000000032ed3c5be95e5db67754bb12dc8c27df8ecf264e0f84f9f17d3c30e3c7bdd2d17f2f1754558f2278af0100008000000000b1d8a5d4601d295c45a6a0b9bdb7dd399703d6c4f6f3be4b369289aa6812b8e007e733a9a4f16d0a3e1282ee45a010fb94fe9de56c9d8a814261bdb94a05000000c6c60bf70d742a8100000000000000810b5b40d8931f000000207e44ced73bde2c8fe0185473d51b546cad3f1d5af65727546e7c955ccefa1f6ab689fde4de4e63ede20271a51445dc8da39e5b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb735fd552bdc206004aeb0743eb2dc819b6cf5c8ac86d8a297dff0445a13d0045fb3cda30a673a6bb55d8c85f21dce431e56723888fb126a163f16fb2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2ebce0e67a993716dbf580469f0f53acbb40b401e3738270b315d362ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000000000bc00f674629709e7e78f4ddc211bc3ebf0bd9d42ca019dd5d022cf74686e9fbe2562671cd47840a7afaab43176e65ec1118d46d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7eab04871bc47287cd31cc43ea0ffb567b40407d000000000000000000000000005f37d83f84e98a523d80bd0d0d703f37ca363f601ae899a53f6715a0a62a34b0c94cce6994521629ab028acfc1d926a0f6a5480a55c22fe394ac00"/769], &(0x7f0000000100)='GPL\x00'}, 0x48) 03:11:33 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:33 executing program 4: symlinkat(&(0x7f00000001c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) 03:11:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x2f}, [@ldst={0x6, 0x0, 0x2}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x40) 03:11:33 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000140)=[@window, @window={0x3, 0x1, 0x800}], 0x2) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x37cb1133) r3 = socket(0xa, 0x3, 0x84) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 03:11:33 executing program 4: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x29, 0x1e, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 03:11:33 executing program 5: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976edec860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) keyctl$clear(0x7, r0) 03:11:33 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:33 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$FIBMAP(r0, 0x1, 0x0) 03:11:34 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') 03:11:34 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0xc, 0x2, [@TCA_FQ_RATE_ENABLE={0x8}]}}]}, 0x38}}, 0x0) 03:11:34 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) setresuid(0x0, 0x0, 0xffffffffffffffff) 03:11:34 executing program 3: r0 = socket$pptp(0x18, 0x1, 0x2) getpeername(r0, 0x0, &(0x7f0000000000)) 03:11:34 executing program 0: socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:34 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipoib={{0xa, 0x1, 'ipoib\x00'}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) 03:11:34 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}, {@version_u='version=9p2000.u'}]}}) 03:11:34 executing program 2: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x400002200006007, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$UI_GET_SYSNAME(r0, 0x401070cd, 0x0) 03:11:34 executing program 0: socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:34 executing program 4: r0 = memfd_create(&(0x7f0000000900)='#\'%nodev\x00\x7f\xe5\xd0ql\x86\xcd\xe6\x14\x93\xb0\x7f_,y<', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0x40046629, 0x0) 03:11:34 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x6) 03:11:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x218, 0xe8, 0xe8, 0x0, 0x0, 0xe8, 0x180, 0x180, 0x180, 0x180, 0x180, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@unspec=@connlabel={{0x28, 'connlabel\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x278) [ 189.782498] xt_NFQUEUE: number of total queues is 0 03:11:35 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x410, 0x258, 0x4000000, 0x158, 0x0, 0x0, 0x340, 0x240, 0x240, 0x340, 0x240, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x230, 0x258, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}, {[], [], 0x0, 0x0, 0x2}}, @common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'caif0\x00', {0x1, 0x0, 0x50, 0x0, 0x0, 0x8, 0x1, 0x400}}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x470) 03:11:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xe, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff84}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x64}, 0x48) 03:11:35 executing program 0: socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x19, 0x4, 0x4, 0x100000001}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f0000000380)=@tcp6=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000), 0x0}, 0x20) 03:11:35 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)='X', 0x1}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) splice(r0, 0x0, r2, 0x0, 0x7fffffff, 0x0) [ 190.372659] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw 03:11:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f00000002c0)={{0x2, 0x0, @multicast2}, {0x0, @dev}, 0x2a, {0x2, 0x0, @multicast2}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 03:11:35 executing program 4: r0 = socket(0x15, 0x5, 0x0) bind$l2tp6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x20) sendto$l2tp6(r0, 0x0, 0x3ffde8, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x10]}, 0xffffffd1}, 0x20) 03:11:35 executing program 3: r0 = socket(0x10, 0x80002, 0xc) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) 03:11:35 executing program 0: socket$inet6(0xa, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:35 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:35 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1800007, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x202, &(0x7f0000000200)=0x0) r3 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r3, 0x8200) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000580)) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x1a000000}]) 03:11:35 executing program 2: syz_emit_ethernet(0x46, &(0x7f00000002c0)={@broadcast, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "65e809", 0x10, 0x3a, 0x0, @dev={0xfe, 0x0, [0x3]}, @mcast1, {[], @ndisc_ra}}}}}, 0x0) 03:11:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2c, 0x17, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x2c}}, 0x0) 03:11:35 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:35 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "67cc49fa3e06df460ea076770e9a296a7aac43c604e4ff80e9edfa2cd59aa4b877ef13c97ab9d89614b6587417564500d2e4bc18157dfc3f1a437bd84fa28fdebaff0cc727f34d4c7b61fe2e61678b5a1bd2f053fed72db2308657087bbe4150899c21c534d21bdf7a553427c3b4379e07f6a6ee8a22f5d813323cd89b3c2803052e4a54843b8457d15c9c3aceab0161d28647ada79871a9200e8d0e071d47b2cc0f1f8a8cb208c263a46f4cbc93fd82215a9d7dc1221e235786a207e97f355065413166dc722fcce885cc5329b908cd01a9f9360ef152c564f016a1138b8e11d9643536e8dd9d0a07cd1bbc516ac0595644d728f46f1de146679ffc3fb88adf"}, @TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}]}}]}, 0x148}}, 0x0) 03:11:35 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r1) 03:11:35 executing program 0: socket$inet6(0xa, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:35 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:35 executing program 2: setresuid(0xffffffffffffffff, 0xee00, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000003c0)={'sit0\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @mcast1}}) 03:11:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0xffffffffffffff5e, 0x2, 0x0, 0x1, [@IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @multicast}, @IFLA_HSR_MULTICAST_SPEC={0x5}, @IFLA_HSR_SUPERVISION_ADDR={0xa, 0x4, @link_local}, @IFLA_HSR_VERSION={0x5}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_MASTER={0x8}]}, 0x68}}, 0x0) 03:11:35 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000000)=0x54) 03:11:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=@ipv4_newnexthop={0x1c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_GROUP={0x4}]}, 0x1c}}, 0x0) 03:11:36 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000640)={'virt_wifi0\x00', &(0x7f0000000340)=@ethtool_per_queue_op={0x4b, 0xe}}) 03:11:36 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:36 executing program 0: socket$inet6(0xa, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:36 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x2, r0}}}}}]}, 0x40}}, 0x0) [ 191.204325] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=104 sclass=netlink_route_socket pid=12046 comm=syz-executor.2 [ 191.242335] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.3'. 03:11:36 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x6, &(0x7f00000001c0)={@local}, 0x20) [ 191.262857] (unnamed net_device) (uninitialized): HSR: No slave devices specified 03:11:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='reno\x00', 0x5) [ 191.331511] ================================================================================ [ 191.340470] UBSAN: Undefined behaviour in ./include/net/red.h:272:18 [ 191.347075] shift exponent 223 is too large for 64-bit type 'long unsigned int' [ 191.354635] CPU: 1 PID: 18 Comm: ksoftirqd/1 Not tainted 4.19.148-syzkaller #0 [ 191.361987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.371332] Call Trace: [ 191.373963] dump_stack+0x22c/0x33e [ 191.377596] ubsan_epilogue+0xe/0x3a [ 191.381313] __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 [ 191.387457] ? mark_held_locks+0xa6/0xf0 [ 191.391523] ? kvm_clock_get_cycles+0x14/0x30 [ 191.396016] ? ktime_get+0x21b/0x320 [ 191.399735] red_adaptative_timer+0x7ed/0x870 [ 191.404236] call_timer_fn+0x177/0x760 [ 191.408162] ? hfsc_dump_class.cold+0x41/0x41 [ 191.412655] ? init_timer_key+0x370/0x370 [ 191.416808] ? _raw_spin_unlock_irq+0x24/0x90 [ 191.421305] ? hfsc_dump_class.cold+0x41/0x41 [ 191.425799] expire_timers+0x243/0x500 [ 191.429689] run_timer_softirq+0x259/0x730 [ 191.433925] ? expire_timers+0x500/0x500 [ 191.437991] ? mac80211_hwsim_beacon+0x171/0x1b0 [ 191.442747] ? check_preemption_disabled+0x41/0x2b0 [ 191.447777] __do_softirq+0x27d/0xad2 [ 191.451591] ? __local_bh_enable_ip+0x2a0/0x2a0 [ 191.456261] run_ksoftirqd+0x57/0x130 [ 191.460062] smpboot_thread_fn+0x66e/0xa30 [ 191.464298] ? _raw_spin_unlock_irqrestore+0x7d/0xf0 [ 191.469404] ? __smpboot_create_thread+0x460/0x460 [ 191.474337] ? _raw_spin_unlock_irqrestore+0x6a/0xf0 03:11:36 executing program 4: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100), 0x1, 0x0, 0x3b}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:11:36 executing program 3: keyctl$restrict_keyring(0x1d, 0xfffffffffffffffc, 0x0, &(0x7f0000000140)='\x00') 03:11:36 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000280), 0xd3, 0x0) 03:11:36 executing program 4: msgget(0x2, 0x40) r0 = msgget(0x1, 0xdc509109303bf7b) msgrcv(r0, &(0x7f0000000000)={0x0, ""/52}, 0x3c, 0x3, 0x2000) msgsnd(r0, &(0x7f00000009c0)={0x1}, 0x8, 0x0) 03:11:36 executing program 3: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.origin\x00', 0x0, 0x0) 03:11:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x34, r1, 0x1, 0x0, 0x0, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) [ 191.479449] ? __kthread_parkme+0x133/0x1e0 [ 191.483779] ? __smpboot_create_thread+0x460/0x460 [ 191.488796] kthread+0x33f/0x460 [ 191.492183] ? kthread_park+0x180/0x180 [ 191.496176] ret_from_fork+0x24/0x30 [ 191.499896] ================================================================================ 03:11:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=@allocspi={0x104, 0x16, 0x317, 0x0, 0x0, {{{@in6=@empty, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, {@in6=@mcast2}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, [@replay_val={0xb}]}, 0x104}}, 0x0) 03:11:36 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:36 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x60, 0x30, 0x301, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x60}}, 0x0) 03:11:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0x0, 0xf}, &(0x7f0000000040)=0x20) 03:11:36 executing program 2: syz_mount_image$nfs4(&(0x7f0000002c40)='nfs4\x00', &(0x7f0000002c80)='./file0\x00', 0x0, 0x0, &(0x7f0000002f80), 0x0, &(0x7f0000003000)) 03:11:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') write$cgroup_devices(r0, 0x0, 0x0) 03:11:36 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6a) getsockopt$inet6_int(r0, 0x29, 0x3a, 0x0, &(0x7f0000000040)) 03:11:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x60, 0x30, 0x301, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x60}}, 0x0) 03:11:36 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = dup2(r0, r0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x40106614, 0x0) 03:11:36 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:36 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@multicast, @dev, @void, {@arp={0x806, @ether_ipv4={0x2, 0x800, 0x6, 0x4, 0x0, @dev, @loopback, @local, @broadcast}}}}, 0x0) 03:11:36 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x60, 0x30, 0x301, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x60}}, 0x0) 03:11:36 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='[,s \xf7\x18\x9f\b\xa5C,\xa4\xa0/o\xe9!\"\x00') seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) 03:11:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, r1, 0x1, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) 03:11:36 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@multicast, @dev, @void, {@arp={0x806, @ether_ipv4={0x2, 0x800, 0x6, 0x4, 0x0, @dev, @loopback, @local, @broadcast}}}}, 0x0) [ 191.941028] audit: type=1326 audit(1601176296.749:18): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12128 comm=5B2C7320F7189F08A5432CA4A02F6F exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x0 03:11:36 executing program 2: r0 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(r0, 0x8, 0x0, 0x8000) 03:11:36 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x60, 0x30, 0x301, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x60}}, 0x0) 03:11:36 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x9, &(0x7f0000000240)=0x0) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) io_getevents(r1, 0x0, 0x1, &(0x7f00000002c0)=[{}], 0x0) 03:11:36 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x60, 0x30, 0x301, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x60}}, 0x0) 03:11:36 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:37 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:37 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000180)={'filter\x00', 0x2, [{}, {}]}, 0x44) 03:11:37 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="009a00000000000000100000060200000000000000", @ANYRES16=r4, @ANYRES64], 0x34}}, 0x20000080) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={0x0, 0x88}}, 0x20000040) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f5b9e46ac000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x60}}, 0x0) 03:11:37 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x60, 0x30, 0x301, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x60}}, 0x0) [ 192.718167] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 03:11:37 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@newtaction={0x8c, 0x30, 0x727, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x74, 0x1, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x4c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}, @TCA_CT_LABELS={0x14, 0x7, "c9b2483db858ef59e6ce30a682908ea3"}, @TCA_CT_LABELS_MASK={0x14, 0x8, "bf6614dd68622cce6d98faed56525a4b"}, @TCA_CT_MARK={0x8}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) 03:11:37 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) accept$alg(r0, 0x0, 0x0) 03:11:37 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x60, 0x30, 0x301, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x60}}, 0x0) [ 192.836984] IPv6: ADDRCONF(NETDEV_UP): bond1: link is not ready [ 192.873720] 8021q: adding VLAN 0 to HW filter on device bond1 03:11:37 executing program 3: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x60, 0x30, 0x301, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x60}}, 0x0) 03:11:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@ldst={0x4, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) [ 192.912488] bond1: The slave device specified does not support setting the MAC address 03:11:37 executing program 3: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x60, 0x30, 0x301, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x60}}, 0x0) 03:11:37 executing program 5: socketpair(0x25, 0x1, 0x0, &(0x7f0000001300)) [ 193.442214] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 193.455639] bond2 (uninitialized): Released all slaves 03:11:38 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:38 executing program 3: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x60, 0x30, 0x301, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x60}}, 0x0) 03:11:38 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @dev}}, 0x63, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1}], 0x1}, 0x60) 03:11:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0100001a0013070000000000000000e0000001000000000000000000000000ac1414ea00"/64, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="f0000000000000000000ffffffffffff0000000033000000fe8000000000000000000000000000aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffeffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000020001007a000000000000004c0014"], 0x13c}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0xf1, 0x0) 03:11:38 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:38 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="009a00000000000000100000060200000000000000", @ANYRES16=r4, @ANYRES64], 0x34}}, 0x20000080) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={0x0, 0x88}}, 0x20000040) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f5b9e46ac000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x60}}, 0x0) 03:11:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 03:11:38 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x20, 0x2, 0x9, 0x101, 0x0, 0x0, {}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) 03:11:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x5, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x19, 0x77}}, &(0x7f0000000080)='GPL\x00', 0x4, 0x99, &(0x7f0000000340)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 193.845428] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 03:11:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 03:11:38 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f00000000c0)={[{@nolargeio='nolargeio'}]}) [ 193.969111] IPv6: ADDRCONF(NETDEV_UP): bond2: link is not ready 03:11:38 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) [ 194.010182] 8021q: adding VLAN 0 to HW filter on device bond2 [ 194.042523] bond2: The slave device specified does not support setting the MAC address [ 194.133545] XFS (loop5): Invalid superblock magic number [ 194.229200] XFS (loop5): Invalid superblock magic number 03:11:39 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 03:11:39 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x3}}, 0x26) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, 0x0) 03:11:39 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB="4c00000010001fff00f2ff000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000024001280090001007866726d00000000140002800800010002000000080002000100000008000a00", @ANYRES32], 0x4c}}, 0x0) 03:11:39 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:39 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="009a00000000000000100000060200000000000000", @ANYRES16=r4, @ANYRES64], 0x34}}, 0x20000080) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={0x0, 0x88}}, 0x20000040) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f5b9e46ac000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x60}}, 0x0) 03:11:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 03:11:39 executing program 4: keyctl$update(0x2, 0x0, 0x0, 0x2) [ 194.922899] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 03:11:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 03:11:39 executing program 4: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x7c0837c96e5a2e28) r1 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setresuid(0x0, r2, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000400)={0xa0}, 0xa0) [ 194.998733] IPv6: ADDRCONF(NETDEV_UP): bond3: link is not ready [ 195.012073] 8021q: adding VLAN 0 to HW filter on device bond3 03:11:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 195.049965] bond3: The slave device specified does not support setting the MAC address 03:11:39 executing program 4: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='.\x00', 0x20000000) inotify_add_watch(r0, &(0x7f00000000c0)='.\x00', 0x20000000) 03:11:40 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 03:11:40 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x54}, 0x1, 0x0, 0x0, 0x54}, 0x0) 03:11:40 executing program 5: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000000c0)=""/83) 03:11:40 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:40 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="009a00000000000000100000060200000000000000", @ANYRES16=r4, @ANYRES64], 0x34}}, 0x20000080) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={0x0, 0x88}}, 0x20000040) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f5b9e46ac000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x60}}, 0x0) 03:11:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 03:11:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@ipv6_newaddr={0x17, 0x14, 0x1, 0x0, 0x0, {0x2}, [@IFA_LOCAL={0x14, 0x2, @empty}]}, 0x2c}}, 0x0) [ 195.670716] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 03:11:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 03:11:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x60, 0x30, 0x0, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x60}}, 0x0) [ 195.774673] IPv6: ADDRCONF(NETDEV_UP): bond4: link is not ready [ 195.794945] 8021q: adding VLAN 0 to HW filter on device bond4 03:11:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x60, 0x30, 0x0, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x60}}, 0x0) 03:11:40 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x10084}, 0x10) write(r0, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) [ 195.872867] bond4: The slave device specified does not support setting the MAC address 03:11:41 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x60, 0x30, 0x0, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x60}}, 0x0) 03:11:41 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp6\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r1, r0, 0x0) 03:11:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x10084}, 0x10) write(r0, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) 03:11:41 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="009a00000000000000100000060200000000000000", @ANYRES16=r4, @ANYRES64], 0x34}}, 0x20000080) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={0x0, 0x88}}, 0x20000040) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x60}}, 0x0) 03:11:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x14, 0x30, 0x301}, 0x14}}, 0x0) 03:11:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x10084}, 0x10) write(r0, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) 03:11:41 executing program 5: socketpair(0x23, 0x5, 0x0, &(0x7f0000000180)) 03:11:41 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="009a00000000000000100000060200000000000000", @ANYRES16=r4, @ANYRES64], 0x34}}, 0x20000080) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={0x0, 0x88}}, 0x20000040) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x60}}, 0x0) 03:11:41 executing program 5: socketpair(0x23, 0x5, 0x0, &(0x7f0000000180)) 03:11:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x10084}, 0x10) write(r0, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) 03:11:41 executing program 1: creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x14, 0x30, 0x301}, 0x14}}, 0x0) 03:11:41 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x0, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:41 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) getpeername(r0, 0x0, &(0x7f00000000c0)) 03:11:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) 03:11:41 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="009a00000000000000100000060200000000000000", @ANYRES16=r4, @ANYRES64], 0x34}}, 0x20000080) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={0x0, 0x88}}, 0x20000040) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x60}}, 0x0) 03:11:41 executing program 4: write(0xffffffffffffffff, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) 03:11:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x2, 0x6, 0x401, 0xf56, 0x0, {0x0, 0x3}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x4c}}, 0x0) 03:11:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x14, 0x30, 0x301}, 0x14}}, 0x0) 03:11:41 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="009a00000000000000100000060200000000000000", @ANYRES16=r4, @ANYRES64], 0x34}}, 0x20000080) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={0x0, 0x88}}, 0x20000040) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f5b9e46ac000000", @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8}]}, 0x60}}, 0x0) 03:11:42 executing program 4: write(0xffffffffffffffff, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) 03:11:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="f800000016001103000000000000000000000000000000200000000000000000ffffffff00"/64, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="fe8000000000000000000000000000aa0000000033"], 0xf8}, 0x8}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000000)=@flushsa={0x14, 0x1c, 0x1}, 0x14}}, 0x0) [ 197.214977] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 197.299449] IPv6: ADDRCONF(NETDEV_UP): bond5: link is not ready [ 197.317089] 8021q: adding VLAN 0 to HW filter on device bond5 03:11:42 executing program 1: creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:42 executing program 4: write(0xffffffffffffffff, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) 03:11:42 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000100)={'ip6tnl0\x00', 0x0}) 03:11:42 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x0, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x18, 0x30, 0x301, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) 03:11:42 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="009a00000000000000100000060200000000000000", @ANYRES16=r4, @ANYRES64], 0x34}}, 0x20000080) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={0x0, 0x88}}, 0x20000040) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f5b9e46ac000000", @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8}]}, 0x60}}, 0x0) 03:11:42 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2c}}, @in={0x2, 0x4e23, @local}], 0x20) [ 197.706002] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 197.716740] bond6 (uninitialized): Released all slaves 03:11:42 executing program 4: r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) 03:11:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x18, 0x30, 0x301, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) 03:11:42 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="009a00000000000000100000060200000000000000", @ANYRES16=r4, @ANYRES64], 0x34}}, 0x20000080) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={0x0, 0x88}}, 0x20000040) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f5b9e46ac000000", @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8}]}, 0x60}}, 0x0) 03:11:42 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x0, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x18, 0x30, 0x301, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) [ 197.878929] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 197.904776] bond6 (uninitialized): Released all slaves 03:11:43 executing program 1: creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x0, 0x0, 0x0, 0xa, 0x4}]}}, &(0x7f0000000040)=""/219, 0x26, 0xdb, 0x8}, 0x20) 03:11:43 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="009a00000000000000100000060200000000000000", @ANYRES16=r4, @ANYRES64], 0x34}}, 0x20000080) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f5b9e46ac000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x60}}, 0x0) 03:11:43 executing program 4: r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) 03:11:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x60, 0x30, 0x301, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x0, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x60}}, 0x0) 03:11:43 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x0, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x60, 0x30, 0x301, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x0, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x60}}, 0x0) [ 198.318496] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 03:11:43 executing program 4: r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) 03:11:43 executing program 5: mmap(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0, 0x400002172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x4000, 0x7, &(0x7f0000005000/0x4000)=nil) 03:11:43 executing program 5: r0 = socket(0x23, 0x2, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000040)="7de49d751c29ed57e55557a377829160", 0x10) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 03:11:43 executing program 4: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) [ 198.444446] IPv6: ADDRCONF(NETDEV_UP): bond6: link is not ready [ 198.476313] 8021q: adding VLAN 0 to HW filter on device bond6 03:11:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x60, 0x30, 0x301, 0x0, 0x0, {}, [{0x4c, 0x1, [@m_skbedit={0x48, 0x0, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x60}}, 0x0) 03:11:43 executing program 1: mkdir(0x0, 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:43 executing program 4: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) 03:11:43 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="009a00000000000000100000060200000000000000", @ANYRES16=r4, @ANYRES64], 0x34}}, 0x20000080) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f5b9e46ac000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x60}}, 0x0) 03:11:43 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:43 executing program 5: writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000002000)="06", 0x1}], 0x1) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3cusgrVex:De', 0x0) 03:11:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x48, 0x30, 0x301, 0x0, 0x0, {}, [{0x34, 0x1, [@m_skbedit={0x30, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x4}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x48}}, 0x0) 03:11:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x48, 0x30, 0x301, 0x0, 0x0, {}, [{0x34, 0x1, [@m_skbedit={0x30, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x4}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x48}}, 0x0) 03:11:43 executing program 4: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) [ 198.996075] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 03:11:43 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f00000001c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500810000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_TARGET={0x8}]}}]}, 0x3c}}, 0x0) 03:11:43 executing program 4: socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) [ 199.079359] IPv6: ADDRCONF(NETDEV_UP): bond7: link is not ready [ 199.097859] 8021q: adding VLAN 0 to HW filter on device bond7 03:11:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x48, 0x30, 0x301, 0x0, 0x0, {}, [{0x34, 0x1, [@m_skbedit={0x30, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x4}, {0x4}, {0xc, 0x9}, {0xc}}}]}]}, 0x48}}, 0x0) 03:11:43 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="009a00000000000000100000060200000000000000", @ANYRES16=r4, @ANYRES64], 0x34}}, 0x20000080) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f5b9e46ac000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x60}}, 0x0) [ 199.237642] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 199.324603] IPv6: ADDRCONF(NETDEV_UP): bond8: link is not ready [ 199.343082] 8021q: adding VLAN 0 to HW filter on device bond8 03:11:44 executing program 1: mkdir(0x0, 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:44 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xf, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0xf000}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2e], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x5d, 0x10, 0x0}, 0x23) 03:11:44 executing program 4: socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) 03:11:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) sendmsg$inet6(r0, &(0x7f0000001840)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @empty}, r3}}}], 0x28}, 0x0) 03:11:44 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="009a00000000000000100000060200000000000000", @ANYRES16=r4, @ANYRES64], 0x34}}, 0x20000080) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={0x0, 0x88}}, 0x20000040) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f5b9e46ac000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x60}}, 0x0) 03:11:44 executing program 4: socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000280)="240000001a005f0214f9f407000904080300000000000005000a000008000f00fe000000", 0x24) 03:11:44 executing program 5: readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/193, 0xc1}], 0x1) r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={r2}, &(0x7f0000000200)=0x8) [ 199.651515] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 199.679147] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 03:11:44 executing program 3: r0 = memfd_create(&(0x7f0000000240)='/dev/full\x00', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) fchown(r0, 0x0, 0x0) 03:11:44 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0x90) [ 199.762806] IPv6: ADDRCONF(NETDEV_UP): bond9: link is not ready [ 199.780905] 8021q: adding VLAN 0 to HW filter on device bond9 03:11:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 03:11:44 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:45 executing program 1: mkdir(0x0, 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:45 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="009a00000000000000100000060200000000000000", @ANYRES16=r4, @ANYRES64], 0x34}}, 0x20000080) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={0x0, 0x88}}, 0x20000040) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f5b9e46ac000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x60}}, 0x0) 03:11:45 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x8, 0x1, &(0x7f0000000980)=[{0x0}]) syz_read_part_table(0x9, 0x0, &(0x7f0000000d80)) syz_open_dev$loop(&(0x7f0000001340)='/dev/loop#\x00', 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xb337) 03:11:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 03:11:45 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0x90) 03:11:45 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x0, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) [ 200.295918] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 03:11:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000280), 0x0) 03:11:45 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0xcc272, 0xffffffffffffffff, 0x0) mbind(&(0x7f00002ca000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000000), 0x7f, 0x0) [ 200.353445] IPv6: ADDRCONF(NETDEV_UP): bond10: link is not ready [ 200.364145] 8021q: adding VLAN 0 to HW filter on device bond10 03:11:45 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0x90) 03:11:45 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000940)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="009a00000000000000100000060200000000000000", @ANYRES16=r4, @ANYRES64], 0x34}}, 0x20000080) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={0x0, 0x88}}, 0x20000040) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f5b9e46ac000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x60}}, 0x0) 03:11:45 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x0, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) [ 200.536385] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 200.609065] IPv6: ADDRCONF(NETDEV_UP): bond11: link is not ready [ 200.628872] 8021q: adding VLAN 0 to HW filter on device bond11 03:11:45 executing program 1: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(0x0, 0x0) chdir(&(0x7f0000000140)='./bus\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') chown(&(0x7f0000000200)='./file1\x00', 0xee01, 0x0) 03:11:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000280), 0x0) 03:11:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x30, &(0x7f0000000240)={{{@in=@broadcast, @in6=@rand_addr=' \x01\x00'}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, 0x20000328) 03:11:45 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={0x0, 0x88}}, 0x20000040) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f5b9e46ac000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x60}}, 0x0) 03:11:45 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0x90) 03:11:45 executing program 0: socket$inet6(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet(0x2, 0x80001, 0x0) socket(0x11, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x0, 0x2, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x58, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x203}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xe, 0xa}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x58}}, 0x0) 03:11:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000280), 0x0) [ 201.006502] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 03:11:45 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0x90) 03:11:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000280)="240000001a005f0214f9f407000904080300", 0x12) [ 201.086880] IPv6: ADDRCONF(NETDEV_UP): bond12: link is not ready [ 201.117100] 8021q: adding VLAN 0 to HW filter on device bond12 03:11:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x2, 0x3, 0x288, 0xe8, 0xe8, 0xe8, 0xe8, 0xe8, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@ip={@local, @rand_addr, 0x0, 0x0, 'vlan0\x00', 'wg2\x00'}, 0x0, 0xb8, 0xe8, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0xc000000, 0x5fffffc}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@ip={@empty, @multicast1, 0x0, 0x0, 'vlan0\x00', 'veth1\x00'}, 0x0, 0xa0, 0x108, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e8) 03:11:45 executing program 5: r0 = socket(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0x90) 03:11:46 executing program 2: r0 = accept(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="0dbd", 0x2}, {&(0x7f0000000500)="e0cd", 0x2}, {&(0x7f0000000080)="9f269e9496f42e79e8b1eb3f23bd24dc05540ed086f920a857", 0x19}, {&(0x7f0000000200)="e3d76a8ecb6a6d851aad4708024ace6d4e96435b2427d1c81f9248f8eed0adfde920b7", 0x23}, {&(0x7f00000002c0)="7808ed1596e2606c6f70a01ce14aa8c31749c7fa2c5318c304e0f227bb2f9253f1e0a74846185c167fa86244e7e8f67010e646db98b3566d2aeaf6bff1952acf00fdf75fd524268a1f12e3a2909516f21cbcafa6f0851cf36d4fd88387c3de3da6b7c767ab721daf46d4644a25c6b9fcd606cdc9714ab316fff3a2dd2fdd76f7", 0x80}], 0x5}}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000800)=""/248, 0xf8, 0x1, &(0x7f0000000900)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket(0x10, 0x803, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000680)={0x1, @default, @netrom={'nr', 0x0}, 0x7, 'syz0\x00', @default, 0x24f7721f, 0x5, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x0, 0x1, 0x0, 0xe, 0x0, 0x4}, 0x20) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r5, 0x2}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000009c0)) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="b2955329ea53d5d6d324e99c6ee03b31775d1f981f9e86e745fe3cca704e7d4b16df5e96e6cf526e966edec9971113c1632fda44b0949da82d13ce3cb51d1ba61252d87b8bd42384a2eca7a3f0e549e1f763177294d0336afce43e9e11d8e3ee698f54ba59f5bf5130bb705cf0a345d839c30ace82d5b9f96f2d602c8fa5c58236a8d1f713b0fca4838879dbf469285a5711a53fe480ab9e5f605093", @ANYRES16=r4, @ANYBLOB="21020000000000000000010000000c00990001000000000000000800010000000000"], 0x28}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={0x0, 0x88}}, 0x20000040) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506003282835f5b9e46ac000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0xe4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x60}}, 0x0) [ 201.264772] xt_limit: Overflow, try lower: 201326592/100663292 [ 201.283928] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 201.288569] xt_limit: Overflow, try lower: 201326592/100663292